Formation of the main directions of state resistance to cyber threats

  •  V. V. Kruhlov Doctor of Sciences in Public Administration, Associate Professor, Professor Department of Management and Public Administration Kharkiv National University of Civil Engineering and Architecture http://orcid.org/0000-0002-7228-8635
Keywords: state, information and communication technologies, cyber threats, resilience, cybersecurity, protection.

Abstract

Considering the expansion of the role of information and communication technologies in public relations, production and activities of public authorities, security issues are becoming increasingly relevant. The proper functioning of important elements of life, critical infrastructure, the ability to store information with limited access implies ensuring the resilience of the state to cyber threats, which requires the development of relevant cyber defense measures, especially in martial law.

The purpose of the article is to study the key areas of state resilience to cyber threats based on the analysis of existing research in this area and to identify the main approaches to ensuring the resilience of the state to cyber threats.

Scientific novelty. Determined: the compliance of the digital development of Ukraine with the ability to counter cyber threats; the features of ensuring the directions of cybersecurity of Ukraine. Determined: the content of the key tools of the state's resilience to cyber threats; the necessary directions for achieving legal, technical, organizational and operational approaches to ensuring the resilience of the state to cyber threats.

Methodology. The methodological basis of the study involves the use of general scientific methods for studying phenomena and processes (analysis, synthesis, graphic modeling, typology, interpretation, abstraction, generalization, as well as methods of systemic and comparative analysis). The specified methodological tools allow us to explore, identify and analyze the current state of ensuring the resilience of the state to the most critical cyber threats and to establish key areas for ensuring the resilience of the state to cyber threats.

Conclusions. Approaches to ensuring the resilience of the state to cyber threats can be considered research and monitoring of cyber-attack technologies; outsourcing of individual functions; use of public-private partnership; implementation of government programs to enhance cyber resilience; expansion of international cooperation; technical support, etc. The results of the study make it possible to use promising areas in the formation of a national cyber defense policy in order to achieve the resilience of the state to cyber threats. Subsequent studies involve empirical calculations of indicators from different countries of the world to clarify dependencies in the field of cybersecurity.

