ADMINISTRATIVE AND LEGAL BASIS FOR AUTHORIZING SECURITY AND DEFENSE SECTOR BODIES TO ORGANIZE CYBER TO INTELLIGENCE ACTIVITIES
DOI:
https://doi.org/10.28925/2663-4023.2023.21.616Keywords:
administrative and legal bases; organization; implementation; activities; cyber to intelligence; cyber intelligence; information collection; cyberspace; security and defense sectorAbstract
In a hybrid war, the winner is the party that first creates conditions for violating the target function of the operability of the information security system and cybersecurity of critical information infrastructure facilities. To create prerequisites for a violation of the target function, it is necessary to identify vulnerabilities in the information security system and cybersecurity of enemy critical information infrastructure facilities in advance. This task is performed during Cyber to Intelligence. For a long time, the concept of cyber to intelligence was absent from scientific research, but the activity as such was already carried out in the context of cyber intelligence. Only in 2021, at the legislative level, it was adopted to understand cyber to intelligence as activities aimed at identifying vulnerabilities in software, telecommunications equipment, automated control systems for forces, weapons and/or technological processes of a certain target (cyber infrastructure object). The subject of research in the scientific article is the justification of the administrative and legal foundations of the organization of cyber to intelligence. To achieve the goal and the set task, theoretical research methods were used: generalization of scientific literature; structural and genetic analysis when clarifying the object and subject of research; analytical and comparative analysis when evaluating the novelty of research results; generalization-for formulating conclusions and recommendations. The research results are obtained, the scientific novelty of which consists in summarizing information about a new type of cyber to intelligence activity, a schematic description of the activity process is presented, and the most likely authorized bodies (subjects) for its implementation are identified. The components of cyber intelligence and stages of cyber intelligence are proposed. Prospects for further research in this area. The presented study does not exhaust all aspects of this problem. The theoretical results obtained in the course of scientific research form the basis for further justification of the formalized form for conducting cyber to intelligence.
Downloads
References
Khlaponin, Yu.I., Kozubtsova, L.M., Kozubtsov, I.M., Shtonda, R.M. (2022). Funktsii systemy zakhystu informatsii i kiberbezpeky krytychnoi informatsiinoi infrastruktury. Kiberbezpeka osvita, nauka, tekhnika, 3, 15, 124–134.
Vdovenko, S.H., Danyk, Yu.H., Permiakov, O.Yu. (2020). Dosvid rozvytku system kiberbezpeky ta kiberoborony providnykh krain svitu. Suchasni informatsiini tekhnolohii u sferi bezpeky ta oborony, 1 (37), 31–48.
Buriachok, V.L., Hulak, H.M., Khoroshko, V.O. (2011). Do pytannia orhanizatsii ta provedennia rozvidky u kibernetychnomu prostori. Nauka i oborona, 2, 19–23.
Buriachok, V.L., Iliashov, O.A., Hulak, H.M. (2011). Poniattia kiberviiny ta rozvidky informatsiino-telekomunikatsiinykh system u konteksti zakhystu derzhavy vid storonnoho kibernetychnoho vplyvu. Zbirnyk materialiv kruhloho stolu “Aktualni pytannia pidhotovky fakhivtsiv iz rozsliduvannia kiberzlochyniv”, (rr. 27–32). Kyiv: NA SB Ukrainy.
Buriachok, V.L., Korchenko, O.H., Buriachok, L.V. (2012). Sotsialna inzheneriia yak metod rozvidky informatsiino-telekomunikatsiinykh system. Zhurnal «Zakhyst informatsii», 14, 4 (57), 5–11.
Danyk, Yu.H., Vorobiienko, P.P., Cherneha, V.M. (2019). Osnovy kiberbezpeky ta kiberoborony: pidruchnyk. Odesa: ONAZ im. O.S. Popova.
Cherednychenko, O.Yu., Fesokha, V.V., Protsiuk, Yu.O., Bondarenko, T.V. (2018). Analiz isnuiuchykh pidkhodiv protydii naiposhyrenishym kibernetychnym vtruchanniam v informatsiino–telekomunikatsiini merezhi. Suchasni informatsiini tekhnolohii u sferi bezpeky ta oborony, 2(32), 13–16.
Kyva, V.Yu., Sudnikov, Ye.O., Voitko, O.V. (2018). Metody rozvidky kiberprostoru. Suchasni informatsiini tekhnolohii u sferi bezpeky ta oborony, 3 (33), 45–52.
Hatsenko, S.S., Lishchenko, O.M., Sotnichenko, A.I., Zharkov, Ya.A. (2020). Matematychna model protsesu rozviduvalno-informatsiinoi diialnosti v umovakh nevyznachenosti. Suchasni informatsiini tekhnolohii u sferi bezpeky ta oborony, 1 (37), 77–84.
Ukaz Prezydenta Ukrainy (2016). Stratehiia kiberbezpeky Ukrainy, 96, https://zakon.rada.gov.ua/laws/show/96/2016/ed20160315.
Proekt Ukazu Prezydenta Ukrainy (2021). “Pro rishennia Rady natsionalnoi bezpeky i oborony Ukrainy”, “Pro Stratehichnyi oboronnyi biuleten Ukrainy”, https://www.mil.gov.ua/content/pdf/up_rrnb.pdf.
Ukaz Prezydenta Ukrainy (2021). “Pro rishennia Rady natsionalnoi bezpeky i oborony Ukrainy vid 20 serpnia 2021 roku” 473/2021, “Pro Stratehichnyi oboronnyi biuleten Ukrainy”, https://zakon.rada.gov.ua/laws/show/473/2021.
Viiskovyi standart VST 01.101.004 – 2019 (03). Voienna rozvidka. Informatsiino-analitychna diialnist. Terminy ta vyznachennia.
Maltseva I., Chernysh Yu., Shtonda R. (2022). Analiz deiakykh kiberzahroz v umovakh viiny. Kiberbezpeka: osvita, nauka, tekhnika, 4(16), 37–44.
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Олександр Пономарьов, Леся Козубцова, Ігор Козубцов, Володимир Ткач
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.