Features for providing of cyber security
Modern onrush of information technologies, informatisation, computerisation and creation of global information space formed fundamentally new substances — information society, information- and cyberspace, which have inexhaustible potential and become instrumental in economic and social development o...
Saved in:
| Date: | 2017 |
|---|---|
| Main Authors: | Prysiazhniuk, M. M., Cyfra, E. I. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2017
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/126532 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)
by: Synitsyn, I.P., et al.
Published: (2018)
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)
by: Khudyntsev, Mykola, et al.
Published: (2025)
Features for providing of cyber security
by: M. M. Prysiazhniuk, et al.
Published: (2017)
by: M. M. Prysiazhniuk, et al.
Published: (2017)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: Давидюк, А. В., et al.
Published: (2021)
by: Давидюк, А. В., et al.
Published: (2021)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: Semenchenko, A.I., et al.
Published: (2020)
by: Semenchenko, A.I., et al.
Published: (2020)
Cyber Resilience Key Metrics in Small and Medium-Sized Enterprises
by: Deruma, Sintija
Published: (2025)
by: Deruma, Sintija
Published: (2025)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing.
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Cyber security of critical infrastructure during cyber warfare
by: Ya. S. Manuilov
Published: (2023)
by: Ya. S. Manuilov
Published: (2023)
Legal regulation of interaction between Security Service of Ukraine and a private sector in the field of providing cyber security
by: N. A. Tkachuk
Published: (2018)
by: N. A. Tkachuk
Published: (2018)
Neurosymbolic models for ensuring cybersecurity in critical cyberphysical systems
by: Yevdokymov, S.O.
Published: (2025)
by: Yevdokymov, S.O.
Published: (2025)
Current US experience in cyber security
by: S. M. Stezhko, et al.
Published: (2021)
by: S. M. Stezhko, et al.
Published: (2021)
The relationship between information security and cyber security
by: A. V. Tarasiuk
Published: (2019)
by: A. V. Tarasiuk
Published: (2019)
Problems of providing protection of cyber space from the activities of terrorist organizations
by: I. M. Ozerchuk
Published: (2021)
by: I. M. Ozerchuk
Published: (2021)
Cyber security graph model of information resources
by: A. V. Nesterenko, et al.
Published: (2020)
by: A. V. Nesterenko, et al.
Published: (2020)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014)
by: Nikiforova, L. O., et al.
Published: (2014)
Overview of novels of domestic legislation in the field of cyber security (on the example of the Cyber Security Strategy of Ukraine for 2021 – 2025)
by: Ya. S. Manuilov
Published: (2021)
by: Ya. S. Manuilov
Published: (2021)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
European experience of strengthening cyber security capacities in modern conditions
by: O. M. Kuznietsov
Published: (2021)
by: O. M. Kuznietsov
Published: (2021)
Corporate cyber security culture for scientific and research institutions
by: O. D. Dovhan, et al.
Published: (2018)
by: O. D. Dovhan, et al.
Published: (2018)
Securing Ukraine through Cyber Financial Crimes Mitigation
by: P. P. Debbins
Published: (2019)
by: P. P. Debbins
Published: (2019)
Combating cyber security threats on a global level
by: O. D. Dovhan, et al.
Published: (2020)
by: O. D. Dovhan, et al.
Published: (2020)
Cyber security as an important factor of ensuring the life of the domestic energy industry
by: S. M. Stezhko, et al.
Published: (2021)
by: S. M. Stezhko, et al.
Published: (2021)
Methods on determination of the output data for assessing residual risks with ensuring the confidentiality of information objects
by: Vasilenko, V. S., et al.
Published: (2017)
by: Vasilenko, V. S., et al.
Published: (2017)
Investigation of the factors of informal communication inside social networks for identification of agents carrying privacy threats
by: Nikiforova, L. A., et al.
Published: (2016)
by: Nikiforova, L. A., et al.
Published: (2016)
Network and economic component of financial cybersecurity indices
by: Turchynov, Oleksandr, et al.
Published: (2025)
by: Turchynov, Oleksandr, et al.
Published: (2025)
The essence and content of the investigation of cyber incidents and cyberattacks by the Security Service of Ukraine units
by: M. V. Kuleshov
Published: (2019)
by: M. V. Kuleshov
Published: (2019)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
Evaluation of Risks of Cyber Security of Information Systemsof Objects of Critical Infrastructure
by: V. V. Mokhor, et al.
Published: (2019)
by: V. V. Mokhor, et al.
Published: (2019)
Global culture of cyber security In the Syber Srime Rrevention System in Ukraine
by: O. D. Dovhan, et al.
Published: (2018)
by: O. D. Dovhan, et al.
Published: (2018)
Problems of legal regulation and development of cyber security of Ukraine at the current stage
by: O. V. Kostenko
Published: (2019)
by: O. V. Kostenko
Published: (2019)
Risk factor analysis of an example of an incident with global routing registry software
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
Development of Mechanism for Ensuring Economic Security by Efforts of Security Providers
by: I. P. Mihus, et al.
Published: (2015)
by: I. P. Mihus, et al.
Published: (2015)
Similar Items
-
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018) -
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025) -
Features for providing of cyber security
by: M. M. Prysiazhniuk, et al.
Published: (2017) -
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: Давидюк, А. В., et al.
Published: (2021) -
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)