IMPROVEMENT OF THE CYBER PROTECTION OFTHE ARMED FORCES TAKING INTO ACCOUNT THE EXPERIENCE OF COUNTERING MILITARY CYBER ATTACKS OF THERUSSIAN FEDERATION IN 2022
Open Access
- 29 September 2022
- journal article
- Published by Borys Grinchenko Kyiv University in Cybersecurity: Education, Science, Technique
- Vol. 1 (17), 31-45
- https://doi.org/10.28925/2663-4023.2022.17.3145
Abstract
The article considers the possibilities of improving the cyber defense system of the Armed Forces of Ukraine and the Ministry of Defense of Ukraine in accordance with the goals and objectives defined in the decisions of the National Security and Defense Council of Ukraine and the Laws of Ukraine. A review of the requirements of normative documents on information and cyber security of Ukraine and similar documents of the United States of America was carried out. The considered algorithm for developing a risk management system in the direction of information security is outlined in the USA national standards. The scientific novelty of the work is that in the process of developing the risk management system in the information and communication systems (ICS) of the Armed Forces of Ukraine and the Ministry of Defense of Ukraine, it was proposed to create an decision support system that will be based on a specialized knowledge base capable of accumulating experience both during cyber-defense measures of the ICS and during the implementation of cyber-influences on the ICS of the enemy. An overview of open international standardization methods and relevant knowledge bases that can be used to update information on vulnerabilities and countermeasures in IC systems was carried out. The joint to use of open knowledge bases and specialized knowledge bases potentially can create new opportunities not only during cyber defense, but also during the implementation of cyber influences on the ICS of the enemy, therefore, this direction of research is promising and corresponds to the national interests of UkraineKeywords
This publication has 18 references indexed in Scilit:
- Design of a model for intellectual detection of cyber-attacks, based on the logical procedures and the coverage matrices of featuresUkrainian Scientific Journal of Information Security, 2016
- Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure SystemsPublished by National Institute of Standards and Technology (NIST) ,2016
- NATO Allied Joint Medical Publication 7: Allied Joint Medical Doctrine for Support to Chemical, Biological, Radiological, and Nuclear (CBRN) Defensive Operations, Final DraftPublished by Defense Technical Information Center (DTIC) ,2014
- Summary of NIST SP 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and OrganizationsPublished by National Institute of Standards and Technology (NIST) ,2014
- The Smarter Sentencing ActFederal Sentencing Reporter, 2013
- Information Security Continuous Monitoring (ISCM) for federal information systems and organizationsPublished by National Institute of Standards and Technology (NIST) ,2011
- Decision of the Constitutional Court of Ukraine in the Case of the Constitutional Petitions of Fifty-Two People's Deputies of Ukraine Regarding the Conformity to the Constitution of Ukraine (Constitutionality) of a Number of Decrees of the President of Ukraine Pertaining to the Activity of the National Security and Defense Council of Ukraine and of Fifty People's Deputies of Ukraine Regarding the Conformity to the Constitution of Ukraine (Constitutionality) of the Decree "On the Composition of the National Security and Defense Council of Ukraine" of the President of UkraineStatutes & Decisions, 2009
- Volume I :Published by National Institute of Standards and Technology (NIST) ,2008
- Performance measurement guide for information securityPublished by National Institute of Standards and Technology (NIST) ,2008
- Volume I :Published by National Institute of Standards and Technology (NIST) ,2008