Regulatory and Legal Ways to Resolve Existing Conflicts in the Field of Cyber Security in the Context of the Creation of Cyber Forces of the Armed Forces of Ukraine
Abstract
The current proliferation and commercialization of cyber attack tools has changed the balance of power in cyberspace and allowed a wide range of actors to use cyber tools for geopolitical influence and economic gain. The applicable tools, which can be freely used, provide unprecedented opportunities for espionage, fraud and hacking, the use of which is aimed at financial gain, disruption of the sustainable functioning of critical infrastructure facilities and various forms of ownership of electronic communication systems and networks.
The dynamics of the current situation regarding the ability to buy ready-made hardware and software solutions and create individual cyber tools continues to “challenge” national security, the commercial sector and the civilian population.
By increasing the ability to acquire cyber tools on a commercial basis, both state and non-state actors can quickly move from new threats to existing ones, so this leap is seen as a key factor in the cyber defense landscape. In the future, this can lead to a high level of geopolitical instability in conflicts that will be more difficult to predict than traditional military changes in the balance of power.Under these conditions, an important task for Ukraine is to create conditions for protecting sovereignty and ensuring the defense capability of the state in cyberspace by supporting the capabilities of the defense forces to carry out active cyber protection of its own information infrastructure and preparing the state to repel military aggression in cyberspace both in peacetime and in a state of war (a special period ).
In view of the above, this paper analyzes the current regulatory legal acts of the state regarding the implementation of relevant tasks by cyber security entities within the framework of state cyber defense and national cyber defense measures with the aim of delimiting powers, establishing responsibility for specific areas of activity and implementing priority tasks in this field.
Downloads
References
Zhyvylo, Y. O. (2024). Geostrategic players of modern cyberspace: Threats, challenges, consequences. In C91 Modern aspects of science: XLV. International collective monograph (pp. 29–63). International Ekonomický Institut s.r.o. URL: http://perspectives.pp.ua/public/site/mono/mono-45.pdf [in Ukrainian] (accessed 03.04.2024).
Zhyvylo, Y. (2023). Exploring and acquiring modern human resource competencies in cybersecurity amidst state digital transformation. Pressing Problems of Public Administration, 2(63), 111–127. DOI: https://doi.org/10.26565/1684-8489-2023-2-08 [in Ukrainian] (accessed 03.04.2024).
Koval, M., Sova, O., Orlov, O., Shyshatskyi, A., Artabaiev, Yu., Shknai, O., Veretnov, A., Koshlan, O., Zhyvylo, Ye., & Zhyvylo, I. (2022). Udoskonalennia kompleksnoho upravlinnia resursamy system zviazku spetsialnoho pryznachennia. Eastern-European Journal of Enterprise Technologies, 5(9(119)), 34–44. DOI: https://doi.org/10.15587/1729-4061.2022.266009 (accessed 03.04.2024).
The draft law on Cyber Forces of the Armed Forces is already being discussed in the Ministry of Defense and the Defense Forces. We learned more about the future type of troops. URL: https://ain.ua/2024/05/08/cyberforce/ [in Ukrainian] (accessed 03.04.2024).
Kuzmenko, O. (2024). The Draft Law on the Designation of the Cyber Forces of the Armed Forces of Ukraine as a separate type of military is already at the stage of approval by the Ministry of Defense and the Defense Forces. What is known. URL: https://dev.ua/news/zakonoproiekt-pro-kibersyly-zsu-1715175332 [in Ukrainian] (accessed 03.04.2024).
Zhyvylo, Y. O., & Orlov, O. V. (2022). The essence of cyber security of the national segment of the state’s cyberspace in the context of crisis management. Public Administration of the XXI Century in the Conditions of Hybrid Threats: collection of Scientific Materials of the XXII International Scientific Congress, 248–254 [in Ukrainian] (accessed 03.04.2024).
