Regulatory and Legal Ways to Resolve Existing Conflicts in the Field of Cyber Security in the Context of the Creation of Cyber Forces of the Armed Forces of Ukraine

Keywords: information and communication technologies, information protection system and cyber security, information technologies, information security, cyber security, cyber influence, active cyber actions.

Abstract

The current proliferation and commercialization of cyber attack tools has changed the balance of power in cyberspace and allowed a wide range of actors to use cyber tools for geopolitical influence and economic gain. The applicable tools, which can be freely used, provide unprecedented opportunities for espionage, fraud and hacking, the use of which is aimed at financial gain, disruption of the sustainable functioning of critical infrastructure facilities and various forms of ownership of electronic communication systems and networks.
The dynamics of the current situation regarding the ability to buy ready-made hardware and software solutions and create individual cyber tools continues to “challenge” national security, the commercial sector and the civilian population.
By increasing the ability to acquire cyber tools on a commercial basis, both state and non-state actors can quickly move from new threats to existing ones, so this leap is seen as a key factor in the cyber defense landscape. In the future, this can lead to a high level of geopolitical instability in conflicts that will be more difficult to predict than traditional military changes in the balance of power.Under these conditions, an important task for Ukraine is to create conditions for protecting sovereignty and ensuring the defense capability of the state in cyberspace by supporting the capabilities of the defense forces to carry out active cyber protection of its own information infrastructure and preparing the state to repel military aggression in cyberspace both in peacetime and in a state of war (a special period ).
In view of the above, this paper analyzes the current regulatory legal acts of the state regarding the implementation of relevant tasks by cyber security entities within the framework of state cyber defense and national cyber defense measures with the aim of delimiting powers, establishing responsibility for specific areas of activity and implementing priority tasks in this field.

Downloads

Download data is not yet available.

Author Biographies

Yevhen Zhyvylo, V. N. Karazin Kharkiv National University, 4 Svobody Sq, Kharkiv, 61022, Ukraine

Ph.D. in the field of Public Management and Administration,
Doctoral candidate of the Department of Economic Policy and Management,
Educational and Scientific Institute «Institute of Public Administration»,
V. N. Karazin Kharkiv National University, 4 Svobody Sq., Kharkiv, 61022, Ukraine

Valentyn Dokil, National Defense University of Ukraine, prosp. Povtryanyi Sil, 28, Kyiv, 03049, Ukraine

Adjunct of the scientific department of the organization of training
and certification of scientific and pedagogical personnel of the scientific and methodological center of the organization of scientific and scientific and technical activities,
National Defense University of Ukraine, prosp. Povtryanyi Sil, 28, Kyiv, 03049, Ukraine

References

Zhyvylo, Y. O. (2024). Geostrategic players of modern cyberspace: Threats, challenges, consequences. In C91 Modern aspects of science: XLV. International collective monograph (pp. 29–63). International Ekonomický Institut s.r.o. URL: http://perspectives.pp.ua/public/site/mono/mono-45.pdf [in Ukrainian] (accessed 03.04.2024).

Zhyvylo, Y. (2023). Exploring and acquiring modern human resource competencies in cybersecurity amidst state digital transformation. Pressing Problems of Public Administration, 2(63), 111–127. DOI: https://doi.org/10.26565/1684-8489-2023-2-08 [in Ukrainian] (accessed 03.04.2024).

Koval, M., Sova, O., Orlov, O., Shyshatskyi, A., Artabaiev, Yu., Shknai, O., Veretnov, A., Koshlan, O., Zhyvylo, Ye., & Zhyvylo, I. (2022). Udoskonalennia kompleksnoho upravlinnia resursamy system zviazku spetsialnoho pryznachennia. Eastern-European Journal of Enterprise Technologies, 5(9(119)), 34–44. DOI: https://doi.org/10.15587/1729-4061.2022.266009 (accessed 03.04.2024).

The draft law on Cyber Forces of the Armed Forces is already being discussed in the Ministry of Defense and the Defense Forces. We learned more about the future type of troops. URL: https://ain.ua/2024/05/08/cyberforce/ [in Ukrainian] (accessed 03.04.2024).

Kuzmenko, O. (2024). The Draft Law on the Designation of the Cyber Forces of the Armed Forces of Ukraine as a separate type of military is already at the stage of approval by the Ministry of Defense and the Defense Forces. What is known. URL: https://dev.ua/news/zakonoproiekt-pro-kibersyly-zsu-1715175332 [in Ukrainian] (accessed 03.04.2024).

Zhyvylo, Y. O., & Orlov, O. V. (2022). The essence of cyber security of the national segment of the state’s cyberspace in the context of crisis management. Public Administration of the XXI Century in the Conditions of Hybrid Threats: collection of Scientific Materials of the XXII International Scientific Congress, 248–254 [in Ukrainian] (accessed 03.04.2024).

