Abstract

The article analyzes the main types of nominations of modern Ukrainian cyber security terminology. The non-uniformity of cyber security terminology determined the relevance of our research. The research material was the texts of legislative acts, textbooks, articles, monographs, dictionaries and other sources of factual material in the field of cyber security. An onomasiological approach (from content to form) is adopted for the linguistic analysis of terminological material for the reason that it makes it possible to use existing or necessary ways and means of expressing a certain scientific concept in language. We have selected the following thematic groups of cyber security terms: types of cyber security; cyber security subjects; cyber security objects; actions and measures of administrative and legal nature; technological processes, procedures, programs, means of protection; names of devices and technical means; names of offenses; names of persons by family and type of activity. Cybersecurity terminology is synthetic in its nature, since the system of concepts it covers is at the intersection of several industries, including information technologies, jurisprudence, state security services, etc. Еntire term field of cyber security becomes a complex dynamic system that has an open-ended nature and exists in both verbal and non-verbal forms. Nomination in the Ukrainian terminological system of cyber security takes place according to the following types: creation of terms by all known methods of the morphological word formation of the Ukrainian language (affixation, compounding and abbreviation, non-morphological word formation, creation of compound nominative units) with varying degrees of regularity and productivity. Low-productive methods are prefix-suffix and affix-less varieties of morphological word formation, as well as morphological-syntactic and lexical-syntactic methods of semantic derivation. The most common terms in the cyber security terminology are phrases, in particular two-component ones, the main principle of which is the specification of the supporting component.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call