References

1. Kruhlov V., Latynin M., Horban A., Petrov A. Public-Private Partnership in Cybersecurity. CEUR Workshop Proceedings. 2020. № 2654. Р. 619–628.
2. Wolfe J. C. Cybersecurity. Disruption in the Boardroom. Apress, Berkeley, CA., 2020. doi: 10.1007/978-1-4842-6159-0_4.
3. Albahar M. Cyber attacks and terrorism: A twenty-first century conundrum. Science and engineering ethics. 2019. № 25(4). Р. 993–1006.
4. Combatting Cybercrime: Tools and Capacity Building for Emerging Economies. United Nations, 2017. 482 р.
5. Vilić V. M. Dark web, cyber terrorism and cyber warfare: Dark side of the cyberspace. Balkan Social Science Review. 2017. № 10(10). Р. 7–25.
6. Скибун О. Ж. Кібербезпека систем електронних комунікацій органів державної влади України. Вісн. НАДУ. Серія «Державне управління». 2021. № 1 (100). С. 30–39.
7. Сопілко І. Інформаційна безпека та кібербезпека: порівняльно-правовий аспект. Наукові праці Національного авіаційного університету. Серія: Юридичний вісник «Повітряне і космічне право». 2021. № 2 (59). С. 110–115.
8. Ревак І. О., Грень Р. Т. Особливості формування безпечного кіберпростору в умовах розвитку цифрової економіки. Інноваційна економіка. 2021. № 3-4. С. 164–169.
9. Quincozes S. E., Albuquerque C., Passos D., Mossé D. A survey on intrusion detection and prevention systems in digital substations. Computer Networks. 2021. № 184. doi: 10.1016/j.comnet.2020.107679.
10. Kulesza J., Weber R. H. Protecting the internet with international law. Computer Law and Security Review. 2021. № 40. doi: 10.1016/j.clsr.2021.105531.
11. Carvalho J. V., Carvalho S., Rocha Á. European strategy and legislation for cybersecurity: Implications for Portugal. Cluster Computing. 2020. № 23(3). Р. 1845–1854.
12. Rass S., Schauer S., König S., Zhu Q. Cyber-Security in Critical Infrastructures. Springer International Publishing, 2020. 297 р.
13. Ponnusamy S., Rubasundram G. A. An international study on the risk of cyber terrorism. International Journal of Recent Technology and Engineering. 2019. № 7(5) Р. 159–163.
14. Methodology. EGA, 2021. URL: https://ncsi.ega.ee/methodology/ (Дата звернення: 18.07.2022).
15. National Cyber Security Index. EGA, 2021. URL: https://ncsi.ega.ee/compare/ (Дата звернення: 18.07.2022).
16. Kannari P. R., Shariff N. C., Biradar R. L. Network intrusion detection using sparse autoencoder with swish-PReLU activation model. Journal of Ambient Intelligence and Humanized Computing. 2021. doi:10.1007/s12652-021-03077-0.
17. Rehman S. U. et al. DIDDOS: An approach for detection and identification of distributed denial of service (DDoS) cyberattacks using gated recurrent units (GRU). Future Generation Computer Systems. 2021. № 118. Р. 453–466.
18. Catak F. O., Ahmed J., Sahinbas K., & Khand Z. H. Data augmentation based malware detection using convolutional neural networks. PeerJ Computer Science. 2021. № 7. Р. 1–26.
19. Jagtap S. S., Shankar Sriram V. S., Subramaniyaswamy V. A hypergraph based Kohonen map for detecting intrusions over cyber-physical systems traffic. Future Generation Computer Systems. 2021. № 119. Р. 84–109.
20. Gourisetti S. N. G., Mylrea M., Patangia H. Cybersecurity vulnerability mitigation framework through empirical paradigm: Enhanced prioritized gap analysis. Future Generation Computer Systems. 2020. № 105. Р. 410–431.
21. Górka M. The Cybersecurity Strategy of the Visegrad Group Countries. Politics in Central Europe. 2018. № 14(2). Р. 75–98.
22. Круглов В. В. Державно-приватне партнерство у сфері кібербезпеки. Вчені записки Таврійського національного університету імені В. І. Вернадського. Серія : Державне управління. 2018. Т. 29(68). № 3. С. 57–61.
23. Global Cybersecurity Index 2020. ITU : Geneva, 2021. 156 р.
24. Rethinking strategic autonomy in the digital age. European Political Strategy Centre Strategic Notes. 2019. No 30. URL: https://ec.europa.eu/epsc/sites/epsc/files/epsc_strategic_note_issue30_strategic_autonomy.pdf (Дата звернення: 18.07.2022).
25. Cybersecurity research directions for the EU’s digital strategic autonomy. ENISA, 2021. doi: 10.2824/43660.
26. Про рішення Ради національної безпеки і оборони України від 14 травня 2021 року «Про Стратегію кібербезпеки України» : Указ Президента України від 26 серпня 2021 р. № 447/2021. URL: https://www.president.gov.ua/documents/4472021-40013 (Дата звернення: 18.07.2022).
27. Про рішення Ради національної безпеки і оборони України від 30 грудня 2021 року «Про План реалізації Стратегії кібербезпеки України» : Указ Президента України від 1 лютого 2022 р. № 37/2022. URL: https://www.president.gov.ua/documents/372022-41289 (Дата звернення: 18.07.2022).

