Urgency of the research. The rapid development of IT technologies and intensive informatization of all spheres of society leads to the emergence of new information threats, so information security is one of the most important tasks of the IT industry. An important element in the development of new methods of information protection is the search for vulnerabilities in information systems. Target setting A promising area in the field of information security is the development of active methods of providing protection, among which we can highlight the search for vulnerabilities of information systems. Actual scientific researches and issues analysis. Ethical hacking and penetration testing play a significant role in modern information security research, leaving in the shadows such an effective tool as volunteer research into the vulnerabilities of public information resources. Uninvestigated parts of general matters defining. Currently, in the works of domestic and foreign scientists, insufficient attention is paid to the opportunities for volunteers to study the vulnerabilities of state information resources. The research objective. The purpose of the article is to highlight the differences between approaches to cybersecurity in business structures and government agencies of Ukraine. The statement of basic materials. Customers are providing more and more personal information to IT companies, and companies need to protect it. But virtually every program has vulnerabilities, so personal customer data can end up in the hands of criminals. Conclusions. An indicator of the work of cyberpolice is the detection of crimes. Yes, cyberpolice does a lot of good, such as catching fraudsters and distributors of child porn. However, specific computer crimes have been uncovered. That is, the level of protection by the state of both its own resources and citizens from criminal encroachments is still low.
Read full abstract