Ensuring the functioning of cyberspace in Ukraine: Legal and technical aspects
DOI:
https://doi.org/10.51798/sijis.v5i3.787Keywords:
cyberspace, cybersecurity, information security, information space, national security, cyber threatAbstract
The authors studied in detail the technical, social, and legal features of the functioning of cybernetic space. The study gives definitions of the cybernetic domain (space) and related terms, such as information space (sphere), cybersecurity, information security, and the like, it indicates goals, objects, and subjects of interaction in cyberspace. Separately considered are its elements such as uncertainty, deterritoriality and the plurality of actors. In the course of this scientific study, the approaches of scholars who researched the cybernetic domain and related categories were analyzed, appropriate conclusions were made on the basis of their work, and the conceptual basis of the work was formed. The authors provide options for solving problems that arise during the use of cyberspace and the information sphere in general, as well as recommendations for ensuring the cybernetic and information security of the state of Ukraine. The methodological basis for this study was the generally recognized criteria of scientific objectivity, as well as other general scientific research methods that provide a comprehensive analysis of cyberspace as an objective new, fourth domain in a range of air, water, and land spaces of Ukraine. The recommendations and suggestions given by the authors of this scientific paper, as well as the conclusions drawn by them, will help coordinate information policy so that Ukraine can become a worthy member of the global information space, and directly cyberspace based on equality and independence.
References
Bohdanyok O. (2022). This is the world’s first cyber war. The Ministry of Digital told about the Ukrainian IT army. In Suspilne News. Retrieved from: https://suspilne.media/222186-ce-persa-u-sviti-kibervijna-u-mincifri-rozpovili-pro-ukrainsku-it-armiu/
Carnegie Endowment for International Peace. (2021). A brief primer on international law and cyberspace (2021). Retrieved from: https://carnegieendowment.org/2021/06/14/brief-primer-on-international-law-and-cyberspace-pub-84763
Cherniavskyi, S. S., Golovkin, B. N., Chornous, Y. M., Bodnar, V. Y., Zhuk, I. V. (2019). International cooperation in the field of fighting crime: directions, levels and forms of realization. Journal of Legal, Ethical and Regulatory, 22(3). Retrieved from: https://www.abacademies.org/articles/International-cooperation-in-the-field-of-fighting-crime-directions-levels-and-forms-of-realization-1544-0044-22-3-348.pdf
Committee on National Security Systems (CNSS) Glossary (2022). CNSSI 4009. Retrieved from: https://www.serdp-estcp.org/content/download/47576/453617/file/CNSSI%204009%20Glossary%202015.pdf
Duhaime Legal Dictionary. (2022). Cyberspace Definition. Retrieved from: https://www.duhaime.org/legal-dictionary/term/cyberspace
Folsom, T. C. (2007). Defining Cyberspace (Finding Real Virtue in the Place of Virtual Reality). Tulane Journal of Technology & Intellectual Property, 9, 75. Retrieved from: https://ssrn.com/abstract=1350999.
Furashev, V. M. (2012). Cyberspace and information space, cybersecurity and information security: essence, definition, differences. Information and Law, 2(5), 162–175.
Gibson, W. (2004). Neuromancer: 20th anniversary edition. New York: Ace Books.
Girich, V. L. & Chuprina, V. N. (2007). Global information space and the problem of access to world information resources. Retrieved from: http://marc21.rsl.ru/upload/mba2007/mba2007_05.pdf
Guo, Q., Gao, C., Jiang, D., Wang, Z., Fang, C. & Hao, M. (2019). Theoretical basis and technical methods of cyberspace geography. Journal of Geographical Sciences, 29(12), 1949–1964. Retrieved from: https://doi.org/10.1007/s11442-019-1698-7
Lieberman, J. (2010). S.3480 - Protecting Cyberspace as a National Asset Act of 2010. 111th Congress. Homeland Security and Governmental Affairs. Retrieved from: https://www.congress.gov/bill/111th-congress/senate-bill/3480/text
Medeiros, B. P. & Goldoni, L. R. F. (2020). The fundamental conceptual trinity of cyberspace. Contexto internacional, 42(1), 31–54. Retrieved from: https://doi.org/10.1590/s0102-8529.2019420100002
Mitra, A. (2013). Cybernetic Space. Journal of Interactive Advertising, 3(2), 1-9.
Morningstar, C. & Farmer, F. R. (2003). The Lessons of Lucasfilm’s Habitat. The New Media Reader (pp. 664-667). Cambridge, Massachusetts, London: The MIT Press. Retrieved from: https://monoskop.org/images/4/4c/Wardrip-Fruin_Noah_Montfort_Nick_eds_The_New_Media_Reader.pdf
Myronets, O.M., Burdin, M., Tsukan, O. & Nesteriak, Y. (2019). Prevention of human rights violation. Asia Life Sciences, 21(2), 577–591.