References:
1. Kruhlov, V., Latynin, M., Horban, A., & Petrov, A. (2020). Public-Private Partnership in Cybersecurity. CEUR Workshop Proceedings, 2654, 619–628.
2. Wolfe, J. C. (2020) Cybersecurity. In: Disruption in the Boardroom. Apress, Berkeley, CA. doi: 10.1007/978-1-4842-6159-0_4.
3. Albahar, M. (2019). Cyber attacks and terrorism: A twenty-first century conundrum. Science and engineering ethics, 25(4), 993–1006.
4. United Nations. (2017). Combatting Cybercrime: Tools and Capacity Building for Emerging Economies.
5. Vilić, V. M. (2017). Dark web, cyber terrorism and cyber warfare: Dark side of the cyberspace. Balkan Social Science Review, 10(10), 7–25.
6. Skybun, O. Zh. (2021). Kiberbezpeka system elektronnykh komunikatsii orhaniv derzhavnoi vlady Ukrain [Сybersecurity of electronic communications systems of state authorities of Ukraine]. Bulletin of the NAPA. Series «Рublic Аdministration», Is. 1 (100), 30–39 [in Ukrainian].
7. Sopilko, I. (2021). Informatsiina bezpeka ta kiberbezpeka: porivnialno-pravovyi aspekt. [Information security and cyber security: a comparative legal aspect]. Scientific works of National Aviation University. Series: Law Journal «Air and Space Law», 2(59), 110–115 [in Ukrainian].
8. Revak, I. O., Gren, R. T. (2021). Osoblyvosti formuvannia bezpechnoho kiberprostoru v umovakh rozvytku tsyfrovoi ekonomiky. [Peculiarities of the formation of secure cyberspace in the digital economy]. Innovative economy, 3-4, 164–169 [in Ukrainian].
9. Quincozes, S. E., Albuquerque, C., Passos, D., & Mossé, D. (2021). A survey on intrusion detection and prevention systems in digital substations. Computer Networks, 184. doi: 10.1016/j.comnet.2020.107679.
10. Kulesza, J., & Weber, R. H. (2021). Protecting the internet with international law. Computer Law and Security Review, 40. doi: 10.1016/j.clsr.2021.105531.
11. Carvalho, J. V., Carvalho, S., & Rocha, Á. (2020). European strategy and legislation for cybersecurity: Implications for Portugal. Cluster Computing, 23(3), 1845–1854.
12. Rass, S., Schauer, S., König, S., & Zhu, Q. (2020). Cyber-Security in Critical Infrastructures. Springer International Publishing.
13. Ponnusamy, S., & Rubasundram, G. A. (2019). An international study on the risk of cyber terrorism. International Journal of Recent Technology and Engineering, 7(5), 159–163.
14. EGA. (2021). Methodology. URL: https://ncsi.ega.ee/methodology/ (Last accessed: 18.07.2022).
15. EGA. (2021). National Cyber Security Index. URL: https://ncsi.ega.ee/compare/ (Last accessed: 18.07.2022).
16. Kannari, P. R., Shariff, N. C., & Biradar, R. L. (2021). Network intrusion detection using sparse autoencoder with swish-PReLU activation model. Journal of Ambient Intelligence and Humanized Computing. doi:10.1007/s12652-021-03077-0.
17. Rehman, S. U., Khaliq, M., Imtiaz, S. I., Rasool, A., Shafiq, M., Javed, A. R., & Bashir, A. K. (2021). DIDDOS: An approach for detection and identification of distributed denial of service (DDoS) cyberattacks using gated recurrent units (GRU). Future Generation Computer Systems, 118, 453–466.
18. Catak, F. O., Ahmed, J., Sahinbas, K., & Khand, Z. H. (2021). Data augmentation based malware detection using convolutional neural networks. PeerJ Computer Science, 7, 1–26.
19. Jagtap, S. S., Shankar Sriram, V. S., & Subramaniyaswamy, V. (2021). A hypergraph based Kohonen map for detecting intrusions over cyber-physical systems traffic. Future Generation Computer Systems, 119, 84–109.
20. Gourisetti, S. N. G., Mylrea, M., & Patangia, H. (2020). Cybersecurity vulnerability mitigation framework through empirical paradigm: Enhanced prioritized gap analysis. Future Generation Computer Systems, 105, 410–431.
21. Górka, M. (2018). The Cybersecurity Strategy of the Visegrad Group Countries. Politics in Central Europe, 14(2), 75–98.
22. Kruhlov, V. V. (2018). Derzhavno-pryvatne partnerstvo u sferi kiberbezpeky [Public-Private Partnership in Cybersecurity]. Vcheni zapysky TNU im. V.I. Vernadskoho. Seriia: Derzhavne upravlinnia, vol. 3, 29 (68), 57–61 [in Ukrainian].
23. ITU. (2021). Global Cybersecurity Index 2020. Geneva.
24. EPSC. (2019). Rethinking strategic autonomy in the digital age. European Political Strategy Centre Strategic Notes, No 30. URL: https://ec.europa.eu/epsc/sites/epsc/files/epsc_strategic_note_issue30_strategic_autonomy.pdf (Last accessed: 18.07.2022).
25. ENISA. (2021). Cybersecurity research directions for the EU’s digital strategic autonomy. doi: 10.2824/43660.
26. Prezydent Ukrainy. (2021). Pro rishennia Rady natsionalnoi bezpeky i oborony Ukrainy vid 14 travnia 2021 roku «Pro Stratehiiu kiberbezpeky Ukrainy» : Ukaz № 447/2021. URL: https://www.president.gov.ua/documents/4472021-40013 (Last accessed: 18.07.2022) [in Ukrainian].
27. Prezydent Ukrainy. (2022). Pro rishennia Rady natsionalnoi bezpeky i oborony Ukrainy vid 30 hrudnia 2021 roku «Pro Plan realizatsiyi Stratehiiu kiberbezpeky Ukrainy»: Ukaz № 37/2022. URL: https://www.president.gov.ua/documents/372022-41289 (Last accessed: 18.07.2022) [in Ukrainian].

Abstract views: 72
PDF Downloads: 25
Published
2022-08-18
How to Cite
Kruhlov,  V. V. (2022). Formation of the main directions of state resistance to cyber threats . Scientific Papers of the Legislation Institute of the Verkhovna Rada of Ukraine, (4), 62-69. https://doi.org/10.32886/instzak.2022.04.07