Monitoring of the development of information infrastructure in Ukraine

Authors

DOI:

https://doi.org/10.15587/2312-8372.2019.169592

Keywords:

information threats, information security, monitoring system, indicators of information threats, protection of personal information

Abstract

The object of research is the information infrastructure of Ukraine. One of the most problematic places is the lack of an assessment and monitoring system for the development of information infrastructure. It was revealed that the main drawbacks of the existing monitoring indicators are the lack of consideration of the level of information threats. Assessment of the development of information infrastructure takes place without taking into account the degree of information security of its objects.

During the study, methods of system analysis were used to assess the indicators of the development of information infrastructure in the context of the level of information threats. Meta-analysis of scientific works and normative legal acts is used to systematize the scientific provisions on research issues.

It is established that the system of indicators used for assessing information security is most often used, including the indicators of the level of development of information and communication technologies in the context of the main subjects of the information infrastructure. This is due to the availability of information.

Due to the developed system of assessment and monitoring of the development of information infrastructure, it is possible to obtain knowledge about the level of information threats and security. Compared to similar well-known approaches to evaluation, this provides a number of benefits. In particular, it is possible to identify critical infrastructure objects that are characterized by the highest level of exposure to information threats. This approach has proved to be necessary to ensure the protection of information in the private sector of the information sphere.

The assessment of the state of the information infrastructure on the basis of the developed monitoring system made it possible to identify a number of trends. The development of the information infrastructure of enterprises and technologies in the information sphere is fast-paced. This is due to the increasing level of computerization, technological re-equipment, the use of social media companies and the «big data» analysis. One of the factors is the rapid spread of cloud technologies and computing. At the same time, it enables to automate the business processes of processing and analysis of information. However, on the other hand, it serves as a source of threats to internal information and information infrastructure.

Author Biography

Roman Prav, Interregional Academy of Personnel Management, 2, Frometivska str., Kyiv, Ukraine, 03039

