DOI QR코드

DOI QR Code

State Management of the Development of National Cybersecurity Systems

  • 투고 : 2022.05.05
  • 발행 : 2022.05.30

초록

The main purpose of the study is to determine the main elements of the state management of the development of national cybersecurity. Cybersecurity ensures the protection of the properties of information resources and the operability of technical and software users and is directed against relevant cyber incidents. Therefore, today it is impossible to ignore the importance of public administration of the processes taking place in it. The methodological support of our study is determined by its goals and objectives and is based on the use of a combination of general scientific and special methods of scientific knowledge, which ensured the completeness and reliability of the results obtained. The article has limitations and concerns the lack of practical implementation of the research results. The study is purely theoretical to reflect the main aspects of the modern system of state management of the development of national cybersecurity. Further research requires an analysis of the world experience of state management of the development of national cybersecurity.

키워드

참고문헌

  1. Gordieiev, O., Kharchenko, V., Illiashenko, O., Morozova, O., Gasanov, M. Concept of using eye tracking technology to assess and ensure cybersecurity, functional safety and usability. International Journal of Safety and Security Engineering, Vol. 11, No. 4, 2011, pp. 361-367. https://doi.org/10.18280/ijsse.110409
  2. Kryshtanovych, M., Petrovskyi, P., Khomyshyn, I., Bezena, I., & Serdechna, I. Peculiarities of implementing governance in the system of social security. Business, Management and Economics Engineering, 2020, 18(1), 142-156. https://doi.org/10.3846/bme.2020.12177 .
  3. Ismail A., Saad M., Abbas R. Cybersecurity in internet of things, Review of Computer Engineering Studies, Vol. 5, No. 1, 2018, pp. 17-22. https://doi.org/10.18280/rces.050104
  4. Kryshtanovych M., Britchenko I., Losonczi P., Baranovska T., Lukashevska U. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents. International Journal of Computer Science and Network Security. Vol. 22 2022, No. 4 pp. 33-38. https://doi.org/10.22937/IJCSNS.2022.22.4.5
  5. Sylkin, O., Kryshtanovych, M., Bekh, Y., & Riabeka, O. Methodology of forming model for assessing the level financial security . Management Theory and Studies for Rural Business and Infrastructure Development, 2020, 42(3), 391-398. https://doi.org/10.15544/mts.2020.39
  6. Kryshtanovych, S., Gutsulyak, V., Huzii, I., Helzhynska, T., & Shepitchak, V. Modeling the process of risk management response to the negative impact of risks as the basis for ensuring economic security. Business, Management and Economics Engineering, 2021, 19(2), 289-302. https://doi.org/10.3846/bmee.2021.14798
  7. Kryshtanovych, S., Treshchov, M., Durman, M., Lopatchenko, I., & Kernova, M. Gender parity in public administration in the context of the development of european values in the management system. Financial and Credit Activity: Problems of Theory and Practice, 2021, 4(39), 475-481. https://doi.org/10.18371/.v4i39.241416
  8. Petroye, O., Lyulyov, O., Lytvynchuk, I., Paida, Y., Pakhomov, V. Effects of information security and innovations on country's image: Governance aspect. International Journal of Safety and Security Engineering, Vol. 10, No. 4, 2020, pp. 459-466. https://doi.org/10.18280/ijsse.100404
  9. Lainjo, B. Network security and its implications on program management. International Journal of Safety and Security Engineering, Vol. 10, No. 6, 2020, pp. 739-746. https://doi.org/10.18280/ijsse.100603
  10. Yasmin, M., Sohail, A.; Sarkar, M., & Hafeez, R. Creative methods in transforming education using human resources. Creativity Studies, 10(2), 2017, 145-158. https://doi.org/10.3846/23450479.2017.1365778
  11. Gandhi, R., Sharma, A., Mahoney, W., Sousan, W., Zhu, Q., Laplante, P. Dimensions of cyber-attacks: Cultural, social, economic, and political. IEEE Technology and Society Magazine, 2011, 30(1): 28-38. https://doi.org/10.1109/MTS.2011.940293
  12. Jarvis, L., Macdonald, S., Nouri, L. The cyberterrorism threat: Findings from a survey of researchers. Studies in Conflict & Terrorism, 37(1): 2014, 68-90. https://doi.org/10.1080/1057610X.2014.853603
  13. Thijittang, S. A study of pragmatic strategies of English of Thai University students: Apology speech acts. University of Tasmania. 2010.https://eprints.utas.edu.au/10754/7/Thijittang_whole_thesis.pdf
  14. Hutchings, A. Crime from the keyboard: organised cybercrime, co-offending, initiation and knowledge transmission. Crime, Law and Social Change, 62(1): 2014, 1-20. https://doi.org/10.1007/s10611-014-9520-z .
  15. Luo, H.N. An emergency management system for government data security based on artificial intelligence. Ingenierie des Systemes d'Information, Vol. 25, No. 2, 2020, pp. 207-213. https://doi.org/10.18280/isi.250208