DOI: https://doi.org/10.33099/2311-7249/2020-37-1-31-48
Experience of development of cyber security systems and cyber defense foreign states
Abstract
Keywords
Full Text:
PDF (Українська)References
1. V. Buryachok, G. Hulak, V. Khoroshko. Tasks, Forms and Methods of War in Cybernetic Space - K .: Science and Defense №3 - 2011, p.35-42.
2. E. Zhivilo O., O.Chernohog. Cyber Defense Strategy of Ukraine - K .: VITI № 4 - 2017, p. 30-37
3. V. Lipkan, I. Diordica. The National Cyber Security System as an Integral Part of the National Security System of Ukraine - K.: Business, Economy and Law №5– 2017, p. 174-180.
4. I.Gorbenko, A.Zamula, Ye.Semenko. Ensemble and correlation properties of cryptographic signals for telecommunication system and network applications - Kharkiv/ Telecommunications and Radio Engineering. – 2016. – Vol. 75. – Issue 2. – P. 169–178.
I.Gorbenko, O.Zamula. Models and methods of synthesis of cryptographic signals and their optimization by the criterion of time complexity - Kharkiv - Mathematical and computer simulation. Series: Physical and Mathematical Sciences - 2017. Issue 15. p.43-49 - [Electronic resource]. Access mode: http://nbuv.gov.ua/UJRN/Mtkm_fiz_mat_2017_15_10
6 . Yu.Danik, S.Vdovenko. Problems and Prospects of Providing Cyber Defense to the State of K.: MIKNU, Issue 66, 2020 - P. 56-72.
7. Yu. Danik. High-tech aspects of national security and defense. K.: Military Communications. Telecom. October 2018 p. 58-69
8. G. Liddell. Indirect Action Strategy - M .: IL - 1957.
9. DoD C4ISR Cooperative Research Program Assistant Secretary of Defense (C3I) Mr. Arthur L. Money Special Assistant to the ASD (C3I). [Electronic resource]. Access mode:: http://dodccrp.org/files/Alberts_NCW.pdf
10. Warden, John A. III (September 1995), Chapter 4: Air theory for the 21st century, Battlefield of the Future: 21st Century Warfare Issues.
11. Bryant D.J. Critique, Explore, Compare and Adapt (CECA): A New Model for Command Decisionmaking. Defence R&D Toronto Technical Report, DFDC, Toronto TR, 2003. 63 p.
12. DoD C4ISR Cooperative Research Program Assistant Secretary of Defense (C3I) Mr. Arthur L. Money Special Assistant to the ASD(C3I). [Electronic resource]. Access mode: http://dodccrp.org/files/Alberts_NCW.pdf
13. L.Polishchuk, S.Bogutsky M. Current Trends in the Development of Armed Forces Management Systems in Leading Countries of the World - VITI - 2014, p.42-46
14. Warsaw Summit Communiqué. Issued by the Heads of State and Government participating in the meeting of the North Atlantic Council in Warsaw 8-9 July 2016 09 Jul. 2016 – 2016, 100
15. National Security Strategy of Ukraine, approved by Presidential Decree No 287/2015 of May 26, 2015.
16. S.Neema. Symbiotic Design for Cyber Physical Systems. Defense Advanced Research Projects Agency Program Information. [Electronic resource]. Access mode: https://www.darpa.mil/program/symbiotic-design-for-cyber-physical-systems.
17. S.Vodovenko, Y.Danik. Conceptual directions of complex solution of the problem of protection against unauthorized access in complex systems of special purpose. Vinnitsa, VNPU - 2017, p. 61 - 64.
18. Yu.Danik, S.Vdovenko. Chain effects in cyberdias. Proceedings of the Military Institute of the Taras Shevchenko National University of Kyiv, issue 64- 2019 - P. 56-71.
