Ensuring the functioning of cyberspace in Ukraine: Legal and technical aspects

Authors

DOI:

https://doi.org/10.51798/sijis.v5i3.787

Keywords:

cyberspace, cybersecurity, information security, information space, national security, cyber threat

Abstract

The authors studied in detail the technical, social, and legal features of the functioning of cybernetic space. The study gives definitions of the cybernetic domain (space) and related terms, such as information space (sphere), cybersecurity, information security, and the like, it indicates goals, objects, and subjects of interaction in cyberspace. Separately considered are its elements such as uncertainty, deterritoriality and the plurality of actors. In the course of this scientific study, the approaches of scholars who researched the cybernetic domain and related categories were analyzed, appropriate conclusions were made on the basis of their work, and the conceptual basis of the work was formed. The authors provide options for solving problems that arise during the use of cyberspace and the information sphere in general, as well as recommendations for ensuring the cybernetic and information security of the state of Ukraine. The methodological basis for this study was the generally recognized criteria of scientific objectivity, as well as other general scientific research methods that provide a comprehensive analysis of cyberspace as an objective new, fourth domain in a range of air, water, and land spaces of Ukraine. The recommendations and suggestions given by the authors of this scientific paper, as well as the conclusions drawn by them, will help coordinate information policy so that Ukraine can become a worthy member of the global information space, and directly cyberspace based on equality and independence.

Author Biographies

Iryna Sopilko, National Aviation University Kyiv, Ukraine

Professor and University researcher. National Aviation University Kyiv, Ukraine

Valeriia Filinovych, National Aviation University, Ukraine

University lecturer and researcher. Department of Civil Law and Trial, National Aviation University, Ukraine

Olena V. Prudnykova, Yaroslav Mudryi National Law University, Ukraine

University lecturer and researcher. Department of Сulturology, Yaroslav Mudryi National Law University, Ukraine

Anastasiia Krupnova, Stepan Demyanchuk International University of Economics and Humanities, Ukraine

University lecturer and researcher. Stepan Demyanchuk International University of Economics and Humanities, Ukraine

Nataliia Smetanina, Yaroslav Mudryі National Law University, Ukraine

University lecturer and researcher. Department of Criminology and Penitentiary Law, Yaroslav Mudryі National Law University, Ukraine

References

Bohdanyok O. (2022). This is the world’s first cyber war. The Ministry of Digital told about the Ukrainian IT army. In Suspilne News. Retrieved from: https://suspilne.media/222186-ce-persa-u-sviti-kibervijna-u-mincifri-rozpovili-pro-ukrainsku-it-armiu/

Carnegie Endowment for International Peace. (2021). A brief primer on international law and cyberspace (2021). Retrieved from: https://carnegieendowment.org/2021/06/14/brief-primer-on-international-law-and-cyberspace-pub-84763

Cherniavskyi, S. S., Golovkin, B. N., Chornous, Y. M., Bodnar, V. Y., Zhuk, I. V. (2019). International cooperation in the field of fighting crime: directions, levels and forms of realization. Journal of Legal, Ethical and Regulatory, 22(3). Retrieved from: https://www.abacademies.org/articles/International-cooperation-in-the-field-of-fighting-crime-directions-levels-and-forms-of-realization-1544-0044-22-3-348.pdf

Committee on National Security Systems (CNSS) Glossary (2022). CNSSI 4009. Retrieved from: https://www.serdp-estcp.org/content/download/47576/453617/file/CNSSI%204009%20Glossary%202015.pdf

Duhaime Legal Dictionary. (2022). Cyberspace Definition. Retrieved from: https://www.duhaime.org/legal-dictionary/term/cyberspace

Folsom, T. C. (2007). Defining Cyberspace (Finding Real Virtue in the Place of Virtual Reality). Tulane Journal of Technology & Intellectual Property, 9, 75. Retrieved from: https://ssrn.com/abstract=1350999.

Furashev, V. M. (2012). Cyberspace and information space, cybersecurity and information security: essence, definition, differences. Information and Law, 2(5), 162–175.

Gibson, W. (2004). Neuromancer: 20th anniversary edition. New York: Ace Books.

Girich, V. L. & Chuprina, V. N. (2007). Global information space and the problem of access to world information resources. Retrieved from: http://marc21.rsl.ru/upload/mba2007/mba2007_05.pdf

Guo, Q., Gao, C., Jiang, D., Wang, Z., Fang, C. & Hao, M. (2019). Theoretical basis and technical methods of cyberspace geography. Journal of Geographical Sciences, 29(12), 1949–1964. Retrieved from: https://doi.org/10.1007/s11442-019-1698-7

Lieberman, J. (2010). S.3480 - Protecting Cyberspace as a National Asset Act of 2010. 111th Congress. Homeland Security and Governmental Affairs. Retrieved from: https://www.congress.gov/bill/111th-congress/senate-bill/3480/text

Medeiros, B. P. & Goldoni, L. R. F. (2020). The fundamental conceptual trinity of cyberspace. Contexto internacional, 42(1), 31–54. Retrieved from: https://doi.org/10.1590/s0102-8529.2019420100002

Mitra, A. (2013). Cybernetic Space. Journal of Interactive Advertising, 3(2), 1-9.

Morningstar, C. & Farmer, F. R. (2003). The Lessons of Lucasfilm’s Habitat. The New Media Reader (pp. 664-667). Cambridge, Massachusetts, London: The MIT Press. Retrieved from: https://monoskop.org/images/4/4c/Wardrip-Fruin_Noah_Montfort_Nick_eds_The_New_Media_Reader.pdf

Myronets, O.M., Burdin, M., Tsukan, O. & Nesteriak, Y. (2019). Prevention of human rights violation. Asia Life Sciences, 21(2), 577–591.

