State information security strategies in conditions of hybrid threats

被引:0
|
作者
Khriapynskyi, Anton [1 ]
Khmyrov, Ihor [2 ]
Svoboda, Ivo [3 ]
Shevchuk, Mykhailo [4 ]
Iastrebova, Vira [5 ]
机构
[1] KHRIAPYNSKYI & CO LTD, Kharkiv, Ukraine
[2] Natl Univ Civil Protect Ukraine, Sci Dept Prob Civil Protect & Technogen & Eco Saf, Sci & Res Ctr, Kharkiv, Ukraine
[3] As Univ, Secur Management Studies, AMBIS, Prague, Czech Republic
[4] Leonid Yuzkov Khmelnytskyi Univ Management & Law, Dept Constitut Law, Adm Law, Financial Law, Khmelnytskyi, Ukraine
[5] Natl Univ Odesa Law Acad, Dept Polit Theories, Odesa, Ukraine
来源
AMAZONIA INVESTIGA | 2023年 / 12卷 / 69期
关键词
information security; threat; strategy; cyberspace; disinformation;
D O I
10.34069/AI/2023.69.09.7
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
Hybrid information threats under the conditions of modern development of digital technologies are currently becoming one of the major issues for a modern democracy. The amount of damage that hybrid threats bring to the world economy contributes to the establishment of effective legal mechanisms to combat them. The purpose of the study was to single out the information security strategies under conditions of hybrid threats, including the spread of disinformation and fake news. The application of the comparative analysis method mad it possible to identify the gaps in information security strategies for countering hybrid threats. The strategy of information security in the conditions of hybrid threats is a coordinated action plan aimed at countering and fighting hybrid threats to safeguard cyberspace and preserve a democracy. Information security against hybrid threats is based on such cornerstones as: availability, confidentiality, integrity of information data, and safety. Enhancement of information security under the conditions of hybrid threats should be carried out at the expense of digital transformation, increasing the level of digital literacy of society and establishing a fair responsibility measure for a purposeful spreading of disinformation. The perspective of further research is addressing information security strategies as well as elaborating practical guidelines for the formation of a secure information space.
引用
收藏
页码:84 / 93
页数:10
相关论文
共 50 条
  • [1] Improved Planning of Information Policy in the Cyber Security Sphere under Conditions of Hybrid Threats
    Dziundziuk, Viacheslav
    Krutii, Olena
    Sobol, Roman
    Kotukova, Tetiana
    Kotukov, Oleksandr
    CUESTIONES POLITICAS, 2022, 40 (74): : 741 - 763
  • [2] Information Security of the State Under Conditions of Hybrid Warfare: Mechanisms of Ensuring
    Ablazov, Ivan
    Harkavyi, Yevhenii
    Mokliak, Sergii
    Rubel, Karina
    Smolianiuk, Volodymyr
    KHAZAR JOURNAL OF HUMANITIES AND SOCIAL SCIENCES, 2023, 26 (01): : 51 - 63
  • [3] INTEGRATED SECURITY STRATEGIES IN THE CONTEXT OF HYBRID THREATS IN THE SLOVAK REPUBLIC
    Koraus, Antonin
    Krasna, Patricia
    Sisulak, Stanislav
    Veselovska, Stanislava
    ENTREPRENEURSHIP AND SUSTAINABILITY ISSUES, 2023, 11 (01): : 233 - 250
  • [4] Research on Information Security Threats and Defense Strategies of Smart Grid
    Zhang, Jianxuan
    2020 INTERNATIONAL CONFERENCE ON ENERGY, ENVIRONMENT AND BIOENGINEERING (ICEEB 2020), 2020, 185
  • [5] Coping Strategies and Paradoxes Related to BYOD Information Security Threats in France
    Baillette, Pamela
    Barlette, Yves
    JOURNAL OF GLOBAL INFORMATION MANAGEMENT, 2020, 28 (02) : 1 - 28
  • [6] Information Security Threats and Information Assurance
    Yalman, Yildiray
    Yesilyurt, Murat
    TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2013, 2 (03): : 247 - 252
  • [7] Threats to Health Information Security
    Samy, Ganthan Narayana
    Ahmad, Rabiah
    Ismail, Zuraini
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 540 - 543
  • [8] Insider Threats in Information Security
    Elmrabit, Ncbrase
    Yang, Shuang-Hua
    Yang, Lili
    2015 21ST INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC), 2015, : 108 - 113
  • [9] COMPUTER THREATS AND INFORMATION SECURITY
    Tarazona T, Cesar H.
    DERECHO PENAL Y CRIMINOLOGIA, 2007, 28 (84): : 137 - 146
  • [10] A variety of information security threats
    Kovalenko, Kseniya E.
    Kovalenko, Natalia E.
    Leon Gonzalez, Jorge Luis
    REVISTA UNIVERSIDAD Y SOCIEDAD, 2019, 11 (05): : 256 - 261