Javascript must be enabled to continue!
REQUIREMENTS FOR CYBER PROTECTION OF INFORMATION AND COMMUNICATION SYSTEMS AND COMMUNICATION SERVICES DURING THEIR DEPLOYMENT AND OPERATION AT THE CONTROL POINTS OF THE COMPONENTS OF THE DEFENSE AND SECURITY FORCES
View through CrossRef
The relevance of this work is due to the fact that in recent years the communication forces have been constantly developing and equipped with the latest digital means of communication, which allows them to successfully perform their assigned tasks. Today, information and communication systems that are deployed at the control points of various branches of management ensure the implementation of priority tasks for the management of troops. Functionally, the communication system and information systems are deployed at control points as a single information and communication environment based on the implementation of the latest information and communication technologies, information exchange protocols, complexes, systems and means of communication, which ensures the exchange of all types of information between bodies military management (management bodies) and control points at all levels of management. An active communication system ensures the exchange of information with guaranteed security in a single information space as a set of material functions (including personnel and other resources) that combine to perform a certain task. In turn, information systems, as a set of equipment, methods and procedures, and, if necessary, personnel organized to perform information processing functions operate in accordance with a defined structure, namely: - services, in the context of communication and information systems; - architecture, in the context of communication and information systems; - functions in the context of service-oriented architecture; - interoperability; - information protection and cyber protection. It is clear that the more important the object of management, the more capacious flow of information can be directed to it. This allows the adversary/attacker to identify the most important targets and direct other types of information to them or suppress them in various ways. Thus, in the interests of ensuring cyber protection of electronic information resources, communication and technological systems of the control points of the Armed Forces of Ukraine, the technological infrastructure of cyber protection of the Armed Forces of Ukraine has been deployed and is functioning, which is a component of the unified system of information protection and cyber protection in the information and communication systems of the Ministry of Defense and the Armed Forces of Ukraine. In these conditions, to solve the tasks of preventing unwanted interventions, disruption of the stable functioning of the information and communication environment at control points, counterweights in obtaining confidential information, data theft, and other minimally necessary components of the cyber protection infrastructure are deployed. The main components of the relevant technological infrastructure of cyber protection are the security information event management system (SIEM), the threat information exchange platform (Malware Information Sharing Platform & Threat Sharing, MISP), the centralized management system of inter-network screens and the system for detecting and countering cyber threats. including computer viruses on end equipment. Therefore, solving the tasks of ensuring cyber protection in the course of deployment and operation of electronic communication networks and communication services at the control points of various branches of management turns out to be quite a serious and urgent task.
Taras Shevchenko National University of Kyiv
Title: REQUIREMENTS FOR CYBER PROTECTION OF INFORMATION AND COMMUNICATION SYSTEMS AND COMMUNICATION SERVICES DURING THEIR DEPLOYMENT AND OPERATION AT THE CONTROL POINTS OF THE COMPONENTS OF THE DEFENSE AND SECURITY FORCES
Description:
The relevance of this work is due to the fact that in recent years the communication forces have been constantly developing and equipped with the latest digital means of communication, which allows them to successfully perform their assigned tasks.
Today, information and communication systems that are deployed at the control points of various branches of management ensure the implementation of priority tasks for the management of troops.
Functionally, the communication system and information systems are deployed at control points as a single information and communication environment based on the implementation of the latest information and communication technologies, information exchange protocols, complexes, systems and means of communication, which ensures the exchange of all types of information between bodies military management (management bodies) and control points at all levels of management.
An active communication system ensures the exchange of information with guaranteed security in a single information space as a set of material functions (including personnel and other resources) that combine to perform a certain task.
In turn, information systems, as a set of equipment, methods and procedures, and, if necessary, personnel organized to perform information processing functions operate in accordance with a defined structure, namely: - services, in the context of communication and information systems; - architecture, in the context of communication and information systems; - functions in the context of service-oriented architecture; - interoperability; - information protection and cyber protection.
