Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
This article is devoted to the organizational and legal mechanisms of the cyber security public administration and cyber security in Ukraine, the definitions of essence, the role in the system of strategic planning and management of the security and defense sector are given. Some aspects of cyber se...
Saved in:
| Date: | 2020 |
|---|---|
| Main Authors: | Semenchenko, A.I., Pleskach, V.L., Zaiarnyi, O.A., Pleskach, M.V. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
PROBLEMS IN PROGRAMMING
2020
|
| Subjects: | |
| Online Access: | https://pp.isofts.kiev.ua/index.php/ojs1/article/view/419 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Problems in programming |
| Download file: | |
Institution
Problems in programmingSimilar Items
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)
by: Khudyntsev, Mykola, et al.
Published: (2025)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Neurosymbolic models for ensuring cybersecurity in critical cyberphysical systems
by: Yevdokymov, S.O.
Published: (2025)
by: Yevdokymov, S.O.
Published: (2025)
Cyber Resilience Key Metrics in Small and Medium-Sized Enterprises
by: Deruma, Sintija
Published: (2025)
by: Deruma, Sintija
Published: (2025)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)
by: Synitsyn, I.P., et al.
Published: (2018)
Improving the security of critical infrastructures through automated organizational management systems
by: Додонов, О. Г., et al.
Published: (2022)
by: Додонов, О. Г., et al.
Published: (2022)
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: A. I. Semenchenko, et al.
Published: (2020)
by: A. I. Semenchenko, et al.
Published: (2020)
Development of decision support system using OLAP-technologies for information security monitoring systems
by: Dashdamirova, K.Q.
Published: (2023)
by: Dashdamirova, K.Q.
Published: (2023)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Ontology-based semantic similarity to metadata analysis in the information security domain
by: Gladun, A.Y., et al.
Published: (2021)
by: Gladun, A.Y., et al.
Published: (2021)
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023)
by: Gorbatiuk, V.O., et al.
Published: (2023)
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)
by: Prysiazhniuk, M. M., et al.
Published: (2017)
Information security policy in the systems of information and analytical maintenance for support of organizational decisions
by: Churubrova, S.M.
Published: (2018)
by: Churubrova, S.M.
Published: (2018)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Armed conflict as an environmental risk factor at water supply facilities in еastern Ukraine (case study of “Voda Donbassa” utility company’s Siverskyi Donets – Donbas canal)
by: Buglak, Olexandra V., et al.
Published: (2019)
by: Buglak, Olexandra V., et al.
Published: (2019)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
Reputation-based secyrity for heterogtneous structurally complex systems
by: Kussul, O.M.
Published: (2015)
by: Kussul, O.M.
Published: (2015)
Directions of an Effective Development of Coal Industry With Provision For Energy Safety Requirements
by: Perov M.O., et al.
Published: (2014)
by: Perov M.O., et al.
Published: (2014)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
A Cross-Sectional Review of Energy Transition, Security and Climate Change Policies
by: Georgescu, Cătălina Maria, et al.
Published: (2025)
by: Georgescu, Cătălina Maria, et al.
Published: (2025)
Digital Technology Management and Resource Efficiency in Agricultural Production
by: Ismailov, Taner, et al.
Published: (2025)
by: Ismailov, Taner, et al.
Published: (2025)
Strategic Risk Management of Digital Transformation in the Economic Security of Industrial Enterprises
by: Ivanov, Mihail, et al.
Published: (2025)
by: Ivanov, Mihail, et al.
Published: (2025)
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013)
by: Yaremchuk, Yu. Е.
Published: (2013)
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013)
by: Iaremchuk, Iu. Е.
Published: (2013)
Resilience and stability in security
by: Мохор, В. В., et al.
Published: (2024)
by: Мохор, В. В., et al.
Published: (2024)
The Organization Based on Game Theory of Multipath Secure Data Communication
by: Кулаков, Ю. А., et al.
Published: (2012)
by: Кулаков, Ю. А., et al.
Published: (2012)
Researches of characteristics of domestic radiopaque fabrics H1, H2 and H3 with the use of different combinations of theirs
by: Yaremchuk, Yu. E., et al.
Published: (2016)
by: Yaremchuk, Yu. E., et al.
Published: (2016)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
EXPERIENCE IN USING HEAT STORAGES IN BLACKOUT CONDITIONS
by: Demchenko, Volodymyr, et al.
Published: (2023)
by: Demchenko, Volodymyr, et al.
Published: (2023)
Prediction of the levels of development of coal industry with regard for risks and critical phenomena in the structure of its productive potential in the global coal market
by: Bilan T.R., et al.
Published: (2019)
by: Bilan T.R., et al.
Published: (2019)
Optimisation of Agricultural Crop Allocation in Sustainable Biofuel Production and Energy Security Strategies
by: Tokarchuk, Dina, et al.
Published: (2026)
by: Tokarchuk, Dina, et al.
Published: (2026)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Integration of environmental safety into mechanisms for combating energy threats to residential buildings
by: Hamotskyi, Roman
Published: (2025)
by: Hamotskyi, Roman
Published: (2025)
Similar Items
-
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025) -
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024) -
Neurosymbolic models for ensuring cybersecurity in critical cyberphysical systems
by: Yevdokymov, S.O.
Published: (2025) -
Cyber Resilience Key Metrics in Small and Medium-Sized Enterprises
by: Deruma, Sintija
Published: (2025) -
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)