INFORMATION SECURITY OF THE STATE
PDF/A

Keywords

Information security
Information threat
Motives for information protection
Criteria for data protection
Information warfare
Information terrorism

How to Cite

Bortnikova, O. ., Kashperska, D. ., Leonov, O. ., Rubel, K. ., & Chumak, O. . (2023). INFORMATION SECURITY OF THE STATE: MOTIVES, NECESSITY, AND SUFFICIENCY CRITERIA. Lex Humana (ISSN 2175-0947), 16(1), 1–19. Retrieved from https://seer.ucp.br/seer/index.php/LexHumana/article/view/2837

Abstract

The scientific study of the motives, the degree of necessity, and the criteria of sufficiency of state information security included several research areas. First of all, the authors established that state information security is a component of the national security of any country. This part of the work of state bodies has a regulatory and normative basis, a developed professional apparatus, and institutions that collect and disseminate information. Since the beginning of the development of digital technologies in the late XX - early XXI century, the world has experienced an information revolution. This revolution was made possible by the invention of the Internet and the expansion of the sphere of influence of actors on society and its interests, as well as on the perception of reality. The study establishes the chronology of the formation of information threats to the country and society by creating a model of growing danger and, accordingly, the reaction of the state and law enforcement agencies to increasing problems in an information space. The article identifies the motives for the formation of events defined in space and time due to information noise, information chaos, information fake, information warfare, and information terrorism. The authors outline the criteria for responding to each level of information threat with appropriate actions. In addition, they identify the requirements for the sufficiency of the state's response to information threats of various kinds, taking into account the following principles: legality, the primacy of international law over national legislation, property rights in the process of ensuring information security, economic feasibility of database protection, impartiality, and continuity. The level, scope, and extent of the state's defense of its population and society is still controversial. This can violate the rights and freedoms of people and citizens established by the state. The study was conducted using general and special methods. The general methods used include the dialectical method, which is based on fairness, comprehensive research, and the use of the systematic nature of scientific knowledge; the logical method in presenting materials; the functional method in combining parts of the study with its main topic; the systemic and structural method in forming integral parts of hypothesis proof. Special methods of scientific knowledge include: historical method when studying the sequential development of information threats; the method of system analysis when comparing information threats and the state response to their elimination; generalization of regulatory and practical materials when conducting research.

PDF/A

References

Bondar, Yu. (2011). Freedom of speech as a factor in information security. The Actual problems of international relations. International Information Security: Contemporary Concepts and Practices. 102(Part I). Kyiv. 127-129.

Budagovska, S., Kilievich, O. (1998). Microeconomics and macroeconomics, Kyiv, Osnovy, 910 p.

Concept of development of state information infrastructure. Official website of the State Committee for Communication and Informatization of Ukraine. Available at: http://www.stc.gov.ua/info/ (access date: 09/22/2023).

The doctrine of information security of Ukraine, (2017). App. By Decree of the President of Ukraine dated February 25, 2017, 47/2017. Available at: https://www.president.gov.ua/documents/472017-21374 (access date: 09/21/2023).

Knyazev, V., Bakumenko, V. (2000). Philosophical and methodological foundations of state-management decisions. Bulletin of the Ukrainian Academy of Sciences, 2, 341-357.

Kobko, E. (2019). Information security in the national security system: modernity and prospects. National Law Journal: Theory and Practice, 3, 46-50.

Kolesnyk, V. T. (2015). Conceptual model of national security of Ukraine. Imperatives of civilization development. Information security in the military sphere. Current state and development prospects: materials of the international scientific and practical conference, Kyiv, March 31, 2015. National. The University of Defense named after Ivan Chernyakhovskyi. K.: FOP OS Lipkan, p. 167-170.

Kolyadenko, V. A. (2002). Information and communication technologies as a factor of political modernization: thesis abstract for the degree of Candidate of Political Sciences: specialty 23.00.02 "Political institutions and processes," Odesa, 23 p.

Krynina, O. Yu. (2009). Definitions of the term "information war". New technologies, 3, 68-70.

Lukyanova, V., Lautar, A. (2013). Information security in the context of the development of information systems. Bulletin of the Khmelnytskyi National University. Series "Economic Sciences", 2(3), 97-101.

Lyubokhinets, L. S., Poplavska, O. V. (2017). The world practice of ensuring information security in the modern globalized environment. Business navigator, 4-1, 93-97.

Moskalenko, A. (1998). Theory of journalism, Kyiv, 320 p.

Nychiporchuk, N. Vozniuk, E. (2018). The secret of the US success in the field of information security. International relations, public communications, and regional studies. 1(3), 66-71.

Oliynyk, O. V. (2012). Principles of ensuring information security of Ukraine. Scientific Bulletin of Uzhhorod University,"Law" series, 18, 170-173.

On the Basic Principles of Information Society Development in Ukraine for 2007-2015, (2007), Law of Ukraine dated January 9(537-V). Information of the Verkhovna Rada of Ukraine, 12(102).

On the Cybersecurity Strategy of Ukraine (2021). The decision of the National Security and Defense Council dated 05/14/2021. Available at: https://www.president.gov.ua/documents/4472021-40013 (access date: 09/21/2023).

On the main principles of ensuring cyber security of Ukraine (2017), Law of Ukraine No. 2163-VIII of October 5, 2017 (revision dated August 17, 2022). Information of the Verkhovna Rada of Ukraine. 45(403). Available at: https://zakon.rada.gov.ua/laws/show/2163-19#Text (access date: 09/21/2023).

On the Strategy of Economic Security of Ukraine for the period until 2025 (2021). Decree of the President of Ukraine, 347/2021 dated August 11. Available at: https://zakon.rada.gov.ua/laws/show/347/2021#Text (access date: 09/21/2023).

On the Sustainable Development Strategy "Ukraine - 2020": Decree of the President of Ukraine dated January 12, 5/2015. Available at: www.zakon.rada.gov.ua/go/5/2015 (access date: 09/22/2023).

Pocheptsov, H. G. (1999). Introduction to information wars. Kyiv University, Kyiv, 60 p.

Pocheptsov, H. G. (2001). Information & disinformation, Elga, Kyiv, 256 p.

Pocheptsov, H. G., Chukut, S. L. (2002). Information policy: Education. Manual, Part 1, UASU, Kyiv, 96 p.

Regarding the implementation of a unified information policy in the conditions of martial law. (2022). The decision of the National Security and Defense Council of Ukraine dated March 18, 2022: Decree of the President of Ukraine dated March 19, 152/2022. Available at: https://zakon.rada.gov.ua/go/152/2022 (access date: September 21, 2023 ).

Vetrov, K. Voznyuk, Y. (2019). Information Terrorism as a Modern Threat to Information Security of European States. International relations, public communications, and regional studies. 1(5), 34-42.

Vozniuk, E. (2021). SWOT-analysis of the state of information security of Ukraine. Scientific journal of the NPU named after M.P. Drahomanova. Series 22. Political science and teaching methods of socio-political disciplines, 22(30). Available at: https://doi.org/10.31392/pnspd.v22i30.1147

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Copyright (c) 2023 Lex Humana (ISSN 2175-0947)

Downloads

Download data is not yet available.