Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 3

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  cyber-threats
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
Cybersecurity and Law
|
2021
|
vol. 5
|
issue 1
139-144
EN
The article describes the stage of political digitalization of Ukrainian society, defined as a gradual multi-vector process of society’s transition to digital technologies, affecting all spheres of public life, including public policy and public administration. The peculiarities of digital transformation in Ukraine are determined in the context of service state formation. The issue of cyber-security is studied. The public policy against cyber-terrorism in Ukraine is analysed. The main components of cyber-terrorism in Ukraine, related to the development of political digitalization of society, are identified and characterized, including: informational-psychological terrorism, informational-technical terrorism, cognitive terrorism, network terrorism, social-communication terrorism.
EN
Security is one of the basic human needs. Due to the increasing citizens’ activity in the cyberspace, a need for security in this area is increasing. The cyber-threats may appear in many forms: from malware and phishing, to fraud or scams attempts. Rapid technological development makes the traditional methods of obtaining information insufficient for an automatic Web monitoring with the aim of detecting potential threats. The paper discusses the problem of monitoring of Web sources and indicates the existing gap between the volume of available information and the decision-making ability. Finally, it presents an example from the field of cyberspace security: Semantic Monitoring of Cyberspace project and achieved results.
EN
The purpose of the article is to present the results of studies due to the training process of specialists in cybersecurity in the United States. The article substantiates the conceptual bases for the training of specialists incybersecurity and characterizes the legal principles relating to disciplines and specialties for which the United States have lead preparation and upgraded the skills of cybersecurity experts.Key terms have been described, identified and their interpretation with the objective of a concrete definition and specification of their essential values are presented. The conducted research of American experience of professional training in the field of cybersecurity bachelor’s degree will enable to determine the possibilities of its progressive ideas implementation into higher education of Ukraine. In particular: improvement of industry standards for cybersecurity bachelor’s degree; providing the information support of Internet resources; development and improvement of the content of curriculum and educational programs for training bachelors of cybersecurity; improvement of the educational and methodological implementation; advanced study of foreign experience. The successful implementation of reasonable opportunities will promote professional training of national experts in the field of cybersecurity, accelerate the process of reforming of the national higher education system, convergence of the international educational standards, and ensure its competitiveness in today’s job market. The successful implementation of reasonable opportunities will promote professional training of the national experts in the field of cybersecurity, accelerate the process of reform of the national higher education system, convergence of the international educational standards, and ensure its competitiveness in today’s job market. The practical significance of the research is to form an idea of the conceptual bases and terminology of the curriculum for training specialists in cybersecurity, which are the subject of our further research.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.