19. [Electronic resource]. Access mode: https://www.usna.edu/wrc/cpsl/index.php, https://thebabel.com.ua/news/41889-ssha-rozgortayut-protidronovi-lazerni-sistemi-na-zarubizhnih-bazah, https://defence-ua.com/index.php/statti/2245-vyprobuvannya-bpla-6-ho-pokolinnya-ssha-pokazaly-mistse-rosiyi, http://www.nanonewsnet.ru/news/2017/kitaitsy-obedinili-v-stayu-tysyachu-dronov, https://lb.ua/world/2015/11/17/321192_britaniya_sozdast_spetsialnie.html, http://www.lefigaro.fr/international/l-armee-se-dote-de-56-microrobots-de-reconnaissance, https://www.linkedin.com/company/national-security-agency?trk=similar-pages_result-card_full-click, https://www.cybercom.mil/About/Mission-and-Vision/ https://www.cybercom.mil/, https://www.cybercom.mil/About/Leadership/Bio-Display/Article/1512978/commander-uscybercom/, https://en.wikipedia.org/wiki/United_States_Cyber_Command, https://military.wikia.org/wiki/Second_United_States_Armyhttps://www.globalsecurity.org/military/agency/usaf/afcyber htm, https://www.public.navy.mil/fcc-c10f/Pages/home.aspx, https://www.navy.mil/local/fccc10f/ https://www.armed-services.senate.gov/imo/media/doc/Gilday_05-23-17.pdf, https://www.candp.marines.mil/Organization/Operating-Forces/US-Marine-Corps-Forces-Cyberspace-Command/https://www.epravda.com.ua/news/2018/10/23/641908/ https://www.rbc.ua/rus/news/ssha-proveli-kiberataku-iranskie-raketnye-1561260168.html https://lexinform.com.ua/v-sviti/ssha-pochaly-kiberoperatsiyu-proty-rosiyi/ https://www.arcyber.army.mil/, https://www.fifthdomain.com/dod/cybercom/2019/07/25/what-the-future-holds-for-cyber-command/
20. Moore, Gordon E. (1965). Cramming more components onto integrated circuits, Electronics Magazine. с. 4 [Electronic resource]. Access mode: https://newsroom.intel.com/wp-content/uploads/sites/11/2018/05/moores-law-electronics.pdf
21. Moore, Gordon E. No Exponential is Forever: But “Forever” Can Be Delayed!, International Solid-State Circuits Conference 2003 / SESSION 1 / PLENARY / 1.1 -2003. [Electronic resource]. Access mode: https://ieeexplore.ieee.org/document/1234194
22. Kurzweil, Ray -2005. The Singularity Is Near. When Humans Transcend Biology. Penguin Books [Electronic resource]. Access mode: http://stargate.inf.elte.hu/~seci/fun/Kurzweil/ Ray_Singularity_Near_The_hardbac_ed_Bv1._D.pdf
23. Recently discovered phenomenon could provide a way to bypass the limits to Moore's Law. [Electronic resource]. Access mode: https://phys.org/news/2017-10-phenomenon-bypass-limits-law.html
24. V. Begma, V. Shemaev. Technology development in the world's leading countries. Lessons for Ukraine. [Electronic resource]. Access mode: https://defence-ua.com/index.php/statti/publikatsiji-partneriv/8982-rozvytok-tekhnolohiy-u-providnykh-krayinakh-svitu-uroky-dlya-ukrayiny
25. Network Centric Warfare Market by Platform (Land, Air, Naval, Unmanned), Application (ISR, Communication, Computer, Cyber,Combat, Control & Command), Mission Type, Communication Network, Architecture, and Region - Global Forecast to 2021. [Electronic resource]. Access mode: https://www.marketresearch.com/MarketsandMarkets-v3719/Network-Centric-Warfare-Platform-Land-10188278/
26. BMC4ISR means Battle Management/Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance. [Electronic resource]. Access mode: http://acronymsandslang.com/definition/24656/BMC4ISR-meaning.html
27. Summit Meeting of NATO Heads of State and Government - Lisbon, Portugal, 19-20 Nov 2010. [Electronic resource]. Access mode: https://www.nato.int/cps/en/natolive/events_66529.htm
28. S.Vodovenko, Y. Danik, S. Pharaoh. Definitional problems of terminology in cybersecurity and cyber defense and ways of solving them. - Kharkiv: KhNU. VN Karazin - 2019, No.1 (12). [Electronic resource]. Access mode: https://doi.org/10.26565/2519-2310-2019-1-02
29. DOD Dictionary of Military and Associated Terms As of January 2020. [Electronic resource]. Access mode: https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdfhttps://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdf
30. DOD. Joint Publication 3-12, Cyberspace Operations, 8 June 2018/. [Electronic resource]. Access mode: https://fas.org/irp/doddir/dod/jp3_12.pdf 31. Statement by lieutenant general Paul M. Nakasone Commander United States Army Cyber Command before the Subcommittee on Cybersecurity Committee on Armed Services United States Senate second session, 115th congress May 23, 2017. [Electronic resource]. Access mode:https://www.armed-services.senate.gov/imo/media/doc/Nakasone_05-23-17.pdf.