National Institute of Standards and Technology (NIST). (2011). Special Publication 800-30. Revision 1. Gaithersburg: National Institute of Standards and Technology. Retrieved from: https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-30r1.pdf
National Institute of Standards and Technology (NIST). (2015). Supplemental Information for the Interagency Report on Strategic U. S. Government Engagement in International Standardization to Achieve U. S. . NISTIR 8074. Retrieved from: https://nvlpubs.nist.gov/nistpubs/ir/2015/NIST.IR.8074v2.pdf
National Institute of Standards and Technology (NIST). (2021). Developing Cyber-Resilient Systems: A Systems Security Engineering Approach (2021). NIST Special Publication 800-160. Revision 1. Retrieved from: https://doi.org/10.6028/NIST.SP.800-160v2r1
National Institute of Standards and Technology (NIST). (2021). Security and Privacy Controls for Federal Information Systems and Organizations. NIST Special Publication 800-53 Revision. 5. Retrieved from: https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-53r4.pdf
National Institute of Standards and Technology (NIST)b. Managing Information Security Risk. Organization, Mission, and Information System View (2011). NIST Special Publication 800-39. Gaithersburg: National Institute of Standards and Technology. Retrieved from: https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-39.pdf
Polanski, P. (2017). Cyberspace: A new branch of international customary law? Computer Law & Security Review, 33(3), 371-381.
Proskurina, O. (2009). Information strategy of Ukraine in the modern geopolitical space. Information Society, 3, 1–8. Retrieved from: https://ipiend.gov.ua/wp-content/uploads/2018/07/proskurina_informatsina.pdf
Shanker, A. & Usha, G. (2017). Cyber threat landscape in cyber space. In: International conference of Electronics, Communication and Aerospace Technology (ICECA) (375-380). Coimbatore: IEEE.
Smovzhenko, T. S. & Skrynnyk, Z. E. (2015). Ukrainian people in the European world: the dimension of identity. Kyiv: UBD NBU. 609 p.
Sopilko, I. M. (2021). Information security as an object of regulation in the law of Ukraine. Journal of International Legal Communication, 1(1), 11–22. Retrieved from: https://doi.org/10.32612/uw.27201643.2021.1.
Techopedia. (2022). What Does Cyberspace Mean?. Techopedia. Retrieved from: https://www.techopedia.com/definition/2493/cyberspace
TheFreeDictionary. (2022). Definition of cyberspace. Retrieved from: https://legal-dictionary.thefreedictionary.com/cyberspace
Tsypko, V., Alieksieieva, Kateryna I., Venger, I. A., Tavolzhanskyi, O. V., Galunets, N. I. & Klyuchnik, A. V. (2019). Information policy of the enterprise as the basis for the reproduction of human potential in the structure of public social interaction. Journal of Advanced Research in Law and Economics, 10(6), 1664-1672.
Ukrainian Government (2022). Law of Ukraine No. 2657-XII. Retrieved from: https://zakon.rada.gov.ua/laws/show/2657-12#text
Ukrainian Government. (2007). On the Basic principles for the development of the information society in Ukraine for 2007-2015 (2007). Law of Ukraine No. 537-V. Retrieved from: https://zakon.rada.gov.ua/laws/show/537-16#text
Ukrainian Government. (2022). On the main principles of ensuring the cybersecurity of Ukraine. Law of Ukraine of No. 2163-VIII. Retrieved from: https://zakon.rada.gov.ua/laws/show/2163-19#text
Ukrainska Pravda. (2022). Cyber-attacks on Ukrainian web resources are possible on February 22 – CERT-UA. In Ukrainska Pravda. Retrieved from: https://www.epravda.com.ua/rus/news/2022/02/21/682554/
Ukrainska Pravda. (2022b)Russia daily carries out more than 10 cyber-attacks on strategic objects of Ukraine – SSU (2022). In Ukrainska Pravda. Retrieved from: https://www.pravda.com.ua/rus/news/2022/11/9/7375609/
Vapniarchuk, V. V., Puchkovska, I. I., Tavolzhanskyi, O. V., Tashian, R. I. (2019). Protection of ownership right in the court: the essence and particularities. Asia Life Science, 21(2), 1-19.
Virchow, D. & Braun, J. (2000). Okinawa Charter for the Global Information Society. Geology. Retrieved from: https://www.semanticscholar.org/paper/Okinawa-Charter-on-Global-Information-Society-Virchow-Braun/3eae8bc9b7564b4dd0840d744fad1280038d9131
Weiss, M. & Biermann, F. (2021). Cyberspace and the protection of critical national infrastructure. Journal of Economic Policy Reform, 1–18. Retrieved from: https://doi.org/10.1080/17487870.2021.1905530
Wu, J. (2022). Cyberspace Endogenous Safety and Security. Engineering, 12, 179-185.
Zetter, K. (2016). Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid. In WIRED. Retrieved from: https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/
Zhang, L., Pan, Y., Liu, Y., Zheng, Q., & Pan, Z. (2022). Multiple Domain Cyberspace Attack and Defense Game Based on Reward Randomization Reinforcement Learning. Array, 16, 100262
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Iryna Sopilko, Valeriia Filinovych, Olena V. Prudnykova, Anastasiia Krupnova, Nataliia Smetanina
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.