FEATURES OF TERMINOLOGY IN ENGLISH LITERATURE IN THE FIELD OF CYBER SECURITY

Authors

DOI:

https://doi.org/10.18372/2307-9061.66.17419

Keywords:

cyber security, cyber attack, critical infrastructure, vulnerability, computer networks

Abstract

The aim of the article is research of English-language sources devoted to terminology in the field of cyber security. Research methods: documentary analysis, summarization of legal information, information from the field of cyber protection of information and communication systems, as well as practices of cyber protection of information from various cyber attacks. Results: it has been established that there is currently no unified approach to the formulation of terminology in the field of cyber security, however, when formulating the concept of «cyber security», unlike the one adopted in clause 5 of Art. 1 of the Law of Ukraine «On the Basic Principles of Ensuring Cybersecurity of Ukraine», where «cybersecurity» is a state, in English-language sources the prevailing understanding is that «cybersecurity» is an action. At the same time, this action is aimed not only at protecting against cyber attacks, but also at eliminating their consequences. Among English-speaking authors, there is a certain unity regarding the classification of the types of cyber security into five main types: critical infrastructure security; security of computer programs; network security; cloud security; security of Internet system devices. The views of English-speaking authors on the definition of critical infrastructure objects are compared. The Law of Ukraine «On the Basic Principles of Ensuring Cybersecurity of Ukraine» as well as the Cybersecurity Strategy of Ukraine dated May 14, 2021 use the concept of «vulnerability» to cyberattacks, but no official definition of this concept has been provided. It is proposed to reproduce in Ukrainian legislation the relevant definition given in the international standard ISO 27005. Reproduced in Ukrainian are specific recommendations contained in English-language literature to users of electronic networks regarding the prevention of cyber attacks or the reduction of their consequences. Discussion: the results of the study made it possible to propose individual improvements to the legislation of Ukraine with the aim of unification with EU legislation.

Author Biographies

Guoqiang Fu

Legal Specialist

Evgeniy Krivolap, National Aviation University

graduate student of the Faculty of Law

References

Кузьо Тарас. Війна Путіна проти України. Революція, націоналізм і криміналітет / пер. з англ. Андрія Павлишина. Київ, 2018. 560 с.

У Google прогнозують збільшення кібератак РФ на Україну і членів НАТО цього річ. Економічна правда. 16.02.2023. URL: https:// www.epravda.com.ua/news/2023/02/16/697133/ DOI: https://doi.org/10.1055/a-1946-7604

Maskun S.H. Cyber Security: Rule of Use Internet Safely. Journal of Law, Policy and Globalization. 2013. Vol. 15. P. 22. DOI: https://doi.org/ 10.1016/ j.sbspro.2013.10.333

Pasindu Wijesinghe. Quantum Computing Impact on Cyber Security. 23.08.2021. URL: https://pasindu-wijesinghe.medium.com/quantum-computing-impact-on-cyber-security-26541a02407c

Філінович В.В. Кібербезпека та загрози авіаційній сфері: правовий аспект. Наукові праці Національного авіаційного університету. Серія: Юридичний вісник «Повітряне і космічне право». Київ: НАУ, 2021. № 3 (60). С. 38-43. DOI: https://doi.org/10.18372/2307-9061.60.15950

Schatz D., Bashroush R., Wall J. Towards a Mor ds a More Representativ esentative Definition of Cyber Security e Definition of Cyber Security. Journal of Digital Forensics, Security and Law. 2017. № 2. Р. 54-74. DOI: https://doi.org/ 10.15394/jdfsl.2017.1476

Іленков А. Термінологія та її роль у представленні знань. Вісник Нац. ун-ту «Львівська політехніка». Серія «Проблеми української термінології». 2009. № 648. С. 24–29.

Matt Rosenthal. 5 Types of Cyber Security. MINDCORE Services. 05.09.2018. URL: https://mind-core.com/blogs/cybersecurity/5-types-of-cyber-security/

Alison Grace Johansen. What is cyber security? What you need to know? NORTON.LifeLock. 28.04.2022. URL: https://us.norton.com/ blog/ malware/what-is-cybersecurity-what-you-need-to-know#

Computer security. The Free Encyclopedia. URL: https://en.wikipedia.org/ wiki/Computer_ security

Vulnerability (computing). The Free Encyclopedia. URL: https://en.wikipedia.org/wiki/ Vulnerability_ (computing)

Stefan P. Bargan. 25 Cybersecurity Search Engines. 08.10.2022. URL: https://system weakness. com/25-cybersecurity-search-engines-68bfcc2418ff

Abi Tyas Tunggal, Kaushik Sen. Why is Cybersecurity Important? UpGuard. 20.10.2022. URL: https://www.upguard.com/blog/cyber security-important

Kagalwalla N., Churi P.P. Cybersecurity in aviation: an intrinsic review. 2019. 5th International conference on computing, communication, control and automation (ICCUBEA). Pp. 1-6. DOI: https://doi.org/10.1109/ICCUBEA47591.2019

What Is Cybersecurity? CISCO. URL: https://www.cisco.com/c/en/us/ products/security/what-is-cybersecurity.html

Daniel Schatz, Rabih Bashroush, Julie Wall. Towards a More Representative Definition of Cyber Security. Journal of Digital Forensics, Security and Law. 2017, 12 (2). DOI: https://doi.org/ 10.15394/jdfsl.2017.1476

