FEATURES OF TERMINOLOGY IN ENGLISH LITERATURE IN THE FIELD OF CYBER SECURITY
DOI:
https://doi.org/10.18372/2307-9061.66.17419Keywords:
cyber security, cyber attack, critical infrastructure, vulnerability, computer networksAbstract
The aim of the article is research of English-language sources devoted to terminology in the field of cyber security. Research methods: documentary analysis, summarization of legal information, information from the field of cyber protection of information and communication systems, as well as practices of cyber protection of information from various cyber attacks. Results: it has been established that there is currently no unified approach to the formulation of terminology in the field of cyber security, however, when formulating the concept of «cyber security», unlike the one adopted in clause 5 of Art. 1 of the Law of Ukraine «On the Basic Principles of Ensuring Cybersecurity of Ukraine», where «cybersecurity» is a state, in English-language sources the prevailing understanding is that «cybersecurity» is an action. At the same time, this action is aimed not only at protecting against cyber attacks, but also at eliminating their consequences. Among English-speaking authors, there is a certain unity regarding the classification of the types of cyber security into five main types: critical infrastructure security; security of computer programs; network security; cloud security; security of Internet system devices. The views of English-speaking authors on the definition of critical infrastructure objects are compared. The Law of Ukraine «On the Basic Principles of Ensuring Cybersecurity of Ukraine» as well as the Cybersecurity Strategy of Ukraine dated May 14, 2021 use the concept of «vulnerability» to cyberattacks, but no official definition of this concept has been provided. It is proposed to reproduce in Ukrainian legislation the relevant definition given in the international standard ISO 27005. Reproduced in Ukrainian are specific recommendations contained in English-language literature to users of electronic networks regarding the prevention of cyber attacks or the reduction of their consequences. Discussion: the results of the study made it possible to propose individual improvements to the legislation of Ukraine with the aim of unification with EU legislation.
References
Кузьо Тарас. Війна Путіна проти України. Революція, націоналізм і криміналітет / пер. з англ. Андрія Павлишина. Київ, 2018. 560 с.
У Google прогнозують збільшення кібератак РФ на Україну і членів НАТО цього річ. Економічна правда. 16.02.2023. URL: https:// www.epravda.com.ua/news/2023/02/16/697133/ DOI: https://doi.org/10.1055/a-1946-7604
Maskun S.H. Cyber Security: Rule of Use Internet Safely. Journal of Law, Policy and Globalization. 2013. Vol. 15. P. 22. DOI: https://doi.org/ 10.1016/ j.sbspro.2013.10.333
Pasindu Wijesinghe. Quantum Computing Impact on Cyber Security. 23.08.2021. URL: https://pasindu-wijesinghe.medium.com/quantum-computing-impact-on-cyber-security-26541a02407c
Філінович В.В. Кібербезпека та загрози авіаційній сфері: правовий аспект. Наукові праці Національного авіаційного університету. Серія: Юридичний вісник «Повітряне і космічне право». Київ: НАУ, 2021. № 3 (60). С. 38-43. DOI: https://doi.org/10.18372/2307-9061.60.15950
Schatz D., Bashroush R., Wall J. Towards a Mor ds a More Representativ esentative Definition of Cyber Security e Definition of Cyber Security. Journal of Digital Forensics, Security and Law. 2017. № 2. Р. 54-74. DOI: https://doi.org/ 10.15394/jdfsl.2017.1476
Іленков А. Термінологія та її роль у представленні знань. Вісник Нац. ун-ту «Львівська політехніка». Серія «Проблеми української термінології». 2009. № 648. С. 24–29.
Matt Rosenthal. 5 Types of Cyber Security. MINDCORE Services. 05.09.2018. URL: https://mind-core.com/blogs/cybersecurity/5-types-of-cyber-security/
Alison Grace Johansen. What is cyber security? What you need to know? NORTON.LifeLock. 28.04.2022. URL: https://us.norton.com/ blog/ malware/what-is-cybersecurity-what-you-need-to-know#
Computer security. The Free Encyclopedia. URL: https://en.wikipedia.org/ wiki/Computer_ security
Vulnerability (computing). The Free Encyclopedia. URL: https://en.wikipedia.org/wiki/ Vulnerability_ (computing)
Stefan P. Bargan. 25 Cybersecurity Search Engines. 08.10.2022. URL: https://system weakness. com/25-cybersecurity-search-engines-68bfcc2418ff
Abi Tyas Tunggal, Kaushik Sen. Why is Cybersecurity Important? UpGuard. 20.10.2022. URL: https://www.upguard.com/blog/cyber security-important
Kagalwalla N., Churi P.P. Cybersecurity in aviation: an intrinsic review. 2019. 5th International conference on computing, communication, control and automation (ICCUBEA). Pp. 1-6. DOI: https://doi.org/10.1109/ICCUBEA47591.2019
What Is Cybersecurity? CISCO. URL: https://www.cisco.com/c/en/us/ products/security/what-is-cybersecurity.html
Daniel Schatz, Rabih Bashroush, Julie Wall. Towards a More Representative Definition of Cyber Security. Journal of Digital Forensics, Security and Law. 2017, 12 (2). DOI: https://doi.org/ 10.15394/jdfsl.2017.1476
Mazaher Kianpour, Stewart J. Kowalski, Harald Øverby. (2021). Systematically Understanding Cybersecurity Economics: A Survey. Sustainability. 2021, 13 (24): 13677. DOI: https://doi.org/ 10.3390/su132413677
Tim Stevens Global Cybersecurity: New Directions in Theory and Methods. Politics and Governance. 11 June 2018, 6 (2). 1-4. Archived (PDF) from the original on 4 September 2019. DOI: https://doi.org/10.17645/pag.v6i2.1569
Aaron Yi Ding, Gianluca Limon De Jesus; Marijn Janssen (2019). Ethical hacking for boosting IoT vulnerability management: a first look into bug bounty programs and responsible disclosure. Proceedings of the Eighth International Conference on Telecommunications and Remote Sensing – ICTRS ‘19. Ictrs ‘19. 2019. Rhodes, Greece: ACM Press: 49-55.
