State information security strategies in conditions of hybrid threats

被引:0
|
作者
Khriapynskyi, Anton [1 ]
Khmyrov, Ihor [2 ]
Svoboda, Ivo [3 ]
Shevchuk, Mykhailo [4 ]
Iastrebova, Vira [5 ]
机构
[1] KHRIAPYNSKYI & CO LTD, Kharkiv, Ukraine
[2] Natl Univ Civil Protect Ukraine, Sci Dept Prob Civil Protect & Technogen & Eco Saf, Sci & Res Ctr, Kharkiv, Ukraine
[3] As Univ, Secur Management Studies, AMBIS, Prague, Czech Republic
[4] Leonid Yuzkov Khmelnytskyi Univ Management & Law, Dept Constitut Law, Adm Law, Financial Law, Khmelnytskyi, Ukraine
[5] Natl Univ Odesa Law Acad, Dept Polit Theories, Odesa, Ukraine
来源
AMAZONIA INVESTIGA | 2023年 / 12卷 / 69期
关键词
information security; threat; strategy; cyberspace; disinformation;
D O I
10.34069/AI/2023.69.09.7
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
Hybrid information threats under the conditions of modern development of digital technologies are currently becoming one of the major issues for a modern democracy. The amount of damage that hybrid threats bring to the world economy contributes to the establishment of effective legal mechanisms to combat them. The purpose of the study was to single out the information security strategies under conditions of hybrid threats, including the spread of disinformation and fake news. The application of the comparative analysis method mad it possible to identify the gaps in information security strategies for countering hybrid threats. The strategy of information security in the conditions of hybrid threats is a coordinated action plan aimed at countering and fighting hybrid threats to safeguard cyberspace and preserve a democracy. Information security against hybrid threats is based on such cornerstones as: availability, confidentiality, integrity of information data, and safety. Enhancement of information security under the conditions of hybrid threats should be carried out at the expense of digital transformation, increasing the level of digital literacy of society and establishing a fair responsibility measure for a purposeful spreading of disinformation. The perspective of further research is addressing information security strategies as well as elaborating practical guidelines for the formation of a secure information space.
引用
收藏
页码:84 / 93
页数:10
相关论文
共 50 条
  • [31] Information security threats and practices in small businesses
    Keller, S
    Powell, A
    Horstmann, B
    Predmore, C
    Crawford, M
    INFORMATION SYSTEMS MANAGEMENT, 2005, 22 (02) : 7 - 19
  • [32] 'State threats', security, and democracy: the National Security Act 2023
    Scott, Paul F.
    LEGAL STUDIES, 2024, 44 (02) : 260 - 276
  • [33] DEVELOPMENT OF THE FINANCIAL SECURITY OF THE STATE: NEUTRALIZATION OF THREATS
    Burkaltseva, Diana Dmitrievna
    Blazhevich, Oleg Georgiyevich
    Gabrielyan, Oleg Arshavirovich
    Savchenko, Lyubov Vasilievna
    Skorobogatova, Tatiana Nikolaevna
    Guk, Olga Anatolievna
    Vovk, Ekaterina Vladimirovna
    Abubakarov, Magomed Abdullaevich
    REVISTA INCLUSIONES, 2019, 6 : 294 - 312
  • [34] Epidemic Threats and their Impact on the Economic Security of the State
    Karpunina, Evgeniya K.
    Zabelina, Olga, V
    Galieva, Gulnaz F.
    Melyakova, Evgenia, V
    Melnikova, Yulia, V
    EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT: A 2025 VISION TO SUSTAIN ECONOMIC DEVELOPMENT DURING GLOBAL CHALLENGES, 2020, : 7671 - 7681
  • [35] Identification of new threats to the national security of the state
    Svoboda, Ivo
    Shevchuk, Mykhailo
    Shamsutdinov, Oleksandr
    Lysianskyi, Pavlo
    Voluiko, Oleksii
    CUESTIONES POLITICAS, 2023, 41 (78): : 326 - +
  • [36] Exploring hybrid security strategies in Ghana: State and private sector partnerships
    Paalo, Sebastian Angzoorokuu
    Arthur, Dominic Degraft
    Dramani, Aminu
    Adu-Gyamfi, Samuel
    AFRICAN SECURITY REVIEW, 2024, 33 (01) : 81 - 97
  • [37] National Security Strategies in response to transnational risk and threats
    Martinez, Rafa
    REFLEXION POLITICA, 2018, 20 (40): : 10 - 20
  • [38] A Taxonomy of Perceived Information Security and Privacy Threats among IT Security Students
    Farooq, Ali
    Kakakhel, Syed Rameez Ullah
    Virtanen, Seppo
    Isoaho, Jouni
    2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2015, : 280 - 286
  • [39] Analysis of Research on Specific Insider Information Security Threats
    Zaytsev, Anton
    Malyuk, Anatoly
    Miloslavskaya, Natalia
    RECENT ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2, 2017, 570 : 725 - 735
  • [40] An innovative model to manage the information systems security threats
    Fujs, Damjan
    Vrhovec, Simon L. R.
    Vavpotič, Damjan
    Elektrotehniski Vestnik/Electrotechnical Review, 2020, 87 (03): : 109 - 116