Postgraduate Student

Department of Management and Administration

References

  1. Pro rishennia Rady natsionalnoi bezpeky i oborony Ukrainy «Pro Stratehiiu natsionalnoi bezpeky Ukrainy» (2015). Ukaz Prezydenta Ukrainy No. 287/2015. 06.05.2015. VR Ukrainy. Baza danykh «Zakonodavstvo Ukrainy». Available at: https://zakon.rada.gov.ua/laws/show/287/2015#n14
  2. Stratehiia kiberbezpeky Ukrainy (2016). Ukaz Prezydenta Ukrainy No. 96/2016. 27.01.2016. VR Ukrainy. Baza danykh «Zakonodavstvo Ukrainy». Available at: https://zakon.rada.gov.ua/laws/show/96/2016#n11
  3. Pro rishennia Rady natsionalnoi bezpeky i oborony Ukrainy «Pro Doktrynu informatsiinoi bezpeky Ukrainy» (2017). Ukaz Prezydenta Ukrainy No. 47/2017. 29.12.2016. VR Ukrainy. Baza danykh «Zakonodavstvo Ukrainy». Available at: https://zakon.rada.gov.ua/laws/show/47/2017
  4. Pro osnovni zasady zabezpechennia kiberbezpeky Ukrainy (2018). Zakon Ukrainy No. 2163-VIII. 08.07.2018. VR Ukrainy. Baza danykh «Zakonodavstvo Ukrainy». Available at: https://zakon.rada.gov.ua/laws/show/2163-19/conv
  5. Pro natsionalnu bezpeku Ukrainy (2018). Zakon Ukrainy No. 2469-VIII. 21.06.2018. VR Ukrainy. Baza danykh «Zakonodavstvo Ukrainy». Available at: https://zakon.rada.gov.ua/laws/show/2469-19?lang=en
  6. Zolotukhin, D. (2018). Monitorynh zahroz u informatsiinomu prostori dopomozhe efektyvnishe spravliatysia z krytychnymy sytuatsiiamy. Available at: https://mip.gov.ua/news/2431.html
  7. Pro Stratehiiu staloho rozvytku «Ukraina – 2020» (2015). Ukaz Prezydenta Ukrainy No. 5/2015. 12.01.2015. VR Ukrainy. Baza danykh «Zakonodavstvo Ukrainy». Available at: https://zakon.rada.gov.ua/laws/show/5/2015
  8. Dougan, O. D. (2015). Legal bases of formation and development of information security. Information security man, society and the state, 3 (19), 6–17.
  9. Kobko, Ye. V. (2018). Monitoring of Threats to the State National Security: Foreign Experience and Ukrainian Realities of Public-Legal Provision. Naukovyi visnyk Natsionalnoi akademii vnutrishnikh sprav, 1 (106), 122–134.
  10. Kovalova, K. V., Pershko, O. L. (2018). Proektnyi menedzhment: sotsialne proektuvannia innovatsii v orhanizatsiiakh. Financial mechanisms of innovative economic development of Ukraine in conditions of European integration. Kyiv, 275–277.
  11. Molodetska-Hrynchuk, K. V. (2017). Analysis of influence threats of an information security of the state in a social internet–service to the spheres of public activities. Upravlinnia rozvytkom skladnykh system, 30, 121–127.
  12. Fedorenko, R. M. (2015). Kontent-monitorynh informatsiinoho prostoru yak chynnyk zabezpechennia informatsiinoi bezpeky derzhavy u voiennii sferi. Suchasnyi zakhyst informatsii, 2, 21–25.
  13. Pakhnin, M. L. (2014). Pryntsypy, zavdannia ta instrumenty derzhavnoi informatsiinoi polityky Ukrainy v suchasnykh umovakh. Teoriia ta praktyka derzhavnoho upravlinnia, 3, 87–95.
  14. Tkachuk, T. Yu. (2017). Mekhanizmy protydii informatsiinym zahrozam zovnishnikh dzherel. Visnyk NTUU «KPI», 1/2 (33/34), 242–246.
  15. Tkachuk, T. (2017). Suchasni zahrozy informatsiinii bezpetsi derzhavy: teoretyko-pravovyi analiz. Informatsiine pravo, 10, 182–186.
  16. Rizov, V. (2018). Information Sharing for Cyber Threats. Information & Security: An International Journal, 39 (1), 43–50. doi: http://doi.org/10.11610/isij.3904
  17. Parker, D. B. (1993). A Comprehensive List of Threats To Information. Information Systems Security, 2 (2), 10–14. doi: http://doi.org/10.1080/19393559308551348
  18. Fried, L. (1994). Information security and new technology Potential Threats and Solutions. Information Systems Management, 11 (3), 57–63. doi: http://doi.org/10.1080/07399019408964654
  19. Kar, J., Mishra, M. R. (2016). Mitigating Threats and Security Metrics in Cloud Computing. Journal of Information Processing Systems, 12 (2), 226–233. doi: http://doi.org/10.3745/jips.03.0049
  20. Suchkov, A. P. (2017). The information structure of threats to national security. Systems and Means of Informatics, 27 (2), 113–124. doi: http://doi.org/10.14357/08696527170210
  21. Dainow, B. (2017). Threats to Autonomy from Emerging ICTs. Australasian Journal of Information Systems, 21, 1–16. doi: http://doi.org/10.3127/ajis.v21i0.1438
  22. Monov, L., Karev, M. (2018). How to Counter Hybrid Threats? Information & Security: An International Journal, 39 (2), 113–126. doi: http://doi.org/10.11610/isij.3909
  23. Pidrozdil Derzhavnoho tsentru kiberzakhystu Derzhspetszviazku CERT-UA. Available at: https://cert.gov.ua/
  24. Vykorystannia informatsiino-komunikatsiinykh tekhnolohii na pidpryiemstvakh za 2017 rik. Available at: http://www.ukrstat.gov.ua
  25. Kilkist abonentiv zviazku na 1 zhovtnia 2018 roku. Available at: http://www.ukrstat.gov.ua
  26. Stan i rozvytok zviazku za 2017 rik. Available at: http://www.ukrstat.gov.ua
  27. Ofitsiinyi sait Internet Asotsiatsii Ukrainy. Available at: https://inau.ua/pro-asociaciyu
  28. Provedeno opratsiuvannia zvitiv operatoriv pro yakist telekomunikatsiinykh posluh za 2017 rik. Available at: http://spz.nkrzi.gov.ua/golovna/yakist-poslug/dani-pro-yakist/
  29. Obsiah realizovanykh posluh u sferi telekomunikatsii ta poshtovoho zviazku za 9 misiatsiv 2018 roku. Available at: http://www.ukrstat.gov.ua

Published

2018-12-31

How to Cite

Prav, R. (2018). Monitoring of the development of information infrastructure in Ukraine. Technology Audit and Production Reserves, 3(4(47), 12–18. https://doi.org/10.15587/2312-8372.2019.169592

Issue

Section

Economic Cybernetics: Original Research