DOI: https://doi.org/10.33099/2311-7249/2020-37-1-31-48

Experience of development of cyber security systems and cyber defense foreign states

Сергій Григорович Вдовенко, Юрій Григорович Даник, Олександр Юрійович Пермяков

Abstract


The rapid development and widespread adoption of electronics, modern information and cyber technologies have led to the emergence of a new range of national security and defense risks and threats that are being implemented in cyberspace and (or) across cyberspace. There is a rapid growth of information and automation of all spheres of human activity, the amount of information stored, processed and transmitted, the speed of its transmission and processing, the complexity of control systems, the interaction between them and the links between management processes. Cyber threats cover all basic spheres of public activity (political, military, legal, economic, energy, infrastructure, social, spiritual, technological, etc.), destructively affecting national security as a whole.More than 60 countries, international (EU) and military-political alliances (NATO), international security organizations (OSCE) are focusing considerable efforts on providing capabilities to detect, prevent, neutralize and eliminate cyberspace threats in a timely manner, in particular in the field of defense.The results of the article are presented: analysis of the existing cyber security and cyber defense systems of the leading countries in the context of the possibility and expediency of implementing their experience in Ukraine; analysis of the prerequisites, current status and problems of the formation of cyber security and cyber defense systems in Ukraine, as well as the required level of their comprehensive provision; development of basic theoretical and applied provisions for the formation of cyber security and cyber defense systems in Ukraine.

Keywords


Critical Infrastructure; Cyberspace; Cyber Defense; Cyber Defense System; Cyber Security; Cyber Defense Entities; Cyber Security Entities; Cybersecurity System; Cyberthreat

References


1. V. Buryachok, G. Hulak, V. Khoroshko. Tasks, Forms and Methods of War in Cybernetic Space - K .: Science and Defense №3 - 2011, p.35-42.

2. E. Zhivilo O., O.Chernohog. Cyber Defense Strategy of Ukraine - K .: VITI № 4 - 2017, p. 30-37

3. V. Lipkan, I. Diordica. The National Cyber Security System as an Integral Part of the National Security System of Ukraine - K.: Business, Economy and Law №5– 2017, p. 174-180.

4. I.Gorbenko, A.Zamula, Ye.Semenko. Ensemble and correlation properties of cryptographic signals for telecommunication system and network applications - Kharkiv/ Telecommunications and Radio Engineering. – 2016. – Vol. 75. – Issue 2. – P. 169–178.

I.Gorbenko, O.Zamula. Models and methods of synthesis of cryptographic signals and their optimization by the criterion of time complexity - Kharkiv - Mathematical and computer simulation. Series: Physical and Mathematical Sciences - 2017. Issue 15. p.43-49 - [Electronic resource]. Access mode: http://nbuv.gov.ua/UJRN/Mtkm_fiz_mat_2017_15_10

6 . Yu.Danik, S.Vdovenko. Problems and Prospects of Providing Cyber Defense to the State of K.: MIKNU, Issue 66, 2020 - P. 56-72.

7. Yu. Danik. High-tech aspects of national security and defense. K.: Military Communications. Telecom. October 2018 p. 58-69

8. G. Liddell. Indirect Action Strategy - M .: IL - 1957.

9. DoD C4ISR Cooperative Research Program Assistant Secretary of Defense (C3I) Mr. Arthur L. Money Special Assistant to the ASD (C3I). [Electronic resource]. Access mode:: http://dodccrp.org/files/Alberts_NCW.pdf

10. Warden, John A. III (September 1995), Chapter 4: Air theory for the 21st century, Battlefield of the Future: 21st Century Warfare Issues.

11. Bryant D.J. Critique, Explore, Compare and Adapt (CECA): A New Model for Command Decisionmaking. Defence R&D Toronto Technical Report, DFDC, Toronto TR, 2003. 63 p.

12. DoD C4ISR Cooperative Research Program Assistant Secretary of Defense (C3I) Mr. Arthur L. Money Special Assistant to the ASD(C3I). [Electronic resource]. Access mode: http://dodccrp.org/files/Alberts_NCW.pdf

13. L.Polishchuk, S.Bogutsky M. Current Trends in the Development of Armed Forces Management Systems in Leading Countries of the World - VITI - 2014, p.42-46

14. Warsaw Summit Communiqué. Issued by the Heads of State and Government participating in the meeting of the North Atlantic Council in Warsaw 8-9 July 2016 09 Jul. 2016 – 2016, 100

15. National Security Strategy of Ukraine, approved by Presidential Decree No 287/2015 of May 26, 2015.

16. S.Neema. Symbiotic Design for Cyber Physical Systems. Defense Advanced Research Projects Agency Program Information. [Electronic resource]. Access mode: https://www.darpa.mil/program/symbiotic-design-for-cyber-physical-systems.

