information security

HYBRID MODEL OF NETWORK ANOMALIES DETECTION USING MACHINE LEARNING

The increasing complexity of cyber threats requires the development of effective methods for detecting and classifying attacks in network traffic. This study analyzes the effectiveness of three popular machine learning algorithms: Random Forest, which is used for anomaly detection, Support Vector Machines (SVM), which performs cyber threat classification, and autoencoders, which are used for data preprocessing and deep traffic analysis.

Criminal Liability for Offenses Against National Security: Domestic and Foreign Perspectives

The article deals with the issue of criminal liability for crimes against the foundations of national security on the example of domestic and foreign experience of certain countries.

The author specifically analyzes the legislative regulation of criminal liability for crimes against national security in the Republic of Lithuania, the Republic of Latvia, the Republic of Estonia, Georgia, the Republic of Armenia, the Republic of Poland, Switzerland, the Federal Republic of Germany, and the French Republic.

COMPREHENSIVE APPROACH TO PROTECTING DATA AND THE INFORMATION SYSTEM INTEGRITY

The article discusses key information security principles, focusing on confidentiality, integrity, availability, traceability, and the DIE model (Distributed, Immutable, Ephemeral). Confidentiality emphasizes the importance of secrecy and controlling access to prevent sensitive information from misappropriation. Integrity ensures that data remains accurate and trustworthy, with measures to prevent unauthorized modifications.

Legal Mechanisms for Ensuring Information Security in Ukraine

The article considers the legal mechanisms for ensuring information security. It has been proven that today, more than ever, when there is a war in Ukraine, the issue of ensuring information security becomes especially relevant and significant, as the information space becomes a “battlefield” on a par with the war front. Enemy forces actively use informational and psychological operations to destabilize the situation inside our country, create panic, spread fakes and undermine trust in state institutions.

Overview of the Cis Benchmarks Usage for Fulfilling the Requirements From International Standard ISO/IEC 27001:2022

nding to emerging threats through the implementation of recognized standards in the field of information security, such as ISO 27001, was considered. The updated edition of the international standard ISO/IEC 27001 of 2022 and, in particular, the main changes in the structure of controls were analyzed. A detailed analysis of the new security control from Appendix A – A.8.9 – Configuration Management and possible ways of its effective implementation in organizations were carried out.

Security Methodology of Cyber-Physical Systems and the Internet of Things in Intellectualization of Infrastructure Objects

A multi-level structure of safe intellectualization of society’s infrastructure “objects – cyber-physical systems” in the functional space “selection – exchange of information – processing – management” is proposed according to the profiles – confidentiality, integrity, availability for “smart environmental monitoring”, “smart education”, “smart energy”, “intelligent transport system” and other subject areas.

Features of organizational and legal provision of information security in the conditions of war with russia

The article, based on a theoretical and practical study of the essence and features of the regulation of information and legal relations in the conditions of russian aggression, focuses on the problematic issues of organizational and legal provision of information security as an activity aimed at the prevention, timely detection and termination of threats that destructively affect vital interests of the individual, society and the state in the information sphere.

Метод шифрування інформації на основі Ateb-функцій

Розроблено алгоритми та програмне забезпечення для шифрування інформації на основі теорії Ateb-функцій, що пропонується застосувати для захисту інформації. Шифрування здійснюється за допомогою числових значень Ateb-функцій на певному діапазоні. Для того, щоб збільшити надійність шифрування, розроблено алгоритм приховання ключа у файлі.

Information threats on the internet in the conditions of war in Ukraine: problematic issues of legal regulation

The article examines the issue of information security as a state of protection of the vital interests of a person, society and the state, in which damage should be prevented due to: incompleteness, untimeliness and implausibility of the information used.

Analysis of the security of on-board information systems in vehicles

The features of the functioning of the on-board information systems of a car are considered. Threats to their security are analyzed, and methods for ensuring information security and functional security of on-board information systems are proposed. The design of road networks in the organization of road traffic is one of the factors in ensuring the functional security of modern intelligent transport systems, that is, compliance with such information security attributes as data confidentiality, integrity, availability, authenticity and novelty of data.