Cybersecurity is an important issue for individuals, organizations, and governments in Algeria and around the world. Cyberattacks can have serious consequences, including financial loss, theft of sensitive information, damage to reputation, and disruption of essential services. To help protect against these types of threats, it is important for individuals and organizations to take steps to secure their systems and data. This can include using strong passwords, keeping software and security protocols up to date, and being cautious when interacting with unfamiliar websites or individuals online. Governments may also have policies and regulations in place to help protect against cyber threats and to respond to incidents when they do occur. Algeria is currently not among the countries that prioritize cyber security sufficiently.
It has been revealed that the legal and doctrinal basis of information security in Ukraine developed symptomatically and haphazardly. This is largely due to the fact that modern research methods are based on different worldview positions, solve research problems in different ways, and also use excellent research strategies. In addition, information security was primarily viewed as the information security of the state. Subsequently, the intensification of informatization processes in all areas, especially the growth in the importance of technical protection of information, led to the formation of legal support for the protection of information as an integral component of the security of enterprises, institutions and organizations, as well as individual sectors of the economy. At the turn of the millennium, the question of international information security, as well as cybersecurity as part of information security, became acute. The stages of the formation of Ukrainian legislation in the information sphere in general, and information security in particular, have been analyzed, and it has been found that at each of these stages, the information security of a person remained a secondary issue. Increasing the efficiency of administrative and legal support for information security in Ukraine is possible through the implementation of a set of legal measures, which include: clear reflection in law and state institutions of the orientation on the combination of public and private economic interests in the information sphere; constant and consistent use of all human rights mechanisms and procedures to overcome conflicts in the information sphere; raising the legal level of consciousness and activities of civil servants, representatives of all branches and levels of government, and the country’s population.
Security of societies has become one of urgent issues in contemporary world. Too frequently we started encountering one or another form of malicious behavior, criminal activities or terrorism. New and complex threats highlight the need for further synergies and closer cooperation at all levels. Awareness, preparedness and resilience of societies emerge as key preconditions of further secure and sustainable economic development and general well-being. A special attention in those conditions has to be paid to development of theoretically grounded approach to protection of critical infrastructure (CIP), damage or disruption of which can be immensely harmful to unprepared and therefore vulnerable institutions and society. The aim of this paper is to lay theoretical foundations for theoretically grounded approach towards research in CIP area, in order to formulate, ultimately, an approach towards action, which, employing leadership societal stakeholders would allow to enhance awareness of society actors about the threats, i.e, to develop ability to recognize, prevent, and, in case of disaster, to resist to consequences of critical infrastructure infringement. Hence, enhanced resilience of society to critical infrastructure infringement is and ultimate goal of fostering of leadership for critical infrastructure protection.
This article discusses the Ukrainian legislation on cybersecurity. The necessity of developing an efficient cybersecurity system was raised by the hybrid war conducted by Russia over the last few years, in which many critical infrastructure objects have been destroyed with serious consequences not only for the end consumers but also for the security of the state. Consequently, Ukraine has begun issuing a number of laws aiming at strengthening its cyber defense capabilities by establishing an efficient national cybersecurity system. The analysis has clearly shown that although important steps have already been taken in this direction, much still remains to be done to protect the Ukrainian critical infrastructure.
Given the global nature of cyber threats, assurance of a cyber security policy is very important not only at the local organisation level, but also at national and international level. Currently, cyber security as such is not suitably regulated internationally; therefore, the role of national cyber security strategies has become particularly significant. Lithuania is among the leaders in the EU and globally in the development of the optical fibre network. FTTP coverage has already reached 95%, the highest in the EU. Regardless of that, the cyber security programme effective in Lithuania does not provide conditions to ensure an appropriate level of cyber security and may not be regarded as a high-level contemporary strategic document in the area of cyber security. This article presents a study the main outcome of which are guidelines for a contemporary model of the Lithuanian national cyber security strategy. Based on comparative and historical studies as well as expert interviews conducted by authors and on the best practice of other countries, the article presents the elements of a model of the Lithuanian national cyber security strategy as well as guidelines on the content of these elements of the model. The article also reveals which elements of the model of the national cyber security strategy should most of all reflect the national situation and which elements may be unified and possibly also adapted in the cyber security strategies of other countries.