Abstract

Topicality. In the last decade, cyberspace has become the fifth separate, specific and important area of armed struggle, along with four traditional ones - "Earth", "Sea", "Air" and "Space". The use of cyber troops and cyber weapons, cyber defense, cyber operations and cyber-attacks is now considered commonplace. Since 2014, Ukraine has been forced to repel hybrid Russian armed aggression, including in cyberspace. But the recognition of cyber defense as a new important component of its defense took place only in March 2016 in the Cyber Security Strategy of Ukraine [1] (hereinafter - the Strategy). At the same time, it states, in particular, that "The basis of the national cybersecurity system will be the Ministry of Defense of Ukraine, the State Service for Special Communications and Information Protection of Ukraine, the Security Service of Ukraine, the National Police of Ukraine, the National Bank of Ukraine." The Strategy also for the first time for the Ministry of Defense of Ukraine (Ministry of Defense) and the General Staff of the Armed Forces of Ukraine (General Staff of the Armed Forces) identified additional new main tasks, namely: measures to prepare the state to repel military aggression in cyberspace; military cooperation with NATO related to cyber security and joint protection against cyber threats; Ensuring in cooperation with the State Service for Special Communications and Information Protection of Ukraine and the Security Service of Ukraine cyber protection of its own information infrastructure. Cyber defense - a set of political, economic, social, military, scientific, scientific and technical, informational, legal, organizational and other measures carried out in cyberspace and aimed at protecting the sovereignty and defense capabilities of the state, preventing armed conflict and repelling armed aggression. Aim and tasks. The purpose of the article is to determine the scientific basis for strengthening the state's cyber defense and creating cyber troops. The organization of effective cyber defense of the state requires the solution of a number of important tasks and, first of all, the elimination of gaps in the regulatory framework. It is unfortunate to recognize that so far, the legislation of Ukraine does not define the basics of cyber defense, especially the purpose, goals, principles and objectives of cyber defense, its subjects and objects, construction, preparation and conduct of such defense, as well as the relevant powers of public authorities. functions and tasks of military administration bodies, other state bodies, responsibilities of officials, rights and responsibilities of citizens of Ukraine, etc. And this, in our opinion, makes it impossible to adequately define the tasks of cyber troops, which should play a leading role in the implementation of cyber defense tasks and should be created to implement the aforementioned decision of the President of Ukraine. Research results. Modern challenges and integrated threats to peace and stability have given rise to new approaches to practice cooperation in the field of cyber defense. The community has arrived agreement that only by joint efforts and on the basis of international law can security be resolved problems of the global information environment in the context of countering the latest information threats. Therefore, the need for policy research is obvious cyber defense of organizations introduced recently, practical consideration of new documents and decisions on their institutional support and implementation in the activities of member states. Conclusion. The transformation of the information paradigm of global development, which is a reflection of new patterns of formation of the modern system of international relations, testifies to the innovations of international cooperation in the field of information and communication and accordingly needs to improve policies for international peace and stability. Modernization of international information security policies is determined by their ability to ensure a multilateral dialogue of international actors, take into account the different positions of global actors in combating the latest information threats and act in accordance with their statutory powers as universal international platforms for consensus on current security issues.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call