17. S.Vodovenko, Y.Danik. Conceptual directions of complex solution of the problem of protection against unauthorized access in complex systems of special purpose. Vinnitsa, VNPU - 2017, p. 61 - 64.

18. Yu.Danik, S.Vdovenko. Chain effects in cyberdias. Proceedings of the Military Institute of the Taras Shevchenko National University of Kyiv, issue 64- 2019 - P. 56-71.

19. [Electronic resource]. Access mode: https://www.usna.edu/wrc/cpsl/index.php, https://thebabel.com.ua/news/41889-ssha-rozgortayut-protidronovi-lazerni-sistemi-na-zarubizhnih-bazah, https://defence-ua.com/index.php/statti/2245-vyprobuvannya-bpla-6-ho-pokolinnya-ssha-pokazaly-mistse-rosiyi, http://www.nanonewsnet.ru/news/2017/kitaitsy-obedinili-v-stayu-tysyachu-dronov, https://lb.ua/world/2015/11/17/321192_britaniya_sozdast_spetsialnie.html, http://www.lefigaro.fr/international/l-armee-se-dote-de-56-microrobots-de-reconnaissance, https://www.linkedin.com/company/national-security-agency?trk=similar-pages_result-card_full-click, https://www.cybercom.mil/About/Mission-and-Vision/ https://www.cybercom.mil/, https://www.cybercom.mil/About/Leadership/Bio-Display/Article/1512978/commander-uscybercom/, https://en.wikipedia.org/wiki/United_States_Cyber_Command, https://military.wikia.org/wiki/Second_United_States_Armyhttps://www.globalsecurity.org/military/agency/usaf/afcyber htm, https://www.public.navy.mil/fcc-c10f/Pages/home.aspx, https://www.navy.mil/local/fccc10f/ https://www.armed-services.senate.gov/imo/media/doc/Gilday_05-23-17.pdf, https://www.candp.marines.mil/Organization/Operating-Forces/US-Marine-Corps-Forces-Cyberspace-Command/https://www.epravda.com.ua/news/2018/10/23/641908/ https://www.rbc.ua/rus/news/ssha-proveli-kiberataku-iranskie-raketnye-1561260168.html https://lexinform.com.ua/v-sviti/ssha-pochaly-kiberoperatsiyu-proty-rosiyi/ https://www.arcyber.army.mil/, https://www.fifthdomain.com/dod/cybercom/2019/07/25/what-the-future-holds-for-cyber-command/

20. Moore, Gordon E. (1965). Cramming more components onto integrated circuits, Electronics Magazine. с. 4 [Electronic resource]. Access mode: https://newsroom.intel.com/wp-content/uploads/sites/11/2018/05/moores-law-electronics.pdf

21. Moore, Gordon E. No Exponential is Forever: But “Forever” Can Be Delayed!, International Solid-State Circuits Conference 2003 / SESSION 1 / PLENARY / 1.1 -2003. [Electronic resource]. Access mode: https://ieeexplore.ieee.org/document/1234194

22. Kurzweil, Ray -2005. The Singularity Is Near. When Humans Transcend Biology. Penguin Books [Electronic resource]. Access mode: http://stargate.inf.elte.hu/~seci/fun/Kurzweil/ Ray_Singularity_Near_The_hardbac_ed_Bv1._D.pdf

23. Recently discovered phenomenon could provide a way to bypass the limits to Moore's Law. [Electronic resource]. Access mode: https://phys.org/news/2017-10-phenomenon-bypass-limits-law.html

24. V. Begma, V. Shemaev. Technology development in the world's leading countries. Lessons for Ukraine. [Electronic resource]. Access mode: https://defence-ua.com/index.php/statti/publikatsiji-partneriv/8982-rozvytok-tekhnolohiy-u-providnykh-krayinakh-svitu-uroky-dlya-ukrayiny

