by P.D. Bilenchuk, V.L. Buryachok, V.M. Butuzov, V.D. Havlovskii, V. A. Holubev,
Yu.M. Suprunov, A.L. Tatuzov, V.M. Furashev, V.P. Shelomentsev [3; 4; 11; 12; 38;
2; 8; 35]. The mentioned researchers have been involved in definite problems
investigation, but the authors stress the integrated approach to the analysis of legal
framework of information security provision and its systematization.
Firstly, one should underline the contradictions in scholars’ vision and their
understanding of the subject of the investigation – the notion of information security
and its essential component – cyber security. V.M. Furashev (2014) considers
information security to be “the state of safety of vital interests of a person, society and
country, when the infliction of harm through negative information influence by means
of unauthorized creation, dissemination and usage of incomplete, unfair and
preconceived information; negative consequences of information technologies usage;
illegal access to information and its further usage and dissemination is prevented” [8; p.
60].
Furthermore, other scholars (V.A. Lipkan, O.S. Lipkan, A.A. Yakovenko (2006)
consider information security to be a part of national security, which denotes a certain
type of social activity aimed at creation of favourable (required and enough) conditions
for the development and implementation of national interests [22; p. 146].
The intentions of scientists to create a common terminological environment as a
platform for theoretical and methodological basis of legal framework of information
security provision and its support have already become a certain trend. But the
screening of last research shows some diversification in scholars’ vision of the notion
of “information threat” as well as the criteria for its classification.
Dr. Paul Cornish (2009) classifies cyber threats as follows: hacking; serious and
organized crime; ideological and political extremism (cyberterrorism); and state-
sponsored cyber-attacks (cyberwars) [5; p.16]. He considers just the first two ones to
be really practiced now, presuming that cyberterrorism and cyberwars will be the
reality only in decades.
We hardly share this point of view as nowadays cyberterrorism being one of the means of
confrontation between state, civic and other persons, has been widely used in international arena,
while cyberwar has become a modern form of war and is characterized by obvious and frequent usage
of the last scientific and technical elaborations.
The information threats are constantly evolving while the legislation is usually studied in statics,
not in dynamics. That creates obstacles for developing of legal mechanisms of information and cyber
security. As it was once mentioned by S.A. Halushko (2011), casual addressing of any new threat
does not guarantee the appropriate reaction to it. Therefore, the scholar fosters not only identification
of threats but also the legal determination of their levels and systemic algorithms of the state’s
counteractions to them [10; p. 18].
Considering the contradicting views on the definition of the essentials of the notion of
“information security”, lack of the integrated approach to the creation and ranging of legal framework
on information security provision in Ukraine, the aim of this research is systematization of general
- 1035 -