INFORMATION WAR: PROBLEMS, THREATS AND ANTIDES
Journal: Cybersecurity: Education, Science, Technique (Vol.3, No. 3)Publication Date: 2019-03-28
Authors : Zoreslava Brzhevska. Nadiia Dovzhenko. Roman Kyrychok. Galyna Gaidur. Andriy Anosov.;
Page : 88-96
Keywords : information security of Ukraine; national information space; information threats; informational and psychological influences; information wars and operations; information resources;
Abstract
This article is about the problems of vulnerability of the Ukrainian state in the conditions of information warfare. The main threats are described, among them: the destruction of a single information space of the state; manipulation of the public, lack of coordination of state authorities, weakness of education and education, illegal use of special means of influence on public consciousness, aggravation of international competition for ownership of information technologies and resources; activities of international terrorist organizations; insufficiency of regulatory legal framework regulating relations in the information sphere, as well as insufficient application of law. In the information warfare, there are three main goals: control of the information space and the protection of their information from hostile acts; use of control over the information space for carrying out informational attacks on the enemy; increasing the overall effectiveness of armed information functions. The components of information wars are considered and the priority directions of the state information policy and important steps from the authorities of Ukraine are described. Formation of public consciousness with the help of subjects of information warfare using methods of psychological influence becomes the most effective way of control and manipulation, both within the state and beyond its borders. It all depends on who actually determines the content. Thus, our attitude to problems and phenomena, even the very approach to what is considered a problem or phenomenon, is largely determined by those who control the world of communications.
Other Latest Articles
- A METHOD OF FORMING OF ANTI-VIRUS PROTECTION OF DATA IS WITH THE USE OF SAFE ROUTING OF METADATAS
- COMPLEX METHOD OF AUTOMATIC FONOSEMANTIC ANALYSIS OF TEXT INFORMATION ON THE BASIS OF EVALUATION OF HIGH SEMANTIC UNITS IN THE CONDITIONS OF INFORMATIVE CONTINUATION
- APPLICABLE ASPECTS OF AUTHENTICATION DATA PROTECTION
- THE IMPACT OF TEACHING TOPICAL STRUCTURE ANALYSIS ON WRITING PERFORMANCE OF TURKISH EFL SPEAKERS
- Incompatible Minor Crossmatch due to T-transformed red cells a case report
Last modified: 2019-03-29 15:01:20