The modern world is not the first year talking about the possibility of conducting hostilities in cyberspace. This happened after 2010, when on the example of Iran the world saw that Malicious software could have a significant impact on reality and stop the processes taking place in the real world. At the moment, even regulation has been developed on how these cyber confrontations are to take place and on what rules to take place (the theoretical developments laid out in the first and second Tallinn Manuals are meant). In Ukraine, the process of legal regulation of securing the cybersecurity of the country is precisely the issue, which began to explore quite late in 2015, when the Strategy for the Cybersecurity of Ukraine was adopted. The d...
In the article, the author analyzes information interventions as threats to the cybernetic security ...
On 24th of February, 2022, the Russian Federation launched an invasion of Ukraine. This is the first...
Recent events in Ukraine have shown that, along with the advancement of information technology, meth...
To date, the problem of cybersecurity is topical. Every day, each of us is faced with the need ...
Russia and Ukraine have had tense relations since 2014, with violence erupting as a result. Cyber-at...
The purpose of the article is to analyze the state of legal support cybersecurity in Ukraine and to ...
The aim of the article is to analyse the concepts of «cyber hygiene», «cyber security», «cyber prote...
The increasing access to and subsequent use of technology has dramatically impacted the way in which...
The subject of the article oscillates around issues related to the shaping of legal regulations rega...
Russia’s invasion of Ukraine ushers in a new era of conflict between technologically advanced states...
The aim of the article is to study the issue of achieving a balance between information protection ...
Problem setting. Ukraine continues its integration processes with the international community, in pa...
The thesis analyses cyberaggression of the Russian Federation against Ukraine as an essential compon...
The Ukrainian conflict started with the invasion of Crimea by Russian troops. As the conflict contin...
While conflict in cyberspace is not new, the legality of hostile cyber activity at a state level rem...
In the article, the author analyzes information interventions as threats to the cybernetic security ...
On 24th of February, 2022, the Russian Federation launched an invasion of Ukraine. This is the first...
Recent events in Ukraine have shown that, along with the advancement of information technology, meth...
To date, the problem of cybersecurity is topical. Every day, each of us is faced with the need ...
Russia and Ukraine have had tense relations since 2014, with violence erupting as a result. Cyber-at...
The purpose of the article is to analyze the state of legal support cybersecurity in Ukraine and to ...
The aim of the article is to analyse the concepts of «cyber hygiene», «cyber security», «cyber prote...
The increasing access to and subsequent use of technology has dramatically impacted the way in which...
The subject of the article oscillates around issues related to the shaping of legal regulations rega...
Russia’s invasion of Ukraine ushers in a new era of conflict between technologically advanced states...
The aim of the article is to study the issue of achieving a balance between information protection ...
Problem setting. Ukraine continues its integration processes with the international community, in pa...
The thesis analyses cyberaggression of the Russian Federation against Ukraine as an essential compon...
The Ukrainian conflict started with the invasion of Crimea by Russian troops. As the conflict contin...
While conflict in cyberspace is not new, the legality of hostile cyber activity at a state level rem...
In the article, the author analyzes information interventions as threats to the cybernetic security ...
On 24th of February, 2022, the Russian Federation launched an invasion of Ukraine. This is the first...
Recent events in Ukraine have shown that, along with the advancement of information technology, meth...