32. International Strategy For Cyberspace: Prosperity, Security and Openness in a Networked World. Washington DC: The White House, May 2011. [Electronic resource]. Access mode: http://www.whitehouse.gov/sites/default/files/rss_viewer/internationalstrategy cyberspace.pdf
33. Secretary of State Hillary Rodham Clinton On the Release of President Obama Administration's International Strategy for Cyberspace. May 16, 2011. [Electronic resource]. Access mode: http://www.state.gov/secretary/rm/2011/05/163523.htm
34. Department of Defense. The Department of Defense Cyber Strategy - April 2015 National Cyber Strategy of the United States of America. September 2018. [Electronic resource]. Access mode: https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf
35. Summary Department of Defense Cyber Strategy - 2018. [Electronic resource]. Access mode: https://media.defense.gov/2018/sep/18/2002041658/-1/-1/1/cyber_strategy_summary_final.pdf
36. Cyber Readiness Index 2.0 A Plan for Cyber Readiness: a baseline and an index. Potomac Institute for Policy Studies 901 N. Stuart St, Suite 1200 Arlington, VA, 22203, [Electronic resource]. Access mode: https://www.potomacinstitute.org/images/CRIndex2.0.pdf
37. [Electronic resource]. Access mode: https://www.dw.com/uk / ukr-rss-MetaUA-ukr-V_Mire-3051-xml-mrss, https://espreso.tv/news/2015/03/23/u_nimechchyni_vyrishyly_vstanovyty_pravyla_dlya_kiberviyn
38. [Electronic resource]. Access mode: https://intvua.com/news/society/1537605491-velika-britaniya-priynyala-rishennya-pro-stvorennya-kiberviysk.html, https://dt.ua/WORLD/britaniya-pochala-zbilshuvati-svoyi-kiberviyska-zmi-289016_.html, https://www.unian.ua/world/1112130-velikobritaniya-zbilshue-finansuvannya-kiberviyn-u-10-raziv.html
39. White book on National Security of the Republic of Poland. Published by National Security Bureau, Warsaw Poland, 2013. P.263.
40. [Electronic resource]. Access mode: https://www.unn.com.ua/uk/news/1766148-polscha-stvorit-viyska-kiberoboroni
41. Disinformation as a Cyber Threat in the V4: Capabilities and Reactions to Russian Campaigns [Electronic resource]. Access mode: https://stratpol.sk/wp-content/uploads/2018/08/Infographic-Cyber-V4-_-STRATPOL.pdf
42. Cyber defense academy in Budapest. [Electronic resource]. Access mode: https://dailynewshungary.com/cyber-defense-academy-budapest/https://dailynewshungary.com/cyber-defense-academy-budapest/
43. [Electronic resource]. Access mode: https://en.wikipedia.org/wiki/Cooperative_Cyber_Defence_Centre_of_Excellence, https://www.eurointegration.com.ua/articles/2017/12/1/7074473/, http://www.eurointegration.com.ua/news/2017/11/8/7073389/
44. Doctrine of Information Security of the Russian Federation (Decree of the President of the Russian Federation of 05.12.2016 No. 646). [Electronic resource]. Access mode: http://kremlin.ru/acts/bank/41460
45. [Electronic resource]. Access mode: http://recrut.mil.ru/for_recruits/research_company/companies.htm, https://www.nstu.ru/studies/army_research
46. M. Grebenyuk, B. Leonov, R. Lukyanchuk. Israel's experience in cybersecurity // K,: Information and Law - 2018, No. 2 (25).