National Institute of Standards and Technology (NIST). (2011). Special Publication 800-30. Revision 1. Gaithersburg: National Institute of Standards and Technology. Retrieved from: https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-30r1.pdf

National Institute of Standards and Technology (NIST). (2015). Supplemental Information for the Interagency Report on Strategic U. S. Government Engagement in International Standardization to Achieve U. S. . NISTIR 8074. Retrieved from: https://nvlpubs.nist.gov/nistpubs/ir/2015/NIST.IR.8074v2.pdf

National Institute of Standards and Technology (NIST). (2021). Developing Cyber-Resilient Systems: A Systems Security Engineering Approach (2021). NIST Special Publication 800-160. Revision 1. Retrieved from: https://doi.org/10.6028/NIST.SP.800-160v2r1

National Institute of Standards and Technology (NIST). (2021). Security and Privacy Controls for Federal Information Systems and Organizations. NIST Special Publication 800-53 Revision. 5. Retrieved from: https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-53r4.pdf

National Institute of Standards and Technology (NIST)b. Managing Information Security Risk. Organization, Mission, and Information System View (2011). NIST Special Publication 800-39. Gaithersburg: National Institute of Standards and Technology. Retrieved from: https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-39.pdf

Polanski, P. (2017). Cyberspace: A new branch of international customary law? Computer Law & Security Review, 33(3), 371-381.

Proskurina, O. (2009). Information strategy of Ukraine in the modern geopolitical space. Information Society, 3, 1–8. Retrieved from: https://ipiend.gov.ua/wp-content/uploads/2018/07/proskurina_informatsina.pdf

Shanker, A. & Usha, G. (2017). Cyber threat landscape in cyber space. In: International conference of Electronics, Communication and Aerospace Technology (ICECA) (375-380). Coimbatore: IEEE.

Smovzhenko, T. S. & Skrynnyk, Z. E. (2015). Ukrainian people in the European world: the dimension of identity. Kyiv: UBD NBU. 609 p.

Sopilko, I. M. (2021). Information security as an object of regulation in the law of Ukraine. Journal of International Legal Communication, 1(1), 11–22. Retrieved from: https://doi.org/10.32612/uw.27201643.2021.1.

Techopedia. (2022). What Does Cyberspace Mean?. Techopedia. Retrieved from: https://www.techopedia.com/definition/2493/cyberspace

TheFreeDictionary. (2022). Definition of cyberspace. Retrieved from: https://legal-dictionary.thefreedictionary.com/cyberspace

Tsypko, V., Alieksieieva, Kateryna I., Venger, I. A., Tavolzhanskyi, O. V., Galunets, N. I. & Klyuchnik, A. V. (2019). Information policy of the enterprise as the basis for the reproduction of human potential in the structure of public social interaction. Journal of Advanced Research in Law and Economics, 10(6), 1664-1672.

Ukrainian Government (2022). Law of Ukraine No. 2657-XII. Retrieved from: https://zakon.rada.gov.ua/laws/show/2657-12#text

Ukrainian Government. (2007). On the Basic principles for the development of the information society in Ukraine for 2007-2015 (2007). Law of Ukraine No. 537-V. Retrieved from: https://zakon.rada.gov.ua/laws/show/537-16#text

Ukrainian Government. (2022). On the main principles of ensuring the cybersecurity of Ukraine. Law of Ukraine of No. 2163-VIII. Retrieved from: https://zakon.rada.gov.ua/laws/show/2163-19#text

Ukrainska Pravda. (2022). Cyber-attacks on Ukrainian web resources are possible on February 22 – CERT-UA. In Ukrainska Pravda. Retrieved from: https://www.epravda.com.ua/rus/news/2022/02/21/682554/

Ukrainska Pravda. (2022b)Russia daily carries out more than 10 cyber-attacks on strategic objects of Ukraine – SSU (2022). In Ukrainska Pravda. Retrieved from: https://www.pravda.com.ua/rus/news/2022/11/9/7375609/

Vapniarchuk, V. V., Puchkovska, I. I., Tavolzhanskyi, O. V., Tashian, R. I. (2019). Protection of ownership right in the court: the essence and particularities. Asia Life Science, 21(2), 1-19.

Virchow, D. & Braun, J. (2000). Okinawa Charter for the Global Information Society. Geology. Retrieved from: https://www.semanticscholar.org/paper/Okinawa-Charter-on-Global-Information-Society-Virchow-Braun/3eae8bc9b7564b4dd0840d744fad1280038d9131

Weiss, M. & Biermann, F. (2021). Cyberspace and the protection of critical national infrastructure. Journal of Economic Policy Reform, 1–18. Retrieved from: https://doi.org/10.1080/17487870.2021.1905530

Wu, J. (2022). Cyberspace Endogenous Safety and Security. Engineering, 12, 179-185.

Zetter, K. (2016). Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid. In WIRED. Retrieved from: https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/

Zhang, L., Pan, Y., Liu, Y., Zheng, Q., & Pan, Z. (2022). Multiple Domain Cyberspace Attack and Defense Game Based on Reward Randomization Reinforcement Learning. Array, 16, 100262

Downloads

Published

2024-08-15

How to Cite

Sopilko, I., Filinovych, V. ., Prudnykova, O. V. ., Krupnova, A. ., & Smetanina, N. . (2024). Ensuring the functioning of cyberspace in Ukraine: Legal and technical aspects. Sapienza: International Journal of Interdisciplinary Studies, 5(3), e24055. https://doi.org/10.51798/sijis.v5i3.787

Issue

Section

Economic & Social Sciences - Original Articles