Onyshchenko, S., Zhyvylo, Y., Cherviak, A., & Bilko, S. (2023). Determining the patterns of using information protection systems at financial institutions in order to improve the level of financial security. Eastern-European Journal of Enterprise Technologies, 5(13(125)), 65–76. DOI: https://doi.org/10.15587/1729-4061.2023.288175 [in Ukrainian] (accessed 03.04.2024).

On the main principles of ensuring cyber security of Ukraine: Law of Ukraine dated October 5, 2017 No. 2469-VIII. Date of update: 07/28/2022. https://zakon.rada.gov.ua/laws/show/2163-19#Text [in Ukrainian] (accessed 03.04.2024).

On the protection of information in information and communication systems: Law of Ukraine dated July 5, 1994 No. 80/94-VR. Date of update: 06/28/2024. URL: https://zakon.rada.gov.ua/laws/show/80/94-%D0%B2%D1%80#Text [in Ukrainian] (accessed 03.04.2024).

On state secrets: Law of Ukraine dated January 21, 1994 No. 3855-XII. Date of update: 01.01.2024. URL: https://zakon.rada.gov.ua/laws/show/3855-12#Text [in Ukrainian] (accessed 03.04.2024).

About information: Law of Ukraine dated October 2, 1992 No. 2657-XII. Date of update: 07/27/2023. URL: https://zakon.rada.gov.ua/laws/show/3855-12#Text [in Ukrainian] (accessed 03.04.2024).

On the decision of the National Security and Defense Council of Ukraine dated May 14, 2021 “On the Cybersecurity Strategy of Ukraine”: Decree of the President of Ukraine dated August 26, 2021 No. 447/2021. URL: https://zakon.rada.gov.ua/laws/show/447/2021#Text [in Ukrainian] (accessed 03.04.2024).

Procedure for response by cyber security entities to various types of events in cyberspace: Resolution of the Cabinet of Ministers of Ukraine dated April 4, 2023 No. 299. Date of update: 04.04.2023. URL: https://zakon.rada.gov.ua/laws/show/299-2023-%D0%BF#n12 [in Ukrainian] (accessed 03.04. 2024).

Danilov, O. (2020). Cyber protection of state information resources is an important component in the process of digital transformation of the country. https://www.rnbo.gov.ua/ua/Diialnist/4606.html [in Ukrainian] (accessed 03.04.2024).

Kumar, V. (2020). Cybersecurity challenges and solutions in the telecom industry. Industry Wired. URL: https://industrywired.com/cybersecurity-challenges-and-solutions-in-the-telecom-industry/ (accessed 03.04.2024).

OAGOV. (2020). Cyber security threats against global governments increase exponentially. Open Access Government. https://www.openaccessgovernment.org/cyber-security-threats-global-governments-increasing/96789/ (accessed 03.04.2024).

Zhyvylo, Y. O., & Dokil, V. M. (2023). Model of assessment of military communication and cyber security capabilities of the armed forces of Ukraine for performing tasks of reflecting military aggression in cyber space. Scientific Journal “Modern Information Technologies in the Sphere of Security and Defence, 1(46), 32–41. National University of Defense of Ukraine named after Ivan Chernyakhovsko [in Ukrainian] (accessed 03.04.2024).

Deloitte. (2021). Global cyber executive briefing: High technology. Case studies. Deloitte Development LLC. URL: https://www2.deloitte.com/ba/en/pages/risk/articles/High-Technology-Sector (accessed 03.04.2024).

On the decision of the National Security and Defense Council of Ukraine dated September 14, 2020 “On the National Security Strategy of Ukraine”: Decree of the President of Ukraine dated September 14, 2020 No. 392/2020. URL: https://www.president.gov.ua/documents/3922020-35037#Text [in Ukrainian] (accessed 03.04.2024).

On the decision of the National Security and Defense Council of Ukraine dated August 20, 2021 “On the Strategic Defense Bulletin of Ukraine”: Decree of the President of Ukraine dated September 17, 2021 No. 473/2021. URL: https://zakon.rada.gov.ua/laws/show/n0063525-21#Text [in Ukrainian] (accessed 03.04. 2024).

Published
2024-06-27
How to Cite
Zhyvylo, Y., & Dokil, V. (2024). Regulatory and Legal Ways to Resolve Existing Conflicts in the Field of Cyber Security in the Context of the Creation of Cyber Forces of the Armed Forces of Ukraine. Theory and Practice of Public Administration, 1(78), 183-196. https://doi.org/10.26565/1727-6667-2024-1-11
Section
Foreign Policy and National Security