25. Network Centric Warfare Market by Platform (Land, Air, Naval, Unmanned), Application (ISR, Communication, Computer, Cyber,Combat, Control & Command), Mission Type, Communication Network, Architecture, and Region - Global Forecast to 2021. [Electronic resource]. Access mode: https://www.marketresearch.com/MarketsandMarkets-v3719/Network-Centric-Warfare-Platform-Land-10188278/

26. BMC4ISR means Battle Management/Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance. [Electronic resource]. Access mode: http://acronymsandslang.com/definition/24656/BMC4ISR-meaning.html

27. Summit Meeting of NATO Heads of State and Government - Lisbon, Portugal, 19-20 Nov 2010. [Electronic resource]. Access mode: https://www.nato.int/cps/en/natolive/events_66529.htm

28. S.Vodovenko, Y. Danik, S. Pharaoh. Definitional problems of terminology in cybersecurity and cyber defense and ways of solving them. - Kharkiv: KhNU. VN Karazin - 2019, No.1 (12). [Electronic resource]. Access mode: https://doi.org/10.26565/2519-2310-2019-1-02

29. DOD Dictionary of Military and Associated Terms As of January 2020. [Electronic resource]. Access mode: https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdfhttps://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdf

30. DOD. Joint Publication 3-12, Cyberspace Operations, 8 June 2018/. [Electronic resource]. Access mode: https://fas.org/irp/doddir/dod/jp3_12.pdf 31. Statement by lieutenant general Paul M. Nakasone Commander United States Army Cyber Command before the Subcommittee on Cybersecurity Committee on Armed Services United States Senate second session, 115th congress May 23, 2017. [Electronic resource]. Access mode:https://www.armed-services.senate.gov/imo/media/doc/Nakasone_05-23-17.pdf.

32. International Strategy For Cyberspace: Prosperity, Security and Openness in a Networked World. Washington DC: The White House, May 2011. [Electronic resource]. Access mode: http://www.whitehouse.gov/sites/default/files/rss_viewer/internationalstrategy cyberspace.pdf

33. Secretary of State Hillary Rodham Clinton On the Release of President Obama Administration's International Strategy for Cyberspace. May 16, 2011. [Electronic resource]. Access mode: http://www.state.gov/secretary/rm/2011/05/163523.htm

34. Department of Defense. The Department of Defense Cyber Strategy - April 2015 National Cyber Strategy of the United States of America. September 2018. [Electronic resource]. Access mode: https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf

35. Summary Department of Defense Cyber Strategy - 2018. [Electronic resource]. Access mode: https://media.defense.gov/2018/sep/18/2002041658/-1/-1/1/cyber_strategy_summary_final.pdf

36. Cyber Readiness Index 2.0 A Plan for Cyber Readiness: a baseline and an index. Potomac Institute for Policy Studies 901 N. Stuart St, Suite 1200 Arlington, VA, 22203, [Electronic resource]. Access mode: https://www.potomacinstitute.org/images/CRIndex2.0.pdf

37. [Electronic resource]. Access mode: https://www.dw.com/uk / ukr-rss-MetaUA-ukr-V_Mire-3051-xml-mrss, https://espreso.tv/news/2015/03/23/u_nimechchyni_vyrishyly_vstanovyty_pravyla_dlya_kiberviyn

38. [Electronic resource]. Access mode: https://intvua.com/news/society/1537605491-velika-britaniya-priynyala-rishennya-pro-stvorennya-kiberviysk.html, https://dt.ua/WORLD/britaniya-pochala-zbilshuvati-svoyi-kiberviyska-zmi-289016_.html, https://www.unian.ua/world/1112130-velikobritaniya-zbilshue-finansuvannya-kiberviyn-u-10-raziv.html

39. White book on National Security of the Republic of Poland. Published by National Security Bureau, Warsaw Poland, 2013. P.263.

