Search citation statements
Paper Sections
Citation Types
Year Published
Publication Types
Relationship
Authors
Journals
The research relevance is determined by the ever-increasing threat of cyberattacks and the need to protect defence systems from these threats through the introduction of integrated computer technologies. The study aims to develop strategies for ensuring digital security in the defence sector, addressing the impact of information technology. The study analyses the impact of integrated computer technologies on information security in the military sphere, develops cybersecurity strategies and analyses examples of their application in the defence sector. The study determined that integrated computer technologies are substantial in improving cybersecurity in the defence sector. The analysis showed that they can effectively detect, analyse and respond to cyber threats, ensuring reliable protection of critical information resources. In addition, the digital security strategies developed addressed the specifics of the defence sector, helping to improve protection against cyberattacks and ensuring immediate action in the event of a threat. The resulting strategies for improving the digital security of the defence sector consider the specifics of the industry, contributing to increased resilience against cyber threats and ensuring prompt action in the event of potential attacks. The most significant examples of the introduction of these technologies, namely data mining, big data, distributed blockchain technology, analytical methods of cyber-analysis and cyber-physical systems, have demonstrated their effectiveness in real-world conditions, contributing to the security and resilience of defence systems. The results show the importance of information technology in improving cybersecurity in the defence sector. This confirms the need for systematic implementation of such technologies to ensure effective protection against modern cyber threats
The research relevance is determined by the ever-increasing threat of cyberattacks and the need to protect defence systems from these threats through the introduction of integrated computer technologies. The study aims to develop strategies for ensuring digital security in the defence sector, addressing the impact of information technology. The study analyses the impact of integrated computer technologies on information security in the military sphere, develops cybersecurity strategies and analyses examples of their application in the defence sector. The study determined that integrated computer technologies are substantial in improving cybersecurity in the defence sector. The analysis showed that they can effectively detect, analyse and respond to cyber threats, ensuring reliable protection of critical information resources. In addition, the digital security strategies developed addressed the specifics of the defence sector, helping to improve protection against cyberattacks and ensuring immediate action in the event of a threat. The resulting strategies for improving the digital security of the defence sector consider the specifics of the industry, contributing to increased resilience against cyber threats and ensuring prompt action in the event of potential attacks. The most significant examples of the introduction of these technologies, namely data mining, big data, distributed blockchain technology, analytical methods of cyber-analysis and cyber-physical systems, have demonstrated their effectiveness in real-world conditions, contributing to the security and resilience of defence systems. The results show the importance of information technology in improving cybersecurity in the defence sector. This confirms the need for systematic implementation of such technologies to ensure effective protection against modern cyber threats
The paper identifies the main positive aspects and risks of operations involving cryptocurrency after their legitimization and suggests ways to reduce the impact of risks and negative consequences. Analysis and synthesis techniques were utilized in the research in order to summarize the findings and draw conclusions in accordance with the paper’s structural divisions. The structural approach made it possible to structure the provisions on the potential spread of the impact of the existing state regulatory system on participants’ activities in the cryptocurrency market and determine which state executive authorities should be assigned the task of licensing cryptocurrency mining. The comparative legal method was used to search for advantages and disadvantages for various types of legal entities after legitimizing cryptocurrency. In order to examine the origins of human civilization and its recent acceleration of digitalization, the historical legal method was utilized. The authors have elaborated methods aimed at reducing the risks of operations with cryptocurrencies, as well as protecting the interests of the state and cryptocurrency market participants. It is proposed to establish a cryptocurrency exchange by citizens of Ukraine or business entities in agreement with the National Bank of Ukraine, the National Securities and Stock Market Commission or other central executive body. It is proposed to protect the interests of participants in the cryptocurrency market through the application of a group of measures characterized by the term “legal work at the enterprise”, and the LLC legal form can be used to prevent conflicts between founders and protection from encroachments of corporate raiders for small businesses
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.