47 Constitution of Ukraine [Electronic resource]. Access mode: http://zakon0.rada.gov.ua/laws/show/254
48. Law of Ukraine On the Fundamental Principles of Cyber Security of Ukraine No. 2163-VIII of October 5, 2017. [Electronic resource]. Access mode: http://zakon.rada.gov.ua/laws/show/2163-19
49. Law on Defense of Ukraine, approved by the Verkhovna Rada of Ukraine dated 06.12.1991, No. 1932-XII — [Electronic resource]. Access mode: http://zakon4.rada.gov.ua/laws/show/1932-12
50. Law of Ukraine On the Armed Forces of Ukraine of December 6, 1991 N 1934-XII, [Electronic resource]. Access mode: http://zakon3.rada.gov.ua/laws/show/1934-12
51. Ukraine's cybersecurity strategy, approved by Presidential Decree No. 96 of March 15, 2016 // Official. hanging Of Ukraine. - 2016. - № 23.
52. The Concept of Development of the Security and Defense Sector of Ukraine, Implemented by the Decree of the President of Ukraine of 14.03.2016 # 92/2016
53. Strategic Defense Bulletin of Ukraine, Enacted by Presidential Decree of June 6, 2016 No. 240/2016
54. Vision of the General Staff of the Armed Forces of Ukraine on the development of the Armed Forces of Ukraine for the next 10 years. [Electronic resource]. Access mode: http://www.mil.gov.ua/news/2020/01/11/viziya-generalnogo-shtabu-zs-ukraini-shhodo-rozvitku-zbrojnih-sil-ukraini-na-najblizhchi-10-rokiv/
55. National Security Strategy of Ukraine, approved by Presidential Decree No 287/2015 of May 26, 2015.
GOST Style Citations
1. В.Бурячок, Г.Гулак, В.Хорошко, Завдання, форми та способи ведення війн у кібернетичному просторі – К.: Наука і оборона №3 - 2011, с.35-42.
2. Є.Живило О., О.Черноног. Стратегія кібероборони України – К.: ВІТІ № 4 – 2017, с. 30-37
3. В. Ліпкан, І. Діордіца. Національна система кібербезпеки як складова частина системи забезпечення національної безпеки України – К.: Підприємництво, господарство і право №5– 2017, с. 174-180.
4. I.Gorbenko, A.Zamula, Ye.Semenko. Ensemble and correlation properties of cryptographic signals for telecommunication system and network applications - Kharkiv/ Telecommunications and Radio Engineering. – 2016. – Vol. 75. – Issue 2. – P. 169–178.
5. І.Горбенко, О.Замула. Моделі та методи синтезу криптографічних сигналів та їх оптимізація за критерієм часової складності – Харків - Математичне та комп'ютерне моделювання. Серія: Фізико-математичні науки - 2017. Випуск 15. с.43-49 - [Електронний ресурс]. Режим доступу:http://nbuv.gov.ua/UJRN/Mtkm_fiz_mat_2017_15_10
6. Ю.Даник, С.Вдовенко. Проблеми та перспективи забезпечення кібероборони держави К.:ВІКНУ, випуск 66, 2020 - С. 56-72.
7. Ю.Даник. Високотехнологічні аспекти забезпечення національної безпеки й оборони. К.: Военная связь. Телеком. Жовтень 2018. с. 58-69
8. Г. Лиддел. Стратегия непрямых действий — М.: ИЛ - 1957.
9. DoD C4ISR Cooperative Research Program Assistant Secretary of Defense (C3I) Mr. Arthur L. Money Special Assistant to the ASD (C3I). [Електронний ресурс]. Режим доступу: http://dodccrp.org/files/Alberts_NCW.pdf
10. Warden, John A. III (September 1995), Chapter 4: Air theory for the 21st century, Battlefield of the Future: 21st Century Warfare Issues.
11. Bryant D.J. Critique, Explore, Compare and Adapt (CECA): A New Model for Command Decisionmaking. Defence R&D Toronto Technical Report, DFDC, Toronto TR, 2003. 63 p.