40. [Electronic resource]. Access mode: https://www.unn.com.ua/uk/news/1766148-polscha-stvorit-viyska-kiberoboroni

41. Disinformation as a Cyber Threat in the V4: Capabilities and Reactions to Russian Campaigns [Electronic resource]. Access mode: https://stratpol.sk/wp-content/uploads/2018/08/Infographic-Cyber-V4-_-STRATPOL.pdf

42. Cyber defense academy in Budapest. [Electronic resource]. Access mode: https://dailynewshungary.com/cyber-defense-academy-budapest/https://dailynewshungary.com/cyber-defense-academy-budapest/

43. [Electronic resource]. Access mode: https://en.wikipedia.org/wiki/Cooperative_Cyber_Defence_Centre_of_Excellence, https://www.eurointegration.com.ua/articles/2017/12/1/7074473/, http://www.eurointegration.com.ua/news/2017/11/8/7073389/

44. Doctrine of Information Security of the Russian Federation (Decree of the President of the Russian Federation of 05.12.2016 No. 646). [Electronic resource]. Access mode: http://kremlin.ru/acts/bank/41460

45. [Electronic resource]. Access mode: http://recrut.mil.ru/for_recruits/research_company/companies.htm, https://www.nstu.ru/studies/army_research

46. M. Grebenyuk, B. Leonov, R. Lukyanchuk. Israel's experience in cybersecurity // K,: Information and Law - 2018, No. 2 (25).

47 Constitution of Ukraine [Electronic resource]. Access mode: http://zakon0.rada.gov.ua/laws/show/254

48. Law of Ukraine On the Fundamental Principles of Cyber Security of Ukraine No. 2163-VIII of October 5, 2017. [Electronic resource]. Access mode: http://zakon.rada.gov.ua/laws/show/2163-19

49. Law on Defense of Ukraine, approved by the Verkhovna Rada of Ukraine dated 06.12.1991, No. 1932-XII — [Electronic resource]. Access mode: http://zakon4.rada.gov.ua/laws/show/1932-12

50. Law of Ukraine On the Armed Forces of Ukraine of December 6, 1991 N 1934-XII, [Electronic resource]. Access mode: http://zakon3.rada.gov.ua/laws/show/1934-12

51. Ukraine's cybersecurity strategy, approved by Presidential Decree No. 96 of March 15, 2016 // Official. hanging Of Ukraine. - 2016. - № 23.

52. The Concept of Development of the Security and Defense Sector of Ukraine, Implemented by the Decree of the President of Ukraine of 14.03.2016 # 92/2016

53. Strategic Defense Bulletin of Ukraine, Enacted by Presidential Decree of June 6, 2016 No. 240/2016

54. Vision of the General Staff of the Armed Forces of Ukraine on the development of the Armed Forces of Ukraine for the next 10 years. [Electronic resource]. Access mode: http://www.mil.gov.ua/news/2020/01/11/viziya-generalnogo-shtabu-zs-ukraini-shhodo-rozvitku-zbrojnih-sil-ukraini-na-najblizhchi-10-rokiv/

55. National Security Strategy of Ukraine, approved by Presidential Decree No 287/2015 of May 26, 2015.


GOST Style Citations


1. В.Бурячок, Г.Гулак, В.Хорошко, Завдання, форми та способи ведення війн у кібернетичному просторі – К.: Наука і оборона №3 - 2011, с.35-42.

2. Є.Живило О., О.Черноног. Стратегія кібероборони України – К.: ВІТІ № 4 – 2017, с. 30-37

3. В. Ліпкан, І. Діордіца. Національна система кібербезпеки як складова частина системи забезпечення національної безпеки України – К.: Підприємництво, господарство і право №5– 2017, с. 174-180.

4. I.Gorbenko, A.Zamula, Ye.Semenko. Ensemble and correlation properties of cryptographic signals for telecommunication system and network applications  - Kharkiv/ Telecommunications and Radio Engineering. – 2016. – Vol. 75. – Issue 2. – P. 169–178.

5. І.Горбенко, О.Замула. Моделі та методи синтезу криптографічних сигналів та їх оптимізація за критерієм часової складності – Харків - Математичне та комп'ютерне моделювання. Серія: Фізико-математичні науки - 2017. Випуск 15. с.43-49 - [Електронний ресурс]. Режим доступу:http://nbuv.gov.ua/UJRN/Mtkm_fiz_mat_2017_15_10

6. Ю.Даник, С.Вдовенко. Проблеми та перспективи забезпечення кібероборони держави К.:ВІКНУ, випуск 66, 2020 - С. 56-72.

7. Ю.Даник. Високотехнологічні аспекти забезпечення національної безпеки й оборони. К.: Военная связь. Телеком. Жовтень 2018. с. 58-69

8. Г. Лиддел. Стратегия непрямых действий — М.: ИЛ - 1957.