References
Kuzo Taras. Viina Putina proty Ukrainy. Revoliutsiia, natsionalizm i kryminalitet / per. z anhl. Andriia Pavlyshyna. Kyiv, 2018. 560 s.
U Google prohnozuiut zbilshennia kiberatak RF na Ukrainu i chleniv NATO tsoho rich. Ekonomichna pravda. 16.02.2023. URL: https://www.epravda.com.ua/ news/ 2023/02/16/ 697133/
Maskun S.H. Cyber Security: Rule of Use Internet Safely. Journal of Law, Policy and Globalization. 2013. Vol. 15. P. 22.
Pasindu Wijesinghe. Quantum Computing Impact on Cyber Security. 23.08.2021. URL: https://pasindu-wijesinghe.medium.com/quantum-computing-impact-on-cyber-security-26541a02407c
Filinovych V.V. Kiberbezpeka ta zahrozy aviatsiinii sferi: pravovyi aspekt. Naukovi pratsi Natsionalnoho aviatsiinoho universytetu. Seriia: Iurydychnyi visnyk. «Povitriane i kosmichne pravo». 2021. № 3(60). S. 38-43. DOI: 10.18372/ 2307-9061.60.15950
Schatz D., Bashroush R., Wall J. Towards a Mor ds a More Representativ esentative Definition of Cyber Security e Definition of Cyber Security. Journal of Digital Forensics, Security and Law. 2017. № 2. Р. 54-74.
Ilenkov A. Terminolohiia ta yii rol u predstavlenni znan. Visnyk Nats. un-tu «Lvivska politekhnika». Seriia «Problemy ukrainskoi terminolohii». 2009. № 648. S. 24–29.
Matt Rosenthal. 5 Types of Cyber Security. MINDCORE Services. 05.09.2018. URL: https://mind-core.com/blogs/cybersecurity/5-types-of-cyber-security/
Alison Grace Johansen. What is cyber security? What you need to know? NORTON.LifeLock. 28.04.2022. URL: https://us.norton.com/blog/ malware/what-is-cybersecurity-what-you-need-to-know#
Computer security. The Free Encyclopedia. URL: https://en.wikipedia.org/ wiki/Computer _security
Vulnerability (computing). The Free Encyclopedia. URL: https://en.wikipedia.org/wiki/ Vulnerability_(computing)
Stefan P. Bargan. 25 Cybersecurity Search Engines. 08.10.2022. URL: https://system weakness. com/25-cybersecurity-search-engines-68bfcc2418ff
Abi Tyas Tunggal, Kaushik Sen. Why is Cybersecurity Important? UpGuard. 20.10.2022. URL: https://www.upguard.com/blog/ cybersecurity-important
Kagalwalla N., Churi P.P. Cybersecurity in aviation: an intrinsic review. 2019. 5th International conference on computing, communication, control and automation (ICCUBEA). Pp. 1-6. DOI: 10.1109/ICCUBEA47591.2019. 9128483
What Is Cybersecurity? CISCO. URL: https://www.cisco.com/c/en/us/ products/ security/ what-is-cybersecurity.html
Daniel Schatz, Rabih Bashroush, Julie Wall. Towards a More Representative Definition of Cyber Security. Journal of Digital Forensics, Security and Law. 2017, 12 (2).
Mazaher Kianpour, Stewart J. Kowalski, Harald Øverby. (2021). Systematically Understanding Cybersecurity Economics: A Survey. Sustainability. 2021, 13 (24): 13677. DOI: 10.3390/ su132413677.
Tim Stevens Global Cybersecurity: New Directions in Theory and Methods. Politics and Governance. 11 June 2018, 6 (2). 1-4. DOI: 10.17645/ pag.v6i2.1569. Archived (PDF) from the original on 4 September 2019.
Aaron Yi Ding, Gianluca Limon De Jesus; Marijn Janssen (2019). Ethical hacking for boosting IoT vulnerability management: a first look into bug bounty programs and responsible disclosure. Proceedings of the Eighth International Conference on Telecommunications and Remote Sensing – ICTRS ‘19. Ictrs ‘19. 2019. Rhodes, Greece: ACM Press: 49-55.