It is clear that the more important the object of management, the more capacious flow of information can be directed to it.
This allows the adversary/attacker to identify the most important targets and direct other types of information to them or suppress them in various ways.
Thus, in the interests of ensuring cyber protection of electronic information resources, communication and technological systems of the control points of the Armed Forces of Ukraine, the technological infrastructure of cyber protection of the Armed Forces of Ukraine has been deployed and is functioning, which is a component of the unified system of information protection and cyber protection in the information and communication systems of the Ministry of Defense and the Armed Forces of Ukraine.
In these conditions, to solve the tasks of preventing unwanted interventions, disruption of the stable functioning of the information and communication environment at control points, counterweights in obtaining confidential information, data theft, and other minimally necessary components of the cyber protection infrastructure are deployed.
The main components of the relevant technological infrastructure of cyber protection are the security information event management system (SIEM), the threat information exchange platform (Malware Information Sharing Platform & Threat Sharing, MISP), the centralized management system of inter-network screens and the system for detecting and countering cyber threats.
including computer viruses on end equipment.
Therefore, solving the tasks of ensuring cyber protection in the course of deployment and operation of electronic communication networks and communication services at the control points of various branches of management turns out to be quite a serious and urgent task.
Related Results
THE EVOLUTION OF CYBER RESILIENCE FRAMEWORKS IN NETWORK SECURITY: A CONCEPTUAL ANALYSIS
THE EVOLUTION OF CYBER RESILIENCE FRAMEWORKS IN NETWORK SECURITY: A CONCEPTUAL ANALYSIS
The Evolution of Cyber Resilience Frameworks in Network Security: A Conceptual Analysis provides a comprehensive overview of the development and application of cyber resilience fra...
CYBER SECURITY UNVEILED PROTECTING THE DIGITAL FRONTIER
CYBER SECURITY UNVEILED PROTECTING THE DIGITAL FRONTIER
“CYBER SECURITY UNVEILED: PROTECTING THE DIGITAL FRONTIER” is a comprehensive guide designed to illuminate the multifaceted world of cyber security, offering both novices and exper...
THE ESSENCE OF UKRAINE'S CYBER DEFENSE: DEFINITION AND CONTRADICTIONS OF LEGAL AND THEORETICAL PRINCIPLES
THE ESSENCE OF UKRAINE'S CYBER DEFENSE: DEFINITION AND CONTRADICTIONS OF LEGAL AND THEORETICAL PRINCIPLES
Since the beginning of the Russian Federation’s hybrid aggression in 2014, and especially after the full-scale invasion in 2022, Ukraine has become the target of large-scale cybera...
An Empirical Study on Cyber Crimes Against Women and Children in India
An Empirical Study on Cyber Crimes Against Women and Children in India
The aim of the study is to understand the Cyber-crimes against women and Children in India for a period of five years from 2017 to 2021. The study is based on Secondary data collec...
Cybersecurity and Organisational Performance – the Interplay
Cybersecurity and Organisational Performance – the Interplay
The interplay between cybersecurity and organisational performance is multifaceted in nature, as it is related to how cybersecurity impacts and is impacted by various organisationa...
Comparative Analysis Of A Multi-Layered Weapon System For City Air Defense In The Modern Warfare
Comparative Analysis Of A Multi-Layered Weapon System For City Air Defense In The Modern Warfare
In the era of modern warfare, urban defense is a very important aspect to maintain the security and stability of a country. Because modern war is a non-military war in which develo...
CYBER SECURITY ETHICS
CYBER SECURITY ETHICS
Cyber Security Ethics- Navigation Privacy and Data Protection is a comprehensive guide designed for professionals, students, and organizations looking to understand the ethical dim...
Cyber operational risk scenarios for insurance companies
Cyber operational risk scenarios for insurance companies
Abstract
Cyber Operational Risk: Cyber risk is routinely cited as one of the most important sources of operational risks facing organisations today, in various publications and ...

