THE STRATEGY FOR ENSURING THE CYBER SECURITY OF THE ARMED FORCES OF UKRAINE
Keywords:military cyber warriors, cyber warfare, cyber defense
AbstractThe military security strategy of Ukraine cyberspace (hereinafter – the Strategy) is based on the results of the military-political situation analysis and forecasting, the defense sufficiency principles, high availability to defense, system defense planning, as well as defined of the Supreme Council of Ukraine the domestic and foreign policy principles. The main provisions of the Strategy are derived from the Military doctrine of Ukraine and the national security Strategy of Ukraine, and develop their position in the areas of ensuring military security of the Ukraine cyberspace and are aimed at countering aggression by the Russian Federation in cyberspace. That is why the fulfilment of the above conditions is necessary for gaining membership in the European Union and the North Atlantic Treaty Organization, ensuring equitable and mutually beneficial cooperation in the field of cyber security (cyber defense) in the military, military-economic and military-technical cooperation with all interested States-partners.
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
4. Personal data and metadata contained in articles are available for storage and processing in various databases and information systems, including them in analytical and statistical reports, creating reasonable relationships of scientific , literary and art objects with personal data, etc. on an area which is not limited.