
In view of the rapid information technologies development, intensive implementation of infor-mation and telecommunication systems in various spheres of state’s activity, modern world trends in information society, there is a need to consider the concept and content of information security. Due to the fact that today a number of main threats to the state's information security are realized in cyber-netic space, special attention should be paid to the notion of cybernetic security as an independent component of Ukraine's national security in relation to the sphere of information security and its legal security. In the article an analysis of the current state for regulatory of information security is made from the point of view of an integrated approach, such as general requirements to information securi-ty, requirements to the security of information infrastructure and security requirements of information technologies.
In view of the rapid information technologies development, intensive implementation of information and telecommunication systems in various spheres of state’s activity, modern world trends in information society, there is a need to consider the concept and content of information security. Due to the fact that today a number of main threats to the state's information security are realized in cyber-netic space, special attention should be paid to the notion of cybernetic security as an independent component of Ukraine's national security in relation to the sphere of information security and its legal security. In the article an analysis of the current state for regulatory of information security is made from the point of view of an integrated approach, such as general requirements to information securi-ty, requirements to the security of information infrastructure and security requirements of information technologies.
інформаційна безпека, information security, information and telecommunication systems., нормативно-правове регулювання у сфері інформаційної безпеки, стратегія національної безпеки, cybernetic security, threats to information security, національна безпека, national security strategy, legal regulation in the field of information security, інформаційно-телекомунікаційні системи, information and telecommunication systems, national security, інформаційні ресурси, загрози інформаційній безпеці, кібернетична безпека, information resources
інформаційна безпека, information security, information and telecommunication systems., нормативно-правове регулювання у сфері інформаційної безпеки, стратегія національної безпеки, cybernetic security, threats to information security, національна безпека, national security strategy, legal regulation in the field of information security, інформаційно-телекомунікаційні системи, information and telecommunication systems, national security, інформаційні ресурси, загрози інформаційній безпеці, кібернетична безпека, information resources
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
