The relationship between information security and cyber security
Saved in:
| Date: | 2019 |
|---|---|
| Main Author: | A. V. Tarasiuk |
| Format: | Article |
| Language: | English |
| Published: |
2019
|
| Series: | Information and law |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001065987 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Cyber security graph model of information resources
by: A. V. Nesterenko, et al.
Published: (2020)
by: A. V. Nesterenko, et al.
Published: (2020)
Corporate cyber security culture for scientific and research institutions
by: O. D. Dovhan, et al.
Published: (2018)
by: O. D. Dovhan, et al.
Published: (2018)
Combating cyber security threats on a global level
by: O. D. Dovhan, et al.
Published: (2020)
by: O. D. Dovhan, et al.
Published: (2020)
Cyber security of critical infrastructure during cyber warfare
by: Ya. S. Manuilov
Published: (2023)
by: Ya. S. Manuilov
Published: (2023)
Features for providing of cyber security
by: M. M. Prysiazhniuk, et al.
Published: (2017)
by: M. M. Prysiazhniuk, et al.
Published: (2017)
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)
by: Prysiazhniuk, M. M., et al.
Published: (2017)
Global culture of cyber security In the Syber Srime Rrevention System in Ukraine
by: O. D. Dovhan, et al.
Published: (2018)
by: O. D. Dovhan, et al.
Published: (2018)
Evaluation of Risks of Cyber Security of Information Systemsof Objects of Critical Infrastructure
by: V. V. Mokhor, et al.
Published: (2019)
by: V. V. Mokhor, et al.
Published: (2019)
Current US experience in cyber security
by: S. M. Stezhko, et al.
Published: (2021)
by: S. M. Stezhko, et al.
Published: (2021)
Legal regulation of interaction between Security Service of Ukraine and a private sector in the field of providing cyber security
by: N. A. Tkachuk
Published: (2018)
by: N. A. Tkachuk
Published: (2018)
Overview of novels of domestic legislation in the field of cyber security (on the example of the Cyber Security Strategy of Ukraine for 2021 – 2025)
by: Ya. S. Manuilov
Published: (2021)
by: Ya. S. Manuilov
Published: (2021)
Advanced information technologies for the training of cyber defence specialists of the security and defence sector of Ukraine
by: O. M. Bashkyrov, et al.
Published: (2024)
by: O. M. Bashkyrov, et al.
Published: (2024)
Securing Ukraine through Cyber Financial Crimes Mitigation
by: P. P. Debbins
Published: (2019)
by: P. P. Debbins
Published: (2019)
European experience of strengthening cyber security capacities in modern conditions
by: O. M. Kuznietsov
Published: (2021)
by: O. M. Kuznietsov
Published: (2021)
Problems of legal regulation and development of cyber security of Ukraine at the current stage
by: O. V. Kostenko
Published: (2019)
by: O. V. Kostenko
Published: (2019)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: I. O. Dohtieva, et al.
Published: (2021)
by: I. O. Dohtieva, et al.
Published: (2021)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
Cyber security as an important factor of ensuring the life of the domestic energy industry
by: S. M. Stezhko, et al.
Published: (2021)
by: S. M. Stezhko, et al.
Published: (2021)
Russian informational aggression: the challenge to democracy and the national security of Ukraine
by: V. M. Tarasiuk
Published: (2018)
by: V. M. Tarasiuk
Published: (2018)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
Researching the Relationship between Conflict Situations and Threats to the Enterprise's Personnel Security
by: A. V. Semenchenko, et al.
Published: (2018)
by: A. V. Semenchenko, et al.
Published: (2018)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
The essence and content of the investigation of cyber incidents and cyberattacks by the Security Service of Ukraine units
by: M. V. Kuleshov
Published: (2019)
by: M. V. Kuleshov
Published: (2019)
Information technology protection and cyber security (transcript of scientific report at the meeting of the Presidium of NAS of Ukraine, September 25, 2019)
by: M. M. Savchuk
Published: (2019)
by: M. M. Savchuk
Published: (2019)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: A. V. Davydiuk, et al.
Published: (2021)
by: A. V. Davydiuk, et al.
Published: (2021)
The Relationship Between Public Welfare and Information
by: I. V. Voronenko
Published: (2019)
by: I. V. Voronenko
Published: (2019)
Some issues of improving state planning in the sphere of cyber security in conditions of hybrid threats
by: S. M. Hriboiedov
Published: (2021)
by: S. M. Hriboiedov
Published: (2021)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: Давидюк, А. В., et al.
Published: (2021)
by: Давидюк, А. В., et al.
Published: (2021)
Conceptual Relationships between the Systems of Ensuring the Economic Security of the State and the Implementation of the State Policy of Import Substitution
by: R. L. Lupak, et al.
Published: (2017)
by: R. L. Lupak, et al.
Published: (2017)
Operational analytics as a data monitoring and event management tool of the cyber security management systems
by: A. B. Kachynskyi, et al.
Published: (2021)
by: A. B. Kachynskyi, et al.
Published: (2021)
A mathematical model of cyber security computer network control in power supply of traction substations
by: O. I. Stasiuk, et al.
Published: (2017)
by: O. I. Stasiuk, et al.
Published: (2017)
Information security as an object of crime
by: A. V. Landina
Published: (2016)
by: A. V. Landina
Published: (2016)
Information threats and security services
by: Antonyuk, A.A., et al.
Published: (2015)
by: Antonyuk, A.A., et al.
Published: (2015)
Legal relationship concerning issue and placement of securities within the system of civil legal relationship
by: O. I. Vyhovskyi
Published: (2018)
by: O. I. Vyhovskyi
Published: (2018)
Standardization in information technology security
by: A. M. Fal
Published: (2017)
by: A. M. Fal
Published: (2017)
Methods for assessing the cyber¬security of distributed computer networks of control of electricity consumption of power supply distances
by: A. I. Stasjuk, et al.
Published: (2017)
by: A. I. Stasjuk, et al.
Published: (2017)
Information in the natural cyber systems (to definition of the term information)
by: Ja. Reshetnik
Published: (2020)
by: Ja. Reshetnik
Published: (2020)
Computer Security at Ukrainian Nuclear Facilities: Interface between Nuclear Safety and Security
by: D. V. Chumak, et al.
Published: (2015)
by: D. V. Chumak, et al.
Published: (2015)
Taxonomy of information security standards
by: Ya. Hladun, et al.
Published: (2017)
by: Ya. Hladun, et al.
Published: (2017)
Human rights and national security: philosophical and legal aspects of the relationship
by: O. P. Dzoban, et al.
Published: (2020)
by: O. P. Dzoban, et al.
Published: (2020)
Similar Items
-
Cyber security graph model of information resources
by: A. V. Nesterenko, et al.
Published: (2020) -
Corporate cyber security culture for scientific and research institutions
by: O. D. Dovhan, et al.
Published: (2018) -
Combating cyber security threats on a global level
by: O. D. Dovhan, et al.
Published: (2020) -
Cyber security of critical infrastructure during cyber warfare
by: Ya. S. Manuilov
Published: (2023) -
Features for providing of cyber security
by: M. M. Prysiazhniuk, et al.
Published: (2017)