12. DoD C4ISR Cooperative Research Program Assistant Secretary of Defense (C3I) Mr. Arthur L. Money Special Assistant to the ASD(C3I). [Електронний ресурс]. Режим доступу http://dodccrp.org/files/Alberts_NCW.pdf
13. Л.Поліщук, С.Богуцький М. Сучасні тенденції розвитку систем управління збройних сил провідних країн світу - ВІТІ - 2014, с.42-46
14. Warsaw Summit Communiqué. Issued by the Heads of State and Government participating in the meeting of the North Atlantic Council in Warsaw 8-9 July 2016 09 Jul. 2016 – 2016, 100
15. Стратегія національної безпеки України, затверджена Указом Президента України від 26.05.2015 № 287/2015.
16. S.Neema. Symbiotic Design for Cyber Physical Systems. Defense Advanced Research Projects Agency Program Information. [Електронний ресурс]. Режим доступу: https://www.darpa.mil/program/symbiotic-design-for-cyber-physical-systems.
17. С.Вдовенко, Ю.Даник. Концептуальні напрямки комплексного вирішення проблеми захисту від несанкціонованого доступу в складних системах спеціального призначення. Вінниця, ВНПУ - 2017, с. 61 – 64.
18. Ю.Даник, С.Вдовенко. Ланцюгові ефекти в кібердіях. Збірник наукових праць військового інституту Київського Національного університету імені Тараса Шевченка, випуск 64 - 2019 - С. 56-71.
19. [Електронний ресурс]. Режим доступу: https://www.usna.edu/wrc/cpsl/index.php, https://thebabel.com.ua/news/41889-ssha-rozgortayut-protidronovi-lazerni-sistemi-na-zarubizhnih-bazah, https://defence-ua.com/index.php/statti/2245-vyprobuvannya-bpla-6-ho-pokolinnya-ssha-pokazaly-mistse-rosiyi, http://www.nanonewsnet.ru/news/2017/kitaitsy-obedinili-v-stayu-tysyachu-dronov, https://lb.ua/world/2015/11/17/321192_britaniya_sozdast_spetsialnie.html, http://www.lefigaro.fr/international/l-armee-se-dote-de-56-microrobots-de-reconnaissance, https://www.linkedin.com/company/national-security-agency?trk=similar-pages_result-card_full-click, https://www.cybercom.mil/About/Mission-and-Vision/ https://www.cybercom.mil/, https://www.cybercom.mil/About/Leadership/Bio-Display/Article/1512978/commander-uscybercom/, https://en.wikipedia.org/wiki/United_States_Cyber_Command, https://military.wikia.org/wiki/Second_United_States_Armyhttps://www.globalsecurity.org/military/agency/usaf/afcyber htm, https://www.public.navy.mil/fcc-c10f/Pages/home.aspx, https://www.navy.mil/local/fccc10f/ https://www.armed-services.senate.gov/imo/media/doc/Gilday_05-23-17.pdf, https://www.candp.marines.mil/Organization/Operating-Forces/US-Marine-Corps-Forces-Cyberspace-Command/ https://www.epravda.com.ua/news/2018/10/23/641908/ https://www.rbc.ua/rus/news/ssha-proveli-kiberataku-iranskie-raketnye-1561260168.html https://lexinform.com.ua/v-sviti/ssha-pochaly-kiberoperatsiyu-proty-rosiyi/ https://www.arcyber.army.mil/, https://www.fifthdomain.com/dod/cybercom/2019/07/25/what-the-future-holds-for-cyber-command/
20. Moore, Gordon E. (1965). Cramming more components onto integrated circuits, Electronics Magazine. с. 4 [Електронний ресурс]. Режим доступу: https://newsroom.intel.com/wp-content/uploads/sites/11/2018/05/moores-law-electronics.pdf
21. Moore, Gordon E. No Exponential is Forever: But “Forever” Can Be Delayed!, International Solid-State Circuits Conference 2003 / SESSION 1 / PLENARY / 1.1 -2003. [Електронний ресурс]. Режим доступу: https://ieeexplore.ieee.org/document/1234194
22. Kurzweil, Ray -2005. The Singularity Is Near. When Humans Transcend Biology. Penguin Books [Електронний ресурс]. Режим доступу: http://stargate.inf.elte.hu/~seci/fun/Kurzweil/ Ray_Singularity_Near_The_hardbac_ed_Bv1._D.pdf
23. Recently discovered phenomenon could provide a way to bypass the limits to Moore's Law. [Eлектронний ресурс]. Режим доступу: https://phys.org/news/2017-10-phenomenon-bypass-limits-law.html
