The internet creates a virtual space where individuals strive to capture their dreams, art, and culture. Within it, one can find the greatness and dignity of humanity, but also the baseness and wickedness that signify the decline of the spirit. The internet has drastically diminished the significance of space and distance in social interactions. It has enabled the crossing of temporal boundaries, provided anonymity in contacts, and facilitated access to previously inaccessible information, including open educational resources and sources of cultures different from one’s own. The language of digital media is a system of signs. Without understanding them, contemporary individuals become slaves, and their lives become meaningless and purposeless play. Illiteracy and low computer and media literacy can become sources of social and cultural manipulation on an unprecedented scale. Information networks connect not only universities, businesses, and people, but they have also become tools for playing out cultural, social, economic, political rivalries, as well as criminal and terrorist activities, and more recently, military actions. The COVID-19 pandemic and the war in Ukraine have their dramatic images in the real world, but also in cyberspace. This article fills a gap in this area by addressing the issues of misinformation, media manipulation, propaganda, and infodemics. It presents a classification of security threats to children, youth, and adults and describes selected initiatives undertaken in this regard by the European Union. The author draws upon humanistic and social thought, pointing out avenues for analysis and ways to counteract negative consequences.
Hacktivism is a social phenomena which evokes different social assessments. The definitions of a term differ in many respects. This theoretical model of hacktivism has not yet been implemented into an empirical strategy for sociological research. The paper describes the the main initiatives taken by Anonymous collective during the 2014 conflict in Ukraine, which is considered by many researchers to be the first stage of preparation for the war triggered by Russia in 2022. Author analyses the collective’s activity in 2022, after the war started, in order to identify similarities and differences in the creation of information messages about the situation. The comparative analysis covers information published in Anonymous’ tweets and selected online news services. She asks the question about the possible consequences of Anonymous actions in the open cyber field for the social moods around the world. To what extent these media messages and their construction have reflected the social perception and/or social attitudes towards Russia’s aggression? The theoretic explorations were embedded mainly on two methods: criticism of writing and the analytical and comparative one.
The essence of administrative and legal regulation of the activities of the subjects of the national cybersecurity system of Ukraine has been established, which consists in building an effective system for ensuring cybersecurity and requires from the state bodies of Ukraine a clear legal definition of the principles of state policy in this area and an advanced response to dynamic changes taking place in the world in the field of cybersecurity. The classifier of threats to the security of information resources has been improved, which, in contrast to the existing ones, is based on a synergetic model of threats, which allows to classify threats by security components, types of services, and hierarchy levels of the infrastructure of automated systems, to assess the synergy and hybridity of threats to information security, cybersecurity, information security, and the likelihood of their impact on the security of information resources. It has been proved that the choice of specific means and ways of ensuring the cybersecurity of Ukraine is conditioned by the need to take timely measures adequate to the nature and scale of real and potential cybernetic threats to the vital interests of a person and citizen, society and the state. The purpose of the cybersecurity system of Ukraine has been clarified. The task of the cybersecurity system is to create the necessary conditions in cyberspace, under which it is possible to achieve national goals and realize the interests, tasks, and goals of its elements.
The authors have investigated the features of legal support for cybersecurity in some of the leading countries of the world, have established the organizational basis for its support, as well as the main aspects of NATO and the EU’s activities and standards in this area. In particular, the essence of the concept of cybersecurity is determined by referring to the views of both foreign scientists and Ukrainian scientists, and fixing this definition in normative documents of international importance (international standard ISO/IEC 27032:2012). Actual strategic goals in the direction of ensuring cybersecurity in countries such as France, the UK, the United States, as well as the settlement of these issues at the legislative level in Ukraine are highlighted. It has been established which state bodies operate in the indicated countries, whose powers include ensuring cybersecurity. Attention is paid to the settlement of cybersecurity and cyber protection issues at the international level, in particular at the EU and NATO levels. Particular attention is paid to NATO standards – TEMPEST. The content of the norms of the current legislation of Ukraine in the field of ensuring cybersecurity and the nature of the priority tasks of the National Cyber Security Coordination Center under the National Security and Defense Council of Ukraine are disclosed, which are normatively enshrined in the relevant Regulation. The features of the regulatory and organizational support of cybersecurity in some leading countries of the world and in Ukraine are structured.
The world faces new challenges and threats to international security environment, among which a key role play different types of cyberthreats. This follows, primarily the global links in a cyberspace in terms of critical infrastructure of the state’s and intergovernment’s objects in the international security environment and the fact that the cyberaggressor’s tools are becoming cheaper, and their skills are more and more advanced. There is an urgent need for the analysis of present and future cyberthreats in the security environment, to understand their impact on everone, States, Nations and organizations and develop effective methods of response in this highly complex reality. The article presents the concept of defining of main types of cyberhreats (i.e. information warfare, cyberterrorism, cybercrime and cyberespionage) on the base of the new theoretical approach of modern security environment model.