At present, considerable attention is paid to protecting the critical infrastructure of Ukraine in which widely used information technologies (IT). At the same time, IT development contributes to creating new vulnerabilities and potential threats to critical information infrastructure (CII) and especially for state secrets the disclosure of which may damage the national security of the state. Therefore, there is a need to assess the negative consequences for national security in the event of a leakage of state secrets. In view of this, developed the structure of method for assessing the consequences of leakage of state secrets from cyber attacks to the CII of the state. Which, with the help of the specified parameters, will enable to...
States, organizations and individuals are becoming targets of both individual and state-sponsored cy...
The cognitive aim of this paper is to analyze the problem of cyber attacks on the critical infrastru...
Critical Infrastructure is often overlooked from an Information Security perspective as being of hig...
One of the most important tasks of national security in modern conditions is to ensure the security ...
The analysis of the impact on the ecology of the state of cybersecurity of critical infrastructure o...
In the 21st century, there are many threats and challenges in the world. All this poses a significan...
The main purpose of the study is to determine the key aspects of the mechanisms of state management ...
Wydział Nauk Politycznych i DziennikarstwaZasadniczym problem badawczym pracy jest próba odpowiedzi ...
Cyber security is the most critical aspect nowadays of our technologically based lives. Government i...
The paper discusses the modeling of various aspects of the security of critical information infrastr...
The world trends in increasing of threats of natural and man-made nature, a level of terrorist threa...
Pojęcie „infrastruktura krytyczna” opisuje obiekty fizyczne, systemy zaopatrzenia, technologie infor...
Critical infrastructures are vital assets for public safety, economic welfare, and the national secu...
Pēdējo divu desmitgažu straujā tehnoloģiskā attīstība ir veicinājusi diskusijas par draudiem valsts ...
As the information age matures, major social infrastructures such as communication, finance, militar...
States, organizations and individuals are becoming targets of both individual and state-sponsored cy...
The cognitive aim of this paper is to analyze the problem of cyber attacks on the critical infrastru...
Critical Infrastructure is often overlooked from an Information Security perspective as being of hig...
One of the most important tasks of national security in modern conditions is to ensure the security ...
The analysis of the impact on the ecology of the state of cybersecurity of critical infrastructure o...
In the 21st century, there are many threats and challenges in the world. All this poses a significan...
The main purpose of the study is to determine the key aspects of the mechanisms of state management ...
Wydział Nauk Politycznych i DziennikarstwaZasadniczym problem badawczym pracy jest próba odpowiedzi ...
Cyber security is the most critical aspect nowadays of our technologically based lives. Government i...
The paper discusses the modeling of various aspects of the security of critical information infrastr...
The world trends in increasing of threats of natural and man-made nature, a level of terrorist threa...
Pojęcie „infrastruktura krytyczna” opisuje obiekty fizyczne, systemy zaopatrzenia, technologie infor...
Critical infrastructures are vital assets for public safety, economic welfare, and the national secu...
Pēdējo divu desmitgažu straujā tehnoloģiskā attīstība ir veicinājusi diskusijas par draudiem valsts ...
As the information age matures, major social infrastructures such as communication, finance, militar...
States, organizations and individuals are becoming targets of both individual and state-sponsored cy...
The cognitive aim of this paper is to analyze the problem of cyber attacks on the critical infrastru...
Critical Infrastructure is often overlooked from an Information Security perspective as being of hig...