مطالب مرتبط با کلیدواژه

Cybersecurity


۱.

The Legal Mechanisms for Information Security in the context of Digitalization(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Legal mechanisms Informational security Cybersecurity Digitization Institutional system for cybersecurity

حوزه‌های تخصصی:
تعداد بازدید : ۱۸۷ تعداد دانلود : ۹۵
As a result of the introduction of digital technologies in all spheres of society, various latest technologically conditioned risks and threats have become various. It requires the formation and implementation of a legal mechanism for further development and operation of the system ensuring information security, taking into account the effects of digitalization and transformation of society. The purpose of this study is development of scientifically substantiated proposals and recommendations for implementation legal mechanisms for information security in the context of digitalization. The relevance of this study is due to the needlegal regulation of relations in the information sphere, formation of a system of protection and counteraction to cybercrime. To achieve the goal of the study, methodological principles and approaches of legal science were used. The results of the analysis showed that the most significant mutual influence is demonstrated by a group of indicators of the state's institutional capacity and a group of indicators of the digital capacity of the national economy and cybersecurity. This study substantiates the main directions of accelerating the optimization of the institutional system of cybersecurity in Ukraine, which provides for two key areas: legal and organizational. The legal mechanisms include further improvement and harmonization of the regulatory framework, the formation of relevant legal norms, state policy in the field of information security. The organizational measures are aimed at improving the efficiency of responsible institutional structures - the subjects of cybersecurity - by increasing their capabilities, eliminating duplication in the exercise of their powers, taking into account the best practices of international and European experience. The core of the integrated information security system is the National Cyber Security Coordination Center.
۲.

Towards the Legal Protection of Critical Infrastructure in Africa Against Cyberwar and Cyberterrorism

نویسنده:

کلیدواژه‌ها: Critical infrastructure cyberattacks cybercrime Cybersecurity Cyberterrorism cyberwar

حوزه‌های تخصصی:
تعداد بازدید : ۵۵ تعداد دانلود : ۴۴
This article reviews the legal framework governing the protection of critical infrastructure in Africa with an emphasis on threats like cyberwar and cyberterrorism. As African governments and businesses increasingly depend on the internet and information systems, there is a need to enact appropriate laws to protect critical infrastructure from cyberattacks that could jeopardize the economic and national security postures of African countries. The article outlines the need for appropriate legal instruments to protect critical infrastructure as African businesses increasingly rely on the internet and information systems. The lack of adequate laws regulating critical infrastructure does not translate to the absence of critical infrastructure in African countries. Ghana, for instance, has a legal framework governing critical infrastructure. These infrastructures are common in most African countries but lack the required legal framework to protect them. It is important to note that despite the Budapest Convention and African Convention on Cybersecurity and Personal Data Protection, there is no international legal framework regulating cyberwar and cyberterrorism. Considering these factors, this article reviews Ghana's Cybersecurity Act and the Directive on Critical Information Infrastructure and uses the United States framework for comparative analysis. In addition to reviewing the types of attacks critical infrastructure could face, the article looks at the legal framework for managing incidents that could arise from cyberattacks targeting critical infrastructure.
۳.

Interpreting the Role of State, Non-State, and International Organization to form Cybersecurity Governance in Southeast Asia(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Cybersecurity Regional Governance Southeast Asia state actors Non-state actors

حوزه‌های تخصصی:
تعداد بازدید : ۶۷ تعداد دانلود : ۳۷
Southeast Asia is a region undergoing economic development and technological advancement. This region's economic growth is supported by the digital world, which contributes in the form of a digital economy. However, as the digital economy grows, cyberspace lacks stable cyber security governance. As a result, this area is extremely vulnerable to all types of cyber threats. The author intends to interpret the role of state actors, non-state actors, and international organizations in developing cybersecurity governance in Southeast Asia through this article. In a conceptual framework, the preparation of regional governance must involve collaboration across actors due to their distinct functions. Such governance can maintain cyber security while also accommodating stakeholders in the Southeast Asian region through multi-sectoral collaboration. Therefor, the authors argued that the collaboration between state, non-state, and regional organization are needed to overcome cyber threats. In addition, regional cybersecurity governance should be a turning point to make more secure cyber space in Southeast Asia.