Prospects and Current Status of Defence Information Security in Ukraine

Olha O. Zolotar, Mykola M. Zaitsev, Vitalii V. Topolnitskyi, Kostiantyn I. Bieliakov, Ihor M. Koropatnik

Abstract


Relevance of the article - security has always been one of the priority issues of state policy. Considering that the defence forces are an inseparable part of state security, studying their information security is essential. The feasibility of this study is confirmed by the fact that in the current conditions of development of the information society, the information technology of the Ukrainian defence forces must adapt to the current challenges and threats, to ensure proper protection of information of strategic importance to the state and collected, consolidated and stored by the defence forces. This article aims to identify problems of information security of defense forces in Ukraine to find ways of their elimination. Formal logical, systemic structural, comparative and legal methods were used to conduct the research. It is stated that by dividing the information space and cyber space, the legislator has laid down legal regulation of protection of the state's information space. It is understood that the Lithuanian and Latvian forces for combating threats to the information space were consolidated within the structure of the Ministry of Defence. Consequently, the authorities argue that the system of entities responsible for protecting the information space needs to be optimized, creating conditions for state-private cooperation in this area, as in the case of Germany, and providing these entities with qualified employees. The results obtained are important for research, law-making and law enforcement activities.


Keywords


Information Space; Cyberspace; Telecommunication Technology; Global Information System; State Security; Legal Regulation

Full Text:

PDF

References


Boes, S. and Leukfeldt, E.R. “Fighting cybercrime: a joint effort.†Cyber-Physical Security: Protecting Critical Infrastructure at the State and Local Level 3, (2017): 185-203.

Concept of military personnel policy in the Armed Forces of Ukraine until 2020. 2020. http://www.mil.gov.ua/divalnist/kadrova-politika/konczepcziya-kadrovoi-politiki-v-zbroinih-silah-ukraini/

Hapieieva, O. “Cyber security in the Baltic States: a historical retrospective.†Skhid 6, no. 152 (2017): 34–40.

Ministry of Defense of Ukraine. “Military standard. Information security of the state in the military sphere. Terms and definitions: VST 01.004.004 - 2019 (02).†2019. https://nuou.org.ua/assets/documents/VST %2001-004-002 2019.pdf

Nieles, Michael, Kelley Dempsey, and Victoria Yan Pillitteri. "An introduction to information security." NIST special publication 800, no. 12 (2017): 101. https://doi.org/10.6028/NIST.SP.800-12r1

Pelevina, E.S. “Political problems of international relations, global and regional development.†Theories and Problems of Political Studies 6, no. 1A (2017): 194-205.

President of Ukraine. “Decree No. 47/2017 on the Decision of the National Security and Defense Council of Ukraine as of December 29, 2016 on the Doctrine of Information Security of Ukraine as of February 25, 2017.†https://www.president.gov.ua/ documents/472017-21374

President of Ukraine. “Decree on the decision of the National Security and Defense Council of Ukraine as of September 2, 2015 on the new version of the Military Doctrine of Ukraine as of September 24, 2015.†2015. https://zakon.rada.gov.ua/laws/show/555/2015

President of Ukraine. “Decree on the Decision of the National Security and Defense Council of Ukraine as of March 4, 2016 on the Concept of Development of the Security and Defense Sector of Ukraine as of March 14, 2016.†2016. https://zakon.rada.gov.ua/ laws/show/92/2016#n12

President of Ukraine. “Decree on the Decision of the National Security and Defense Council of Ukraine of May 20, 2016 on the Strategic Defense Bulletin of Ukraine as of June 06, 2016.†2016. https://zakon.rada.gov.ua/laws/ show/240/2016#n10

Reznik, O., Getmanets, O., Kovalchuk, A., Nastyuk, V., and Andriichenko, N. “Financial security of the state.†Journal of Security and Sustainability Issues 9, no. 3 (2020): 843-852.

Seng, A.H.W. “Cyber-attacks and the roles the military can play to support the national cyber security efforts.†Pointer 42, no. 3 (2016): 27-37.

Suryaatmadja, Shannon, Vicia Sacharissa, and Konrardus Elias Liat Tedemaking. "The Space Rush: Reviewing Indonesia’s Space Law in Facing the Rise of Space Mining." Hasanuddin Law Review 6, no. 2 (2020): 125-141. http://dx.doi.org/10.20956/halrev.v6i2.2174

United Nations. “Transforming our World: The 2030 Agenda for Sustainable Development.†2015. https://sustainabledevelopment.un.org/content/documents/21252030%20Agenda%20for%20Sustainable%20Development%20web.pdf

Ustymenko, O.V. and Sarychev, Yu.O. “Information support for the system of strategic management of the defense forces.†Bulletin of the National Academy of Public Administration under the President of Ukraine 1, (2019): 11-17.

Vakulyk, O.O., Andriichenko, N.S., Reznik, O.M., Volik, V.V., and Yanishevska, K.D. “International aspect of a legal regulation in the field of financial crime counteraction by the example of special services of Ukraine and the CIS countries.†Journal of Legal, Ethical and Regulatory Issues 22, no. 1 (2019): 1-7.

Verkhovna Rada of Ukraine. “Law of Ukraine on the Fundamental Principles of Information Society Development in Ukraine for 2007-2015 as of January 09, 2007.†2007. https://zakon.rada.gov.ua/laws/show/537-16

Yaroshenko, O., Melnychuk, N., Moroz, S., Havrylova, O., and Yaryhina, Y.,“Features of Remote Work in Ukraine and the European Union: Comparative Legal Aspect,†Hasanuddin Law Review, 7, no. 3 (2021), 136-149. doi: http://dx.doi.org/10.20956/halrev.v7i3.3218




DOI: http://dx.doi.org/10.20956/halrev.v8i1.3582

Refbacks

  • There are currently no refbacks.




Hasanuddin Law Review (ISSN Online: 2442-9899 | ISSN Print: 2442-9880) is licensed under a Creative Commons Attribution 4.0 International License. Preserved in LOCKSS, based at Stanford University Libraries, United Kingdom, through PKP Private LOCKSS Network program.
 
Indexing and Abstracting:
 
  
 
View full indexing services.