Cyberthreats as a Component of Threats in the Contemporary World (a Legal Aspect)
Abstract
In their paper, the authors studied legal understanding of cyber threats in the contemporary world. The emphasis was placed on the fact thatthere is no definition of ʽcyber threatsʼ at both the international and domestic levels, which leads to adverse consequences. The authors suggested their own perception of ʽa cyber threatʼ – illegal punishable acts of subjects of information legal relations that create a danger to vital interests of man, society and the state as a whole, fulfillment of which depends on proper operation of information, telecommunication and information telecommunication systems, as well as to relations associated with information production, collection, acquisition, storage, use, dissemination, protection, and security. It is stated that the essence of cyber threatsconsists in their sources, that is, in subjects of information legal relations, while information is their direct target. Information interventions pose a major threat to cybersecurity. It was noted that threats can be both internal and external. To develop an effective mechanism able to counter cyber threatsto Ukraine, it is suggested taking current practices of foreign countries and the international community as a model and bringing them in line with the Ukrainian realities.
References
[2] Barovska, A.V. 2016. Functional Analysis of the Sphere of Strategic Communications. Strategic Priorities. № 4 (41). 105-112.
[3] Countering Information Warfare Act of 2016. URL: https://www.congress.gov/bill/114th- congress/senatebill/2692/text.
[4] Cyber Threats and Cybersecurity: Are Experts Able to Counter Hackers? 2016. URL: http://ukr.obozrevatel.com/news/34918-kiberzagrozi-i-kiberbezpeka-chi-zdatni-fahivtsi-protistoyati-hakeram.htm.
[5] Diorditsa, I.V. Information Interventions as a Threat to Cyber Security. URL:http://goal-int.org/informacijni-intervencii-yak-zagroza-kibernetichnij-bezpeci/.
[6] Draft Strategy for Ensuring Cyber Securityof Ukraine 2013. URL: http://www.niss.gov.ua/public/File/2013_nauk_an_rozrobku/kiberstrateg.pdf.
[7] Green Paper on Critical Infrastructure Protection in Ukraine: a collection of proceedings of internationalexpert meetings. 2015. Kyiv: National Institute for Strategic Studies. 176.
[8] Klymchuk, O.O. 2015. The Place and Role of Special Services and Law Enforcement Agencies of the Leading Countries of the World in the National Cybersecurity Systems.Information Security of Man, Society, and the State. № 3. 75-83.
[9] Kutsaev, V.V., Zhyvylo, Y.O., Sribnyi, S.P., Chernysh, Y.O. 2014. Contemporary Cyberspace Terminology Expansion. URL: mino.esrae.ru/pdf/2014/3Sm/1387.doc .
[10] Lipkan, V.A. 2014. Consolidation of Information Legislation of Ukraine: [a monograph].Kyiv. 416.
[11] Lipkan, V.A. 2016. Strategic Communications: [a dictionary] Kyiv. 416.
[12] Minin, D.S. Approaches to Defining the Concept ʽCybersecurityʼURL. http://istfak.org.ua/tendentsii-rozvytku-suchasnoi-systemy-mizhnarodnykh-vidnosyn-ta-svitovoho-politychnoho-protsesu/185-heopolitychna-dumka-ta-heostratehichni-protsesy-v-khkhi-st/971-pidkhody-do-vyznachennya-ponyattya-kiberbezpeka.
[13] On the Decision of the National Security and Defense Council of UkraineʽOn the national Security Strategy of Ukraineʼ: Edict of the President of Ukraine of May 6, 2015. URL: http://zakon3.rada.gov.ua/laws/show/287/2015.
[14] Poroshenko Called on the USA ʽto Be Great Again,ʼ19.01.2017. URL: http://www.pravda.com.ua/news/2017/01/19/7132837.
[15] Rudnyk, L.I. 2015. The Right to Access to Information: thesis for a PhD in Law degree. Kyiv. 247.
[16] Sopilko, I.M. 2015. Information Threats and Security of Contemporary Ukrainian Society. URL: http://jrnl.nau.edu.ua/index.php/UV/article/viewFile/8181/9770.
[17] SWIFT Warned Global Banks of a High Cyber Threat. URL: http://www.depo.ua/ukr/svit/swift-poperedila-svitovi-banki-pro-visoku-kiberzagrozu-13122016123500.
[18] The Current Trends in Cybersecurity Policy: Conclusions for Ukraine.URL: http://www.niss.gov.ua/articles/294.
[19] The European Parliament Adopted a Resolution on Countering Russian Propaganda, 23.11.2016. URL: http://glavcom.ua/news/jevropeyskiy-parlament-uhvaliv-rezolyuciyu-shchodo-protidiji-rosiyskiy-propagandi-384228.html.
[20] The Russian Cyber Threat, September 26, 2016. URL: http://www.radiosvoboda.org/a/28014684.html.
[21] The US Intelligence Agency Called Russia the Major Cyber Threat, 05.01.2017. URL: http://www.pravda.com.ua/news/2017/01/5/7131747.
[22] Tsymbaliuk, V.S. 2011. Information Law: Conceptual Guidelines for Codification of Information Legislation. Kyiv: OsvitaUkrainy. 426.
[23] US Senators from Both Parties Made a Statement on Russian Cyberattacks. 2016. URL: http://www.pravda.com.ua/news/2016/12/12/7129541.
[24] US Special Services: Russia – a Cyber Threat to the United States Entire Vital Infrastructure, 05.01.2017. URL: http://zik.ua/news/2017/01/05/spetssluzhby_ssha_rosiya__kiberzagroza_usiy_zhyttievo_vazhlyviy_infrastrukturi_1021403.
The Copyright Transfer Form to ASERS Publishing (The Publisher)
This form refers to the manuscript, which an author(s) was accepted for publication and was signed by all the authors.
The undersigned Author(s) of the above-mentioned Paper here transfer any and all copyright-rights in and to The Paper to The Publisher. The Author(s) warrants that The Paper is based on their original work and that the undersigned has the power and authority to make and execute this assignment. It is the author's responsibility to obtain written permission to quote material that has been previously published in any form. The Publisher recognizes the retained rights noted below and grants to the above authors and employers for whom the work performed royalty-free permission to reuse their materials below. Authors may reuse all or portions of the above Paper in other works, excepting the publication of the paper in the same form. Authors may reproduce or authorize others to reproduce the above Paper for the Author's personal use or for internal company use, provided that the source and The Publisher copyright notice are mentioned, that the copies are not used in any way that implies The Publisher endorsement of a product or service of an employer, and that the copies are not offered for sale as such. Authors are permitted to grant third party requests for reprinting, republishing or other types of reuse. The Authors may make limited distribution of all or portions of the above Paper prior to publication if they inform The Publisher of the nature and extent of such limited distribution prior there to. Authors retain all proprietary rights in any process, procedure, or article of manufacture described in The Paper. This agreement becomes null and void if and only if the above paper is not accepted and published by The Publisher, or is with drawn by the author(s) before acceptance by the Publisher.