Аналіз чинників, які впливають на кібербезпеку вищого військового навчального закладу

Роль розвитку та поширення інформаційно-комунікаційних технологій у вищому військовому навчальному закладі на підготовку кадрів для Сектору безпеки і оборони України. Характеристика зовнішніх та внутрішніх чинників, які впливають на кібербезпеку ВВНЗ.

Рубрика Программирование, компьютеры и кибернетика
Вид статья
Язык украинский
Дата добавления 27.03.2023
Размер файла 77,1 K

Отправить свою хорошую работу в базу знаний просто. Используйте форму, расположенную ниже

Студенты, аспиранты, молодые ученые, использующие базу знаний в своей учебе и работе, будут вам очень благодарны.

10. Nashynets-Naumova, A.Yu., Buriachok, V.L., Korshun, N.V., Zhyltsov, O.B., Skladannyi, P.M., Kuzmenko, L.V. (2020). Tekhnolohiia zabezpechennia informatsiinoi i kiberbezpeky v zakladakh vyshchoi osvity Ukrainy. Informatsiini tekhnolohii i zasoby navchannia, 77(3), 337-354.

11. Pro osnovni zasady zabezpechennia kiberbezpeky Ukrainy, Zakon Ukrainy №2163 -VIII (2017) (Ukraina).

12. Pro rishennia Rady natsionalnoi bezpeky i oborony Ukrainy vid 14 travnia 2021 roku "Pro nevidkladni zakhody z kiberoborony derzhavy", Ukaz Prezydenta Ukrainy №446/2021 (2021) (Ukraina).

13. Pro rishennia Rady natsionalnoi bezpeky i oborony Ukrainy vid 14 travnia 2021 roku "Pro Stratehiiu kiberbezpeky Ukrainy", Ukaz Prezydenta Ukrainy №447/2021 (2021) (Ukraina).

14. Pro rishennia Rady natsionalnoi bezpeky i oborony Ukrainy vid 20 serpnia 2021 roku "Pro Stratehichnyi oboronnyi biuleten Ukrainy", Ukaz Prezydenta Ukrainy №473/2021 (2021) (Ukraina).

15. Repilo, Yu., Holovchenko, O., Ishchenko, O. (2021). Kontent-analiz urokiv zbroinoho konfliktu v nahirnomu karabasi shchodo vohnevoi pidtrymky viiskovykh formuvan azerbaidzhanu v nastupalnykh diiakh. Zbirnyk naukovykh prats Natsionalnoi akademii Derzhavnoi prykordonnoi sluzhby Ukrainy. Seriia: viiskovi ta tekhnichni nauky, 84(1), 86-99.

16. SBU vykryla heneral-maiora, yakyi pratsiuvav na FSB RF.

17. Chubukova, O.Yu., Ponomarenko, I.V. (2018). Informatsiina bezpeka u navchalnykh zakladakh Ukrainy. Visnyk Kyivskoho natsionalnoho universytetu tekhnolohii ta dyzainu, Spets. Vypusk, 388-395.

18. Shpyhunski ihry.

19. Iahupov, V.V., Kyva, V.Yu. (2019). Kryterii ta pokaznyky diahnostuvannia rozvynenosti informatsiino-komunikatsiinoi kompetentnosti vykladachiv systemy viiskovoi osvit. Informatsiini tekhnolohii i zasoby navchannia, 71(3), 248-266.

20. Anwar, M., He, W., Ash, I., Yuan, X., Li, L., Xu, L. (2016). Gender difference and employees' cybersecurity behaviors. Computers in Human Behavior, 69, 437-443.

21. Anwar, M., He, W., Ash, I., Yuan, X., Li, L., Xu, L. (2016). Gender difference and employees' cybersecurity behaviors. Computers in Human Behavior, 69, 437-443.

22. Bianchi, I.S., Sousa, R.D. (2016). IT Governance Mechanisms in Higher Education. Procedia Computer Science, 100, 941-946.

23. (2020). Cost of a Data Breach Report. Ponemon Institute and IBM.