9. DoD C4ISR Cooperative Research Program Assistant Secretary of Defense (C3I) Mr. Arthur L. Money Special Assistant to the ASD (C3I). [Електронний ресурс]. Режим доступу: http://dodccrp.org/files/Alberts_NCW.pdf

10. Warden, John A. III (September 1995), Chapter 4: Air theory for the 21st century, Battlefield of the Future: 21st Century Warfare Issues.

11. Bryant D.J. Critique, Explore, Compare and Adapt (CECA): A New Model for Command Decisionmaking. Defence R&D Toronto Technical Report, DFDC, Toronto TR, 2003. 63 p.

12. DoD C4ISR Cooperative Research Program Assistant Secretary of Defense (C3I) Mr. Arthur L. Money Special Assistant to the ASD(C3I). [Електронний ресурс]. Режим доступу http://dodccrp.org/files/Alberts_NCW.pdf

13. Л.Поліщук, С.Богуцький М. Сучасні тенденції розвитку систем управління збройних сил провідних країн світу - ВІТІ - 2014, с.42-46

14. Warsaw Summit Communiqué. Issued by the Heads of State and Government participating in the meeting of the North Atlantic Council in Warsaw 8-9 July 2016 09 Jul. 2016 – 2016, 100

15. Стратегія національної безпеки України, затверджена Указом Президента України від 26.05.2015 № 287/2015.

16. S.Neema. Symbiotic Design for Cyber Physical Systems. Defense Advanced Research Projects Agency Program Information. [Електронний ресурс]. Режим доступу: https://www.darpa.mil/program/symbiotic-design-for-cyber-physical-systems.

17. С.Вдовенко, Ю.Даник. Концептуальні напрямки комплексного вирішення проблеми захисту від несанкціонованого доступу в складних системах спеціального призначення. Вінниця, ВНПУ - 2017, с. 61 – 64.

18. Ю.Даник, С.Вдовенко. Ланцюгові ефекти в кібердіях. Збірник наукових праць військового інституту Київського Національного університету імені Тараса Шевченка, випуск 64 - 2019 - С. 56-71.

19. [Електронний ресурс]. Режим доступу: https://www.usna.edu/wrc/cpsl/index.php, https://thebabel.com.ua/news/41889-ssha-rozgortayut-protidronovi-lazerni-sistemi-na-zarubizhnih-bazah, https://defence-ua.com/index.php/statti/2245-vyprobuvannya-bpla-6-ho-pokolinnya-ssha-pokazaly-mistse-rosiyi, http://www.nanonewsnet.ru/news/2017/kitaitsy-obedinili-v-stayu-tysyachu-dronov, https://lb.ua/world/2015/11/17/321192_britaniya_sozdast_spetsialnie.html, http://www.lefigaro.fr/international/l-armee-se-dote-de-56-microrobots-de-reconnaissance, https://www.linkedin.com/company/national-security-agency?trk=similar-pages_result-card_full-click, https://www.cybercom.mil/About/Mission-and-Vision/ https://www.cybercom.mil/, https://www.cybercom.mil/About/Leadership/Bio-Display/Article/1512978/commander-uscybercom/, https://en.wikipedia.org/wiki/United_States_Cyber_Command, https://military.wikia.org/wiki/Second_United_States_Armyhttps://www.globalsecurity.org/military/agency/usaf/afcyber htm, https://www.public.navy.mil/fcc-c10f/Pages/home.aspx, https://www.navy.mil/local/fccc10f/ https://www.armed-services.senate.gov/imo/media/doc/Gilday_05-23-17.pdf, https://www.candp.marines.mil/Organization/Operating-Forces/US-Marine-Corps-Forces-Cyberspace-Command/ https://www.epravda.com.ua/news/2018/10/23/641908/ https://www.rbc.ua/rus/news/ssha-proveli-kiberataku-iranskie-raketnye-1561260168.html https://lexinform.com.ua/v-sviti/ssha-pochaly-kiberoperatsiyu-proty-rosiyi/ https://www.arcyber.army.mil/, https://www.fifthdomain.com/dod/cybercom/2019/07/25/what-the-future-holds-for-cyber-command/

20. Moore, Gordon E. (1965). Cramming more components onto integrated circuits, Electronics Magazine. с. 4 [Електронний ресурс]. Режим доступу: https://newsroom.intel.com/wp-content/uploads/sites/11/2018/05/moores-law-electronics.pdf

21. Moore, Gordon E. No Exponential is Forever: But “Forever” Can Be Delayed!, International Solid-State Circuits Conference 2003 / SESSION 1 / PLENARY / 1.1 -2003. [Електронний ресурс]. Режим доступу: https://ieeexplore.ieee.org/document/1234194

22. Kurzweil, Ray -2005. The Singularity Is Near. When Humans Transcend Biology. Penguin Books [Електронний ресурс]. Режим доступу: http://stargate.inf.elte.hu/~seci/fun/Kurzweil/ Ray_Singularity_Near_The_hardbac_ed_Bv1._D.pdf

23. Recently discovered phenomenon could provide a way to bypass the limits to Moore's Law. [Eлектронний ресурс]. Режим доступу: https://phys.org/news/2017-10-phenomenon-bypass-limits-law.html

24. В. Бегма, В. Шемаєв. Розвиток технологій у провідних країнах світу. Уроки для України. [Електронний ресурс]. Режим доступу: https://defence-ua.com/index.php/statti/publikatsiji-partneriv/8982-rozvytok-tekhnolohiy-u-providnykh-krayinakh-svitu-uroky-dlya-ukrayiny

25. Network Centric Warfare Market by Platform (Land, Air, Naval, Unmanned), Application (ISR, Communication, Computer, Cyber, Combat, Control & Command), Mission Type, Communication Network, Architecture, and Region - Global Forecast to 2021. [Eлектронний ресурс]. Режим доступу: https://www.marketresearch.com/MarketsandMarkets-v3719/Network-Centric-Warfare-Platform-Land-10188278/

26. BMC4ISR means Battle Management/Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance. [Eлектронний ресурс]. Режим доступу: http://acronymsandslang.com/definition/24656/BMC4ISR-meaning.html

27. Summit Meeting of NATO Heads of State and Government - Lisbon, Portugal, 19-20 Nov 2010. [Електронний ресурс]. Режим доступу: https://www.nato.int/cps/en/natolive/events_66529.htm

28. С.Вдовенко, Ю.Даник, С.Фараон. Дефініційні проблеми термінології у сфері кібербезпеки і кібероборони та шляхи їх вирішення. – Харків: ХНУ ім. В.Н.Каразіна – 2019, №1(12). [Електронний ресурс]. Режим доступу: https://doi.org/10.26565/2519-2310-2019-1-02

29. DOD Dictionary of Military and Associated Terms As of January 2020. Електронний ресурс. Режим доступу: https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdfhttps://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdf

30. DOD. Joint Publication 3-12, Cyberspace Operations, 8 June 2018/. Електронний ресурс. Режим доступу: https://fas.org/irp/doddir/dod/jp3_12.pdf

31. Statement by lieutenant general Paul M. Nakasone Commander, United States Army Cyber Command before the Subcommittee on Cybersecurity Committee on Armed Services United States Senate second session, 115th congress May 23, 2017. Електронний ресурс. Режим доступу: https://www.armed-services.senate.gov/imo/media/doc/Nakasone_05-23-17.pdf.

32. International Strategy For Cyberspace: Prosperity, Security and Openness in a Networked World. Washington DC: The White House, May 2011. Електронний ресурс. Режим доступу: http://www.whitehouse.gov/sites/default/files/rss_viewer/internationalstrategy cyberspace.pdf

33. Secretary of State Hillary Rodham Clinton On the Release of President Obama Administration's International Strategy for Cyberspace. May 16, 2011. Електронний ресурс. Режим доступу: http://www.state.gov/secretary/rm/2011/05/163523.htm

34. Department of Defense. The Department of Defense Cyber Strategy - April 2015 National Cyber Strategy of the United States of America. September 2018. Електронний ресурс. Режим досупу: https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf

35. Summary Department of Defense Cyber Strategy - 2018. Електронний ресурс. Режим доступу: https://media.defense.gov/2018/sep/18/2002041658/-1/-1/1/cyber_strategy_summary_final.pdf

36. Cyber Readiness Index 2.0 A Plan for Cyber Readiness: a baseline and an index. Potomac Institute for Policy Studies 901 N. Stuart St, Suite 1200 Arlington, VA, 22203, Електронний ресурс. Режим доступу: https://www.potomacinstitute.org/images/CRIndex2.0.pdf

