WORLD'S BEST PRACTICE ANALYSIS FOR CRITICAL INFORMATION INFRASTRUCTURE PROTECTION
DOI:
https://doi.org/10.28925/2663-4023.2020.10.184196Keywords:
critical information infrastructure of the state; informational security; world’s best practices, cyber threat, normative and legal baseAbstract
According to the large number of cyber incidents that occur every day, the process of critical infrastructure protection is an important not only technical but also scientific task. However, not all states in the world have an opportunity to provide high-quality protection of such infrastructure at a high level. Based on the fact that the critical information infrastructure protection should be managed at the state level, states need to develop a regulatory framework to address the above issue. Considering the legal framework of Ukraine, as in most post-Soviet countries, there is no effective approach to the protection of critical information infrastructure, such as in the USA or in the EU. The legislation of Ukraine identifies only certain objects of the socio-economic sphere, emergencies where they can lead to socially dangerous consequences, while a single procedure for identification and classification of critical infrastructure is not developed. A number of basic terms in the field of critical infrastructure protection from cyber threats, including “critical infrastructure” term, remain normatively vague. The mechanism of organization of activity and interaction of state and private structures in the process of critical infrastructure protection needs scientific substantiation. In this paper, the analysis of the world’s best practices concerning critical information infrastructure protection was carried out, that allows to improve qualitatively, at the state legislative level and practice, process of critical information infrastructure protection of Ukraine.
Downloads
References
"EUR-Lex - 32016L1148 - EN - EUR-Lex", Eur-lex.europa.eu, 2020. [Online]. Available: https://eur-lex.europa.eu/eli/dir/2016/1148/oj. [Accessed: 16- Dec- 2020].
"EUR-Lex - 32016R0679 - EN - EUR-Lex", Eur-lex.europa.eu, 2020. [Online]. Available: https://eur-lex.europa.eu/eli/reg/2016/679/oj. [Accessed: 16- Dec- 2020].
"BSIGuaÄndG Gesetz zur Umsetzung der Richtlinie (EU) 2016/1148 des Europäischen Parlaments und des Rates vom 6.", Buzer.de, 2020. [Online]. Available: https://www.buzer.de/gesetz/12607/index.htm. [Accessed: 16- Dec- 2020].
"BSIG BSI-Gesetz", Buzer.de, 2020. [Online]. Available: https://www.buzer.de/gesetz/8987/index.htm. [Accessed: 16- Dec- 2020].
Bmi.bund.de, 2020. [Online]. Available: http://www.bmi.bund.de/cybersicherheitsstrategie/BMI_CyberSicherheitsStrategie.pdf. [Accessed: 16- Dec- 2020].
Ssi.gouv.fr, 2020. [Online]. Available: https://www.ssi.gouv.fr/uploads/2015/10/strategie_nationale_securite_numerique_fr.pdf. [Accessed: 16- Dec- 2020].
Assets.publishing.service.gov.uk, 2020. [Online]. Available: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/567242/national_cyber_security_strategy_2016.pdf. [Accessed: 16- Dec- 2020].
President Decree of the Russian Federation of 05.12.2016 N 646 "On the approval of the Doctrine of information security of the Russian Federation", 2020.
H. Panyue, "National Security Law of the People's Republic of China (2015) [Effective] - Ministry of National Defense", Eng.mod.gov.cn, 2020. [Online]. Available: http://eng.mod.gov.cn/publications/2017-03/03/content_4774229.htm. [Accessed: 16- Dec- 2020].
Zakon.rada.gov.ua, 2020. [Online]. Available: https://zakon.rada.gov.ua/laws/show/2163-19#Text. [Accessed: 16- Dec- 2020].
W1.c1.rada.gov.ua, 2020. [Online]. Available: http://w1.c1.rada.gov.ua/pls/zweb2/webproc4_1?pf3511=65996. [Accessed: 16- Dec- 2020].