Проблеми інформаційної безпеки та розвитку Системи електронного урядування в Україні
DOI №______
Анотація
Стаття присвячена проблемам інформаційної безпеки Уряду України, проблемам його кібербезпеки пов’язаних з впровадженням електронного уряду, розглядаються сучасні організаційні та технічні напрями забезпечення їх інформаційної безпеки. Аналізуються питання кібербезпеки пов’язані зі становленням нового інформаційного суспільства України. У свою чергу, розглядаються сучасні методи і засоби захисту для вищезазначених проблем в організаціях інформаційної діяльності.
Ключові слова: ідентифікація, інформаційна безпека, електронний уряд, забезпечення інформаційної безпеки організації, кіберзагрози.
Список використаної літератури
1. Buryachok V.L. The technology of the porous analog analysis and the evaluation of the occupancy of automated information systems / V.L. Buryachok, L.V.Buryachok V.V. Semko, / Science and Technology Journal of Modern Economic Informatics State University Telecommunications. Number 4, 2016, pages 15–20.
2. The Law of Ukraine “On the Basic Principles for the Development of the Information Society in Ukraine for 2007-2015” // Vedomosti Verkhovna Rada of Ukraine, 2007, No. 12, Article 102.
3. Roland Traunmuller¨ and Christine Leitner. eGovernment: State and perspectives. In Proceedings of the 2Nd International Conference on Theory and Practice of Electronic Governance, ICEGOV ’08, pages 4–7, New York, NY, USA, 2008. ACM.
4. Robert Schware. Electronic governance and rural communities. In Proceedings of the 2Nd International Conference on Theory and Practice of Electronic Governance, ICEGOV ’08, pages 492–493, New York, NY, USA, 2008. ACM.
5. Richard Heeks et al. Most eGovernment-for-development projects fail: how can risks be reduced? Institute for Development Policy and Management, University of Manchester Manchester, 2003.
6. Marco Prandini and Marco Ramilli. Security considerations about the adoption of web 2.0 technologies in sensitive eGovernment processes. In Proceedings of the 5th International Conference on Theory and Practice of Electronic Governance, ICEGOV ’11, pages 285–288, New York, NY, USA, 2011. ACM.
7. John Malgeri. Cyber security: A national effort to improve. In 2009 Information Security Curriculum Development Conference, InfoSecCD ’09, pages 107–113, New York, NY, USA, 2009. ACM.
8. Ravi Sandhu. The science, engineering and business of cyber security. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS ’13, pages 411–412, New York, NY, USA, 2013. ACM.
9. Editorial: Big data, internet of things, cybersecurity—a new trinity of embedded systems research. ACM Trans. Embed. Comput. Syst., 14(4): 61:1–61:2, October 2015.
10. Benjamin Edwards, Steven Hofmeyr, Stephanie Forrest, and Michel van Eeten. Analyzing and modeling longitudinal security data: Promise and pitfalls. In Proceedings of the 31st Annual Computer Security Applications Conference, ACSAC 2015, pages 391–400, New York, NY, USA, 2015. ACM.
11. Mortaza S. Bargh, Ronald Meijer, Sunil Choenni, and Peter Conradie. Privacy protection in data sharing: Towards feedback based solutions. In Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance, ICEGOV ’14, pages 28–36, New York, NY, USA, 2014. ACM.
12. Malik Shahzad Awan, Peter Burnap, and Omer F. Rana. Estimating risk boundaries for persistent and stealthy cyber-attacks. In Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig ’15, pages 15–20, New York, NY, USA, 2015. ACM.
13. Ross Brewer. Advanced persistent threats: minimising the damage. Network Security, 2014(4):5–9, 2014.
14. Eric Byres, Bernie Chauvin, John Karsch, Dan Hoffman, and Nathan Kube. The special needs of SCADA/PCN firewalls: Architectures and test results. In Emerging Technologies and Factory Automation, 2005. ETFA 2005. 10th IEEE Conference on, volume 2, pages 8–pp. IEEE, 2005.
15. Ernesto Damiani, Claudio Agostino Ardagna, and Nabil El Ioini. Open source systems security certification. Springer Science & Business Media, 2008.
16. David Miller, Shon Harris, Allen Harper, Stephen VanDyke, and Chris Blask. Security information and event management (SIEM) implementation. McGraw Hill Professional, 2010.
17. Kyle Wilhoit. Who’s really attacking your ics equipment? Trend Micro, 2013.
18. Xinyou Zhang, Chengzhong Li, and Wenbin Zheng. Intrusion prevention system design. In null, pages 386–390. IEEE, 2004.
19. Przemyslaw Kazienko and Piotr Dorosz. Intrusion detection systems (IDS) Part I – (network intrusions; attack symptoms; IDS tasks; and IDS architecture), April 2003.
20. Debbie Sielemann. Realm of threat intelligence – all about the packets, or is it?, October 2016.
21. J. G. R. Sathiaseelan, S. Albert Rabara, and J. Ronal Martin. Multi-level secure framework (MLSF) for composite web services. In Proceedings of the 2Nd International Conference on Interaction Sciences: Information Technology, Culture and Human, ICIS ’09, pages 580–585, New York, NY, USA, 2009. ACM.
22. Khmelevskoy R.N. "Investigation of the assessment of threats to the information security of information activity objects" / / Modern information protection 2016. – No. 4. – pages 65–71.
23. Mathematical model of leakage of confidential information, taking into account human factors / V.Z. Tabakov // Modern information security. – 2011, – № 1. – pages, 18–20.