37. [Електронний ресурс] – Режим доступу: https://www.dw.com/uk / ukr-rss-MetaUA-ukr-V_Mire-3051-xml-mrss, https://espreso.tv/news/2015/03/23/u_nimechchyni_vyrishyly_vstanovyty_pravyla_dlya_kiberviyn

38. [Електронний ресурс] – Режим доступу: https://intvua.com/news/society/1537605491-velika-britaniya-priynyala-rishennya-pro-stvorennya-kiberviysk.html, https://dt.ua/WORLD/britaniya-pochala-zbilshuvati-svoyi-kiberviyska-zmi-289016_.html, https://www.unian.ua/world/1112130-velikobritaniya-zbilshue-finansuvannya-kiberviyn-u-10-raziv.html

39. White book on National Security of the Republic of Poland. Published by National Security Bureau, Warsaw Poland, 2013. P.263.

40. [Електронний ресурс] – Режим доступу: https://www.unn.com.ua/uk/news/1766148-polscha-stvorit-viyska-kiberoboroni

41. Disinformation as a Cyber Threat in the V4: Capabilities and Reactions to Russian Campaigns. [Електронний ресурс] – Режим доступу: https://stratpol.sk/wp-content/uploads/2018/08/Infographic-Cyber-V4-_-STRATPOL.pdf

42. Cyber defense academy in Budapest.: [Електронний ресурс] – Режим доступу:https://dailynewshungary.com/cyber-defense-academy-budapest/https://dailynewshungary.com/cyber-defense-academy-budapest/

43. [Електронний ресурс] – Режим доступу: https://en.wikipedia.org/wiki/Cooperative_Cyber_Defence_Centre_of_Excellence, https://www.eurointegration.com.ua/articles/2017/12/1/7074473/, http://www.eurointegration.com.ua/news/2017/11/8/7073389/

44. Доктрина информационной безопасности Российской Федерации (Указ Президента Российской Федерации от 05.12.2016 № 646). [Електронний ресурс] – Режим доступу: http://kremlin.ru/acts/bank/41460

45. Електронний ресурс. Режим доступу: http://recrut.mil.ru/for_recruits/research_company/companies.htm, https://www.nstu.ru/studies/army_research

46. М.Гребенюк, Б.Леонов, Р.Лук’янчук. Досвід Ізраїлю у сфері забезпечення кібербезпеки // K,: Інформація і право – 2018,№ 2(25). 

47 Конституція України [Електронний ресурс] – Режим доступу: http://zakon0.rada.gov.ua/laws/show/254

48. Закон України Про основні засади забезпечення кібербезпеки України № 2163-VIII від 5 жовтня 2017 року.[Електронний ресурс] — Режим доступу:http://zakon.rada.gov.ua/laws/show/2163-19

49. Закон Про оборону України: за станом на 01.07.2018 р./, затверджений ВР України від 06.12.1991, № 1932-XII — [Електронний ресурс] — Режим доступу: http://zakon4.rada.gov.ua/laws/show/1932-12

50. Закон України Про Збройні Сили України від 6 грудня 1991 року N 1934-XII (зі змінами), [Електронний ресурс] – Режим доступу: http://zakon3.rada.gov.ua/laws/show/1934-12

51. Стратегія кібербезпеки України, затверд жена Указом Президента України від 15.03.2016 № 96 // Офіц. вісн. України.  2016.  № 23.

52. Концепція розвитку сектору безпеки і оборони України, введена в дію Указом Президента України від 14.03.2016 №92/2016

53. Стратегічний оборонний бюлетень України, введений в дію Указом Президента України від 6.06.2016 № 240/2016

54. Візія Генерального штабу ЗС України щодо розвитку Збройних Сил України на найближчі 10 років. Електронний ресурс. Режим доступу: http://www.mil.gov.ua/news/2020/01/11/viziya-generalnogo-shtabu-zs-ukraini-shhodo-rozvitku-zbrojnih-sil-ukraini-na-najblizhchi-10-rokiv/

55. Стратегія національної безпеки України, затверджена Указом Президента України від 26.05.2015 № 287/2015.





ISSN 2410-7336 (Online)

ISSN 2311-7249 (Print)