Defining requirements to develop information security concept in hybrid threats conditions. Part 2

Борсуковський, Юрій Володимирович (2019) Defining requirements to develop information security concept in hybrid threats conditions. Part 2 Кібербезпека: освіта, наука, техніка, 2 (6). pp. 112-121. ISSN 2663-4023

[thumbnail of 115] Text
115

Download (5kB)

Abstract

Current article provides the trends of the hybrid threats landscape for 2020 and further. The key aspects of the implementation of hybrid threats and ways of counteracting them in cyberspace, which are closely related to the constant change of directions of cyber-attacks, improving their efficiency and speed of implementation, the use of artificial intelligence systems to ensure the security of information resources and the creation of adaptive systems of adversity to information and cyber threats , the use of machine learning techniques for a better understanding of the current state of threats, the application of artificial intelligence principles and responsive scenarios for predicting cyberattacks, developing customized action plans that rely on artificial intelligence systems to improve threat detection and response speed, utilize counterintelligence and counter-methods to respond quickly to any spyware before initiating active action, enhancing communication between law enforcement agencies to form a unified approach for interaction between law enforcement agencies at international and local levels, government organizations, the corporate sector and experts in the field of security. The article defines the necessity for development of experts validated strategies to protect against information and cyber-attacks by criminals. The article describes the object of protection with determination of purpose and basic functions of the system, group of tasks solved in the system, classification of users of the system, organizational structure of service personnel, structure and composition of a complex of software and hardware, types of information assets stored and processed in system, structure of information flows, characteristics of channels of interaction with other systems and entry points

Item Type: Article
Uncontrolled Keywords: threats; risks; classification; cyber security; strategy; concept
Subjects: Це архівна тематика Київського університету імені Бориса Грінченка > Статті у наукометричних базах > Index Copernicus
Це архівна тематика Київського університету імені Бориса Грінченка > Статті у журналах > Фахові (входять до переліку фахових, затверджений МОН)
Divisions: Це архівні підрозділи Київського університету імені Бориса Грінченка > Факультет інформаційних технологій та математики > Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка
Depositing User: Наталія Мазур
Date Deposited: 02 Jan 2020 10:20
Last Modified: 02 Jan 2020 10:20
URI: https://elibrary.kubg.edu.ua/id/eprint/30509

Actions (login required)

View Item View Item