24. DDoS Attacks Are Already Creating Chaos While Schools and Universities Are Reopening During the Pandemic.

25. Ghazvini, A., Shukur, Z., & Hood, Z. (2018). Review of Information Security Policy based on Content Coverage and Online Presentation in Higher Education. International Journal of Advanced Computer Science and Applications, 9(8), 410-423.

26. Golovchenko, O. (2020). Content-analysis of trends of waging warfare by the army of the armed forces of the Russian Federation. Sciences of Europe, 2(58), 54-61.

27. Gratian, M., Bandi, S., Cukier, M., Dykstra, J., Ginther, A. (2018). Correlating human traits and cyber security behavior intentions. Computers & Security, 73, 345-358.

28. He, X.H., Chun, Z.Z., Zhao, Z.Z. (2011). Discussion on security protection framework of classified protection construction. Communications Technology, 44(12), 98-100.

29. Hina, S., Dominic, P. D. (2020). Information security policies' compliance: A perspective for higher education institutions. Journal of Computer Information Systems, 60(3), 201-211.

30. Jang-Jaccard, J., Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), 973-993.

31. Jeske, D., Schaik, P.V. (2017). Familiarity with Internet threats: Beyond awareness. Computers & Security, (66), 129-141.

32. Joshi, C., Singh, U.K. (2017). Information security risks management framework - A step towards mitigating security risks in university network. Journal of Information Security and Applications, (35), 128-137.

33. Kearney, W.D., Kruger, H.A. (2016). Can perceptual differences account for enigmatic information security behaviour in an organisation? Computers & Security, (61), 46-58.

34. Lallie, H.S., Shepherd, L.A., Nurse, J.R.C., Erola, A., Epiphaniou, G., Maple, C., Bellekens, X. (2021). Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers & Security, 105, 102248.

35. Mohebzada, J.G., Zarka, A.E., Bhojani, A.H., Darwish, A. (2012). Phishing in a university community: Two large scale phishing experiments. У 2012 International Conference on Innovations in Information Technology (IIT). IEEE. https://doi.om/10.1109/innovations.2012.6207742.

36. Ogutcu, G., Testik, O.M., Chouseinoglou, O. (2016). Analysis of personal information security behavior and awareness. Computers & Security, (56), 83-93.

37. Rajab, M. (2019). The relevance of social and behavioral models in determining intention to comply with information security policy in higher education environments. Eastern Michigan University.

38. Rehman, H., Masood, A., Cheema, A.R. (2013). Information Security Management in academic institutes of Pakistan. У 2013 2nd National Conference on Information Assurance (NCIA). IEEE.

39. Saeed, N., Bader, A., Al-Naffouri, T. Y., Alouini, M.-S. (2020). When Wireless Communication Responds to COVID-19: Combating the Pandemic and Saving the Economy. Frontiers in Communications and Networks, 1.

40. Suwito, M. H., Matsumoto, S., Kawamoto, J., Gollmann, D., & Sakurai, K. (2016). An Analysis of IT Assessment Security Maturity in Higher Education Institution. Information Science and Applications, 701713.

41. Ulven, J.B., Wangen, G. (2021). A Systematic Review of Cybersecurity Risks in Higher Education. Future Internet, 13(2), 39.

42. Yan, Z., Robertson, T., Yan, R., Park, S.Y., Bordoff, S., Chen, Q., Sprissler, E. (2018). Finding the weakest links in the weakest link: How well do undergraduate students make cybersecurity judgment? Computers in Human Behavior, 84, 375-382.

43. Yustanti, W., Qoiriah, A., Bisma, R., Prihanto, A. (2018). An analysis of Indonesia's information security index: a case study in a public university. IOP Conference Series: Materials Science and Engineering, 296, 012038.

44. Zeng, Y., Zhang, H., Liu, X., Fu, Y., Deng, Q., Ye, R. (2019). Information system and management for campus safety. У SIGSPATIAL '19: 27th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems. ACM.

45. Zhang, J., Reithel, B.J., Li, H. (2009). Impact of perceived technical protection on security behaviors. Information Management & Computer Security, 17(4), 330-340.

Размещено на allbest.ru

...

Подобные документы

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу.