scholarly journals The objectified procedure and a technology for assessing the state of complex noise speech information protection

2018 ◽  
Vol 5 (9 (95)) ◽  
pp. 26-34 ◽  
Author(s):  
Volodymyr Blintsov ◽  
Sergey Nuzhniy ◽  
Liubomyr Parkhuts ◽  
Yurii Kasianov
2005 ◽  
Vol 64 (3) ◽  
pp. 227-237
Author(s):  
A. V. Zhizhelev ◽  
S. V. Zhilinskii ◽  
A. V. Klyshevskii ◽  
S. A. Golovin

Author(s):  
Olha Husak

The article aims at defining the competence-based approach to training the future professionals in communication security and development of the advanced fields of their high-qualitative training. The main results of the study are represented in the list of specialists’ professional competencies in the field of communication security, which includes: capability to identify communication threats; peculiarities of civilized, manipulative and barbaric influences at the state, corporate and personal levels; categories of manipulators, types of manipulative traps, existing manipulative techniques; capability for using effective means to neutralize or counteract to manipulative influences; skills required for organization, planning and implementation of one’s actions in terms of information attacks; acquisition of communicative, organizational and technical methods of information protection in the existing information systems and networks.


Author(s):  
К. В. К. В. Захаренко

In our state there are a number of complex problems in the field of information security that require urgent and radical solution. That’s why theoretical, methodological and political research of the problem of information security in Ukraine, which is experiencing a crisis phase of its development, is becoming especially relevant today. In order to develop an effective system of national information security, a detailed study of the experience of the leading countries of the world, which carry out effective information protection of their states and citizens, is necessary. Today there are national information security systems that have really proven their effectiveness and structural and functional perfection. Indeed, the successful development of a democratic state and civil society is possible only if the information resources are properly used and the state policy is implemented, which would ensure a high level of national information security. In the modern world, the basic principles and tools for the formation of effective information protection of the national security space have been developed already. At the same time, Ukraine needs to apply adequately the foreign experience of the most successful countries in this regard, correctly transforming it taking into account national specificity and the unique role of Ukraine in modern geopolitics. As an important indicator of the protection of citizens, society and state, information security is an integral part of national security. Therefore, its determination mainly focuses on preventing harmful effects that may result in various information threats, as well as eliminating and overcoming those effects with the least possible harm to society and humans. In this aspect, the study of not only the philosophical and phenomenological and socio-psychological determinants of information security of citizens, but also political and legal resources and mechanisms of protection of the information space of the state in the conditions of the functioning of the global information society acquires a special significance. А content analysis of the notion «information security» as a form of national security aimed at ensuring human rights and freedoms in relation to free information access, creation and implementation of secure information technologies and protection of the property rights of all participants of information activities, includes consideration of possible diversions in this area, especially at the international level. Today there is a situation of incompleteness of formation and fragmentary filling of the information space content of the country and the legislative base in our society. The efficiency of the information weapon itself has increased too quickly due to the rapid information circulation and the spread of information networks. As a result, mass media forms the «mass» person of our time, in turn this fact displaces traditional direct contacts, by dissociating people and replacing them by computers and television. At the same time it gives rise to apathy, uncritical attitude and indifference, it complicates the adequate orientation, causing the social disorientation. Informative safety has the human measuring. Therefore an important role in opposition to destructive external and internal informative influences is played by education of citizens. Her proper level called to provide the state and civil society. An in fact uneducated population easily is under destructive influence of informative threats of the modern global world. Unfortunately, Ukraine, does not have sufficient resources and technologies for adequate opposition to the external threats. Taking into account it strategy of forming of the national system of informative safety of our state can be only the maximal leveling of destructive influences from the side of external informative threats. To the end it is necessary to carry out democratic reforms Ukraine, generate civil society, to provide functioning of the legal state and increase of political and civil culture of population. At the same time it is necessary to bear reformers in a mind, that global nature of informative society predetermines rapid transformation of external threats in internal, converting them into permanent calls which are opened out within the limits of national in a civilized manner-informative and socio-political space. Besides modern global informative systems, mass medias, network facilities do a limit between external and internal threats almost unnoticeable.


Author(s):  
Iryna Sopilko

The study gives definitions of information security and related terms, such as cybersecurity, national security, and others, indicates the goals, objects, subjects of the concepts under consideration. The author also considers the features of the foundation and development of the information society in Ukraine, the components of its state information policy for ensuring information security, and identifies the key operations of activity of state bodies in the information sphere. The approaches of scientists who studied certain aspects of national and information security were analyzed, based on their work valuable conclusions were drawn and the conceptual basis of the article was formed. Independently, the definition and characteristics of external and internal threats to the information security of the country are given, methods for solving the problems arising in this connection are introduced, ways of ensuring the information security of the state are indicated. Information security in this study is considered as the central element of the national security of Ukraine, as well as a problematic issue in the field of information protection and ensuring the high-quality functioning of the information space. The author made an in-depth analysis of the existing regulatory and legal instruments for ensuring information security, pointed out their shortcomings, and gave recommendations for their further advancement. Also, recommendations are given to improve the current situation with the regulation of information security in the country, the directions of the state information policy are suggested and ways to ensure the continuity of the functioning of the information security system of Ukraine are indicated.


2021 ◽  
Vol 39 (6) ◽  
Author(s):  
Olena Yu. Sova ◽  
Liudmyla A. Kyslova ◽  
Liliia V Semkova ◽  
Lyudmila Yu. Krasavtceva ◽  
Tetiana B. Samonova

The development of the information sphere and the corresponding increase in its volume and cost is accompanied by the introduction of advanced information technologies in all spheres of public life of the state, which leads to an increase in the frequency of attacks and potential losses from information leakage. As a result, the complexity of protection systems and an increase in their cost. In these conditions, the task to efficiently distribute limited financial resources to protect the information of business entities becomes more and more important and largely determines the level of financial and economic security of the enterprise and the state as a whole. Of particular relevance is the development of issues of optimisation of indicators of the information security system in a dynamic confrontation. Such indicators can be the amount of damage caused from the implementation of information threats, which determines the effectiveness of the protection system, the profit from making investments in information protection, their profitability, and the like. It was established that it is necessary to determine the total amount of protection resources, which minimises the total losses from possible information leakage in conditions of instability. The authors believe that the optimal control mechanism is the distribution of resources between objects that contain a different share of information and are distinguished by natural security, dynamic vulnerability, and the probability of an attack with the allocation of a certain amount of resources. The practical significance of the study lies in determining the optimal moment for the introduction of defence resources – after the direction and intensity of attacks and, accordingly, the possible level of losses was clarified.


Author(s):  
Alina Yakymchuk ◽  
Victoria Yaroshchuk

The main objectives of the state policy in the field of information, which is the reason for the creation of appropriate conditions for achieving this goal were definited. In particular, coordination of the central executive authorities to address the problems of information, execution of functions of the general state of the customer National Informatization Program projects, the organization of international cooperation in matters of information and the like. The state policy of information covers the entire complex of relations that arise: in the creation, collection, storage, processing, storage, retrieval and dissemination of information; in the preparation and use of information and information resources; while ensuring the sovereignty of information, information security and information protection.


Doklady BGUIR ◽  
2019 ◽  
pp. 66-71
Author(s):  
Y. N. Seitkulov ◽  
S. N. Boranbayev ◽  
A. V. Patapovich ◽  
H. V. Davydau

Sign in / Sign up

Export Citation Format

Share Document