24. В. Бегма, В. Шемаєв. Розвиток технологій у провідних країнах світу. Уроки для України. [Електронний ресурс]. Режим доступу: https://defence-ua.com/index.php/statti/publikatsiji-partneriv/8982-rozvytok-tekhnolohiy-u-providnykh-krayinakh-svitu-uroky-dlya-ukrayiny
25. Network Centric Warfare Market by Platform (Land, Air, Naval, Unmanned), Application (ISR, Communication, Computer, Cyber, Combat, Control & Command), Mission Type, Communication Network, Architecture, and Region - Global Forecast to 2021. [Eлектронний ресурс]. Режим доступу: https://www.marketresearch.com/MarketsandMarkets-v3719/Network-Centric-Warfare-Platform-Land-10188278/
26. BMC4ISR means Battle Management/Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance. [Eлектронний ресурс]. Режим доступу: http://acronymsandslang.com/definition/24656/BMC4ISR-meaning.html
27. Summit Meeting of NATO Heads of State and Government - Lisbon, Portugal, 19-20 Nov 2010. [Електронний ресурс]. Режим доступу: https://www.nato.int/cps/en/natolive/events_66529.htm
28. С.Вдовенко, Ю.Даник, С.Фараон. Дефініційні проблеми термінології у сфері кібербезпеки і кібероборони та шляхи їх вирішення. – Харків: ХНУ ім. В.Н.Каразіна – 2019, №1(12). [Електронний ресурс]. Режим доступу: https://doi.org/10.26565/2519-2310-2019-1-02
29. DOD Dictionary of Military and Associated Terms As of January 2020. Електронний ресурс. Режим доступу: https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdfhttps://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdf
30. DOD. Joint Publication 3-12, Cyberspace Operations, 8 June 2018/. Електронний ресурс. Режим доступу: https://fas.org/irp/doddir/dod/jp3_12.pdf
31. Statement by lieutenant general Paul M. Nakasone Commander, United States Army Cyber Command before the Subcommittee on Cybersecurity Committee on Armed Services United States Senate second session, 115th congress May 23, 2017. Електронний ресурс. Режим доступу: https://www.armed-services.senate.gov/imo/media/doc/Nakasone_05-23-17.pdf.
32. International Strategy For Cyberspace: Prosperity, Security and Openness in a Networked World. Washington DC: The White House, May 2011. Електронний ресурс. Режим доступу: http://www.whitehouse.gov/sites/default/files/rss_viewer/internationalstrategy cyberspace.pdf
33. Secretary of State Hillary Rodham Clinton On the Release of President Obama Administration's International Strategy for Cyberspace. May 16, 2011. Електронний ресурс. Режим доступу: http://www.state.gov/secretary/rm/2011/05/163523.htm
34. Department of Defense. The Department of Defense Cyber Strategy - April 2015 National Cyber Strategy of the United States of America. September 2018. Електронний ресурс. Режим досупу: https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf
35. Summary Department of Defense Cyber Strategy - 2018. Електронний ресурс. Режим доступу: https://media.defense.gov/2018/sep/18/2002041658/-1/-1/1/cyber_strategy_summary_final.pdf
36. Cyber Readiness Index 2.0 A Plan for Cyber Readiness: a baseline and an index. Potomac Institute for Policy Studies 901 N. Stuart St, Suite 1200 Arlington, VA, 22203, Електронний ресурс. Режим доступу: https://www.potomacinstitute.org/images/CRIndex2.0.pdf
37. [Електронний ресурс] – Режим доступу: https://www.dw.com/uk / ukr-rss-MetaUA-ukr-V_Mire-3051-xml-mrss, https://espreso.tv/news/2015/03/23/u_nimechchyni_vyrishyly_vstanovyty_pravyla_dlya_kiberviyn
38. [Електронний ресурс] – Режим доступу: https://intvua.com/news/society/1537605491-velika-britaniya-priynyala-rishennya-pro-stvorennya-kiberviysk.html, https://dt.ua/WORLD/britaniya-pochala-zbilshuvati-svoyi-kiberviyska-zmi-289016_.html, https://www.unian.ua/world/1112130-velikobritaniya-zbilshue-finansuvannya-kiberviyn-u-10-raziv.html
39. White book on National Security of the Republic of Poland. Published by National Security Bureau, Warsaw Poland, 2013. P.263.