Onyshchenko, S., Zhyvylo, Y., Cherviak, A., & Bilko, S. (2023). Determining the patterns of using information protection systems at financial institutions in order to improve the level of financial security. Eastern-European Journal of Enterprise Technologies, 5(13(125)), 65–76. DOI: https://doi.org/10.15587/1729-4061.2023.288175 [in Ukrainian] (accessed 03.04.2024).
On the main principles of ensuring cyber security of Ukraine: Law of Ukraine dated October 5, 2017 No. 2469-VIII. Date of update: 07/28/2022. https://zakon.rada.gov.ua/laws/show/2163-19#Text [in Ukrainian] (accessed 03.04.2024).
On the protection of information in information and communication systems: Law of Ukraine dated July 5, 1994 No. 80/94-VR. Date of update: 06/28/2024. URL: https://zakon.rada.gov.ua/laws/show/80/94-%D0%B2%D1%80#Text [in Ukrainian] (accessed 03.04.2024).
On state secrets: Law of Ukraine dated January 21, 1994 No. 3855-XII. Date of update: 01.01.2024. URL: https://zakon.rada.gov.ua/laws/show/3855-12#Text [in Ukrainian] (accessed 03.04.2024).
About information: Law of Ukraine dated October 2, 1992 No. 2657-XII. Date of update: 07/27/2023. URL: https://zakon.rada.gov.ua/laws/show/3855-12#Text [in Ukrainian] (accessed 03.04.2024).
On the decision of the National Security and Defense Council of Ukraine dated May 14, 2021 “On the Cybersecurity Strategy of Ukraine”: Decree of the President of Ukraine dated August 26, 2021 No. 447/2021. URL: https://zakon.rada.gov.ua/laws/show/447/2021#Text [in Ukrainian] (accessed 03.04.2024).
Procedure for response by cyber security entities to various types of events in cyberspace: Resolution of the Cabinet of Ministers of Ukraine dated April 4, 2023 No. 299. Date of update: 04.04.2023. URL: https://zakon.rada.gov.ua/laws/show/299-2023-%D0%BF#n12 [in Ukrainian] (accessed 03.04. 2024).
Danilov, O. (2020). Cyber protection of state information resources is an important component in the process of digital transformation of the country. https://www.rnbo.gov.ua/ua/Diialnist/4606.html [in Ukrainian] (accessed 03.04.2024).
Kumar, V. (2020). Cybersecurity challenges and solutions in the telecom industry. Industry Wired. URL: https://industrywired.com/cybersecurity-challenges-and-solutions-in-the-telecom-industry/ (accessed 03.04.2024).
OAGOV. (2020). Cyber security threats against global governments increase exponentially. Open Access Government. https://www.openaccessgovernment.org/cyber-security-threats-global-governments-increasing/96789/ (accessed 03.04.2024).
Zhyvylo, Y. O., & Dokil, V. M. (2023). Model of assessment of military communication and cyber security capabilities of the armed forces of Ukraine for performing tasks of reflecting military aggression in cyber space. Scientific Journal “Modern Information Technologies in the Sphere of Security and Defence, 1(46), 32–41. National University of Defense of Ukraine named after Ivan Chernyakhovsko [in Ukrainian] (accessed 03.04.2024).
Deloitte. (2021). Global cyber executive briefing: High technology. Case studies. Deloitte Development LLC. URL: https://www2.deloitte.com/ba/en/pages/risk/articles/High-Technology-Sector (accessed 03.04.2024).
On the decision of the National Security and Defense Council of Ukraine dated September 14, 2020 “On the National Security Strategy of Ukraine”: Decree of the President of Ukraine dated September 14, 2020 No. 392/2020. URL: https://www.president.gov.ua/documents/3922020-35037#Text [in Ukrainian] (accessed 03.04.2024).
On the decision of the National Security and Defense Council of Ukraine dated August 20, 2021 “On the Strategic Defense Bulletin of Ukraine”: Decree of the President of Ukraine dated September 17, 2021 No. 473/2021. URL: https://zakon.rada.gov.ua/laws/show/n0063525-21#Text [in Ukrainian] (accessed 03.04. 2024).
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).