Mazaher Kianpour, Stewart J. Kowalski, Harald Øverby. (2021). Systematically Understanding Cybersecurity Economics: A Survey. Sustainability. 2021, 13 (24): 13677. DOI: https://doi.org/ 10.3390/su132413677

Tim Stevens Global Cybersecurity: New Directions in Theory and Methods. Politics and Governance. 11 June 2018, 6 (2). 1-4. Archived (PDF) from the original on 4 September 2019. DOI: https://doi.org/10.17645/pag.v6i2.1569

Aaron Yi Ding, Gianluca Limon De Jesus; Marijn Janssen (2019). Ethical hacking for boosting IoT vulnerability management: a first look into bug bounty programs and responsible disclosure. Proceedings of the Eighth International Conference on Telecommunications and Remote Sensing – ICTRS ‘19. Ictrs ‘19. 2019. Rhodes, Greece: ACM Press: 49-55.

References

Kuzo Taras. Viina Putina proty Ukrainy. Revoliutsiia, natsionalizm i kryminalitet / per. z anhl. Andriia Pavlyshyna. Kyiv, 2018. 560 s.

U Google prohnozuiut zbilshennia kiberatak RF na Ukrainu i chleniv NATO tsoho rich. Ekonomichna pravda. 16.02.2023. URL: https://www.epravda.com.ua/ news/ 2023/02/16/ 697133/

Maskun S.H. Cyber Security: Rule of Use Internet Safely. Journal of Law, Policy and Globalization. 2013. Vol. 15. P. 22.

Pasindu Wijesinghe. Quantum Computing Impact on Cyber Security. 23.08.2021. URL: https://pasindu-wijesinghe.medium.com/quantum-computing-impact-on-cyber-security-26541a02407c

Filinovych V.V. Kiberbezpeka ta zahrozy aviatsiinii sferi: pravovyi aspekt. Naukovi pratsi Natsionalnoho aviatsiinoho universytetu. Seriia: Iurydychnyi visnyk. «Povitriane i kosmichne pravo». 2021. № 3(60). S. 38-43. DOI: 10.18372/ 2307-9061.60.15950

Schatz D., Bashroush R., Wall J. Towards a Mor ds a More Representativ esentative Definition of Cyber Security e Definition of Cyber Security. Journal of Digital Forensics, Security and Law. 2017. № 2. Р. 54-74.

Ilenkov A. Terminolohiia ta yii rol u predstavlenni znan. Visnyk Nats. un-tu «Lvivska politekhnika». Seriia «Problemy ukrainskoi terminolohii». 2009. № 648. S. 24–29.

Matt Rosenthal. 5 Types of Cyber Security. MINDCORE Services. 05.09.2018. URL: https://mind-core.com/blogs/cybersecurity/5-types-of-cyber-security/

Alison Grace Johansen. What is cyber security? What you need to know? NORTON.LifeLock. 28.04.2022. URL: https://us.norton.com/blog/ malware/what-is-cybersecurity-what-you-need-to-know#

Computer security. The Free Encyclopedia. URL: https://en.wikipedia.org/ wiki/Computer _security

Vulnerability (computing). The Free Encyclopedia. URL: https://en.wikipedia.org/wiki/ Vulnerability_(computing)

Stefan P. Bargan. 25 Cybersecurity Search Engines. 08.10.2022. URL: https://system weakness. com/25-cybersecurity-search-engines-68bfcc2418ff

Abi Tyas Tunggal, Kaushik Sen. Why is Cybersecurity Important? UpGuard. 20.10.2022. URL: https://www.upguard.com/blog/ cybersecurity-important

Kagalwalla N., Churi P.P. Cybersecurity in aviation: an intrinsic review. 2019. 5th International conference on computing, communication, control and automation (ICCUBEA). Pp. 1-6. DOI: 10.1109/ICCUBEA47591.2019. 9128483

What Is Cybersecurity? CISCO. URL: https://www.cisco.com/c/en/us/ products/ security/ what-is-cybersecurity.html

Daniel Schatz, Rabih Bashroush, Julie Wall. Towards a More Representative Definition of Cyber Security. Journal of Digital Forensics, Security and Law. 2017, 12 (2).

Mazaher Kianpour, Stewart J. Kowalski, Harald Øverby. (2021). Systematically Understanding Cybersecurity Economics: A Survey. Sustainability. 2021, 13 (24): 13677. DOI: 10.3390/ su132413677.

Tim Stevens Global Cybersecurity: New Directions in Theory and Methods. Politics and Governance. 11 June 2018, 6 (2). 1-4. DOI: 10.17645/ pag.v6i2.1569. Archived (PDF) from the original on 4 September 2019.

Aaron Yi Ding, Gianluca Limon De Jesus; Marijn Janssen (2019). Ethical hacking for boosting IoT vulnerability management: a first look into bug bounty programs and responsible disclosure. Proceedings of the Eighth International Conference on Telecommunications and Remote Sensing – ICTRS ‘19. Ictrs ‘19. 2019. Rhodes, Greece: ACM Press: 49-55.

Published

2023-03-31

How to Cite

Fu, G., & Krivolap, E. (2023). FEATURES OF TERMINOLOGY IN ENGLISH LITERATURE IN THE FIELD OF CYBER SECURITY. Scientific Works of National Aviation University. Series: Law Journal "Air and Space Law", 1(66), 63–71. https://doi.org/10.18372/2307-9061.66.17419

Issue

Section

CONSTITUTIONAL AND ADMINISTRATIVE LAW