40. [Електронний ресурс] – Режим доступу: https://www.unn.com.ua/uk/news/1766148-polscha-stvorit-viyska-kiberoboroni
41. Disinformation as a Cyber Threat in the V4: Capabilities and Reactions to Russian Campaigns. [Електронний ресурс] – Режим доступу: https://stratpol.sk/wp-content/uploads/2018/08/Infographic-Cyber-V4-_-STRATPOL.pdf
42. Cyber defense academy in Budapest.: [Електронний ресурс] – Режим доступу:https://dailynewshungary.com/cyber-defense-academy-budapest/https://dailynewshungary.com/cyber-defense-academy-budapest/
43. [Електронний ресурс] – Режим доступу: https://en.wikipedia.org/wiki/Cooperative_Cyber_Defence_Centre_of_Excellence, https://www.eurointegration.com.ua/articles/2017/12/1/7074473/, http://www.eurointegration.com.ua/news/2017/11/8/7073389/
44. Доктрина информационной безопасности Российской Федерации (Указ Президента Российской Федерации от 05.12.2016 № 646). [Електронний ресурс] – Режим доступу: http://kremlin.ru/acts/bank/41460
45. Електронний ресурс. Режим доступу: http://recrut.mil.ru/for_recruits/research_company/companies.htm, https://www.nstu.ru/studies/army_research
46. М.Гребенюк, Б.Леонов, Р.Лук’янчук. Досвід Ізраїлю у сфері забезпечення кібербезпеки // K,: Інформація і право – 2018,№ 2(25).
47 Конституція України [Електронний ресурс] – Режим доступу: http://zakon0.rada.gov.ua/laws/show/254
48. Закон України Про основні засади забезпечення кібербезпеки України № 2163-VIII від 5 жовтня 2017 року.[Електронний ресурс] — Режим доступу:http://zakon.rada.gov.ua/laws/show/2163-19
49. Закон Про оборону України: за станом на 01.07.2018 р./, затверджений ВР України від 06.12.1991, № 1932-XII — [Електронний ресурс] — Режим доступу: http://zakon4.rada.gov.ua/laws/show/1932-12
50. Закон України Про Збройні Сили України від 6 грудня 1991 року N 1934-XII (зі змінами), [Електронний ресурс] – Режим доступу: http://zakon3.rada.gov.ua/laws/show/1934-12
51. Стратегія кібербезпеки України, затверд жена Указом Президента України від 15.03.2016 № 96 // Офіц. вісн. України. 2016. № 23.
52. Концепція розвитку сектору безпеки і оборони України, введена в дію Указом Президента України від 14.03.2016 №92/2016
53. Стратегічний оборонний бюлетень України, введений в дію Указом Президента України від 6.06.2016 № 240/2016
54. Візія Генерального штабу ЗС України щодо розвитку Збройних Сил України на найближчі 10 років. Електронний ресурс. Режим доступу: http://www.mil.gov.ua/news/2020/01/11/viziya-generalnogo-shtabu-zs-ukraini-shhodo-rozvitku-zbrojnih-sil-ukraini-na-najblizhchi-10-rokiv/
55. Стратегія національної безпеки України, затверджена Указом Президента України від 26.05.2015 № 287/2015.
ISSN 2410-7336 (Online)
ISSN 2311-7249 (Print)