z-logo
open-access-imgOpen Access
Legal Support of Cybersecurity of Critical Information Infrastructure of Ukraine
Author(s) -
Myroslav Kovaliv,
Ruslan Skrynkovskyy,
Yurii Nazar,
Serhii Yesimov,
Ivan Krasnytskyі,
Khrystyna Kaydrovych,
Svіatoslav Knіaz,
Yuliia Kemska
Publication year - 2021
Publication title -
traektoriâ nauki
Language(s) - English
Resource type - Journals
ISSN - 2413-9009
DOI - 10.22178/pos.69-12
Subject(s) - critical infrastructure , computer security , information infrastructure , information technology , information security , information system , critical infrastructure protection , modernization theory , field (mathematics) , information security management , computer science , legislation , business , law , political science , cloud computing security , security information and event management , cloud computing , mathematics , pure mathematics , operating system
The article presents a study of the theoretical and legal foundations of the legal support of cybersecurity of the critical information infrastructure of Ukraine based on the system approach methodology. The current legislation is considered, and the bylaws of Ukraine in the field of cybersecurity of critical information infrastructure are analyzed. It is noted that today in Ukraine, it is important to ensure effective management of regional information security systems and the smooth and efficient operation of information infrastructure, especially critical infrastructure. To achieve these results in practice, it is necessary to prioritize implementing such critical tasks as the development of human resources in cybersecurity and the development of the national field of information technology. It is substantiated that cybersecurity is required to improve legal, organizational, and technical mechanisms for regulating public relations that arise in the information sphere. It is concluded that cybersecurity of critical information infrastructure of Ukraine is possible by identifying objects of this structure, solving problems of cybersecurity of objects with a very long life cycle, developing methods of modernization of critical information infrastructure for each organization, technology and information structure, which are the objects of critical information infrastructure.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here