Abstract

The article examines the main concepts of information security of Ukraine, which affect national security, taking into account the existing conditions. The beginning of a full-scale invasion of Russian troops on the territory of Ukraine forced our entire country not only to go into martial law, but also to radically change the tactics of actions in order to preserve its integrity. The insidiousness of the enemy lies not only in the invasion, but also in the peculiarities of the struggle, which is reflected in the spread of false information. Thus, the enemy uses the tactics of a hybrid war, in which, in addition to cruise missiles, armed offensives, and psychological pressure, citizens of not only temporarily occupied territories are subjected. Due to active attempts of information attacks, one of the main threats to information security is disinformation of the entire society. World trends indicate that the active deepening of the spheres of professional activity, education, science, and technology is connected with the dynamic development of social life. The current state of information technology development should correspond to the dynamics of the development of state and private information structures. As a result, Ukraine actively implements all requirements for providing all spheres of life with highly qualified personnel in the field of information provision. However, the enemy's active attempts to attack information resources for their own purposes force us to examine the concept of information security from another angle. Negative informational influence occurs due to the use of the latest technologies of influence through the dissemination of known false information that causes internal conflicts of a national and religious nature, undermines the faith of citizens in state administration, promotes the beginning of internal armed conflicts, violates the sovereignty and territorial integrity of the state. Timely detection of negative information impact requires scientific substantiation of the concept of information security and the ability to assess all possible threats and impacts in order to minimize their consequences. The relevance of using such an approach is due to the search and application of current models for the detection of informational influences.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call