State information security strategies in conditions of hybrid threats

被引:0
|
作者
Khriapynskyi, Anton [1 ]
Khmyrov, Ihor [2 ]
Svoboda, Ivo [3 ]
Shevchuk, Mykhailo [4 ]
Iastrebova, Vira [5 ]
机构
[1] KHRIAPYNSKYI & CO LTD, Kharkiv, Ukraine
[2] Natl Univ Civil Protect Ukraine, Sci Dept Prob Civil Protect & Technogen & Eco Saf, Sci & Res Ctr, Kharkiv, Ukraine
[3] As Univ, Secur Management Studies, AMBIS, Prague, Czech Republic
[4] Leonid Yuzkov Khmelnytskyi Univ Management & Law, Dept Constitut Law, Adm Law, Financial Law, Khmelnytskyi, Ukraine
[5] Natl Univ Odesa Law Acad, Dept Polit Theories, Odesa, Ukraine
来源
AMAZONIA INVESTIGA | 2023年 / 12卷 / 69期
关键词
information security; threat; strategy; cyberspace; disinformation;
D O I
10.34069/AI/2023.69.09.7
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
Hybrid information threats under the conditions of modern development of digital technologies are currently becoming one of the major issues for a modern democracy. The amount of damage that hybrid threats bring to the world economy contributes to the establishment of effective legal mechanisms to combat them. The purpose of the study was to single out the information security strategies under conditions of hybrid threats, including the spread of disinformation and fake news. The application of the comparative analysis method mad it possible to identify the gaps in information security strategies for countering hybrid threats. The strategy of information security in the conditions of hybrid threats is a coordinated action plan aimed at countering and fighting hybrid threats to safeguard cyberspace and preserve a democracy. Information security against hybrid threats is based on such cornerstones as: availability, confidentiality, integrity of information data, and safety. Enhancement of information security under the conditions of hybrid threats should be carried out at the expense of digital transformation, increasing the level of digital literacy of society and establishing a fair responsibility measure for a purposeful spreading of disinformation. The perspective of further research is addressing information security strategies as well as elaborating practical guidelines for the formation of a secure information space.
引用
收藏
页码:84 / 93
页数:10
相关论文
共 50 条
  • [42] An innovative model to manage the information systems security threats
    Fujs, Damjan
    Vrhovec, Simon L. R.
    Vavpotic, Damjan
    ELEKTROTEHNISKI VESTNIK, 2020, 87 (03): : 109 - 116
  • [43] A Statistical Approach to the Assessment of Security threats Information System
    Semin, Valeriy G.
    Kabanov, Artem S.
    Los, Lexei B.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE QUALITY MANAGEMENT,TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&QM&IS), 2017, : 100 - 105
  • [44] Information security threats and organizational readiness in nWFH scenarios
    Jayarao, Guruprasad B.
    Ray, Sanjog
    Panigrahi, Prabin Kumar
    COMPUTERS & SECURITY, 2024, 140
  • [45] Information Security Threats Analysis for E-Learning
    Alwi, Najwa Hayaati Mohd
    Fan, Ip-Shing
    TECHNOLOGY ENHANCED LEARNING: QUALITY OF TEACHING AND EDUCATIONAL REFORM, 2010, 73 : 285 - 291
  • [46] Information Systems Security: Cases of Network Administrator Threats
    Jahankhani, Hamid
    Fernando, Shantha
    Nkhoma, Mathews Z.
    Mouratidis, Haralambos
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2007, 1 (03) : 13 - 25
  • [47] Analysis of the Information Security Threats in the Digital Production Networks
    Dakhnovich, A. D.
    Moskvin, D. A.
    Zegzhda, D. P.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2018, 52 (08) : 1071 - 1075
  • [48] A management perspective on risk of security threats to information systems
    Farahmand F.
    Navathe S.B.
    Sharp G.P.
    Enslow P.H.
    Information Technology and Management, 2005, 6 (2-3) : 203 - 225
  • [49] Information Security and Insider Threats in Small Medical Practices
    Martin, Nancy L.
    Imboden, Thomas R.
    AMCIS 2014 PROCEEDINGS, 2014,
  • [50] Insider Threats to Information Security: Problem Areas in Neutralization
    Epifantsev, Boris N.
    Zhumazhanova, Samal S.
    Lozhnikov, Pavel S.
    2016 17TH INTERNATIONAL CONFERENCE OF YOUNG SPECIALISTS ON MICRO/NANOTECHNOLOGIES AND ELECTRON DEVICES (EDM), 2016, : 133 - 136