Analysis of the ways of improvement of Ukraine – NATO cooperation on cybersecurity issues
Abstract
Recent events in Ukraine have shown that, along with the advancement of information technology, methods of conducting modern warfare are being enhanced. Cyberspace is deliberately used by the Russian Federation to commit cyber warfare against Ukraine. Therefore, in order to address their influence effectively, it is important not only successfully deal with its consequences but also to foresee the potential adversaryʼs actions by analyzing their previous operations and incorporating the lessons learned by other countries.
Across the globe, including Ukraine, the issue of information security and cyberattacks has become exceedingly urgent. Everybody is aware of the ongoing attacks on information networks of various government agencies and energy firms, cyberattacks on e-mail networks of political parties and organizations around the world. Likewise, despite the steadily growing numbers, cyberattack cases against the individuals and private businesses are not reported as widely as they occur.
As a result, The North Atlantic Alliance countries began tackling the issue of cyberthreats much earlier than Ukraine. Consequently, NATO and its allies rely on powerful and robust cyber defenses to ensure the Alliance's core tasks of collective defense.
The article discusses methods and strategies for providing cyber defense in NATO member states and recommends ways to increase the level of protection in the state's cyber space, as part of Ukraineʼs national security and defense domain.
Downloads
References
Relations with Ukraine / The North Atlantic Treaty Organization's official website. URL: https://www.nato.int/cps/en/natolive/topics_37750.htm (accessed 12/01/2020)
Speech by NATO Secretary General Anders Fogh Rasmussen to the chairpersons of the foreign affairs committees of the European Union member’s states parliaments, Copenhagen (12 March 2012) / NATO multimedia library. URL: http://www.natolibguides.info/nato-eu/documents (accessed 11/12/2019)
Defending against cyber attacks / The North Atlantic Treaty Organization's official website. URL: https://www.nato.int/cps/en/natohq/ topics_118663.htm?selectedLocale=en (accessed 14/02/2020)
The Cyberpolice of Ukraine. Diskcoder. C virus was the cover up for the largest-scale cyberattack in the history of Ukraine. URL: https://cyberpolice.gov.ua/news/prykryttyam-najmasshtabnishoyi-kiberataky-v-istoriyi-ukrayiny-stav-virus-diskcoderc-881/. (accessed 10/02/2020) [In Ukrainian]
Ukrinform (2017) The Ministry of Defense has successfully repelled the cyberattack. Multimedia broadcasting platform of Ukraine. URL: https://www.ukrinform.ru/ rubric-society/2256867-v-ukraine-sozdaut-kibervojska-poltorak.html. (accessed 09/11/2019) [In Russian]
On approval of the plan of actions for 2018 on implementation of the Cybersecurity Strategy of Ukraine / Legislation of Ukraine. URL: https://zakon.rada.gov.ua/laws/show/481-2018-%D1%80 (accessed 09/03/2020) [In Ukrainian]
On approval of the action plan for 2017 on the implementation of the Cybersecurity Strategy of Ukraine / Legislation of Ukraine. URL: https://zakon.rada.gov.ua/laws/show/155-2017-%D1%80 (accessed 24/03/2020) [In Ukrainian]
On the decision of the National Security and Defense Council of Ukraine of January 27, 2016 “On the Cybersecurity Strategy of Ukraine” Legislation of Ukraine. URL: https://zakon.rada.gov.ua/laws/show/155-2017-%D1%80 (accessed 24/03/2020) [In Ukrainian]
Dubov D. Cyber space as a new dimension geopolitical rivalry. Monograph. 2014. 328 pp.
Abstract views: 1099 PDF Downloads: 663
Copyright (c) 2020 Volodymyr Shypovskyi, Volodymyr Cherneha, Serhiy Marchenkov

This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors agree with the following conditions:
1. Authors retain copyright and grant the journal right of first publication (Download agreement) with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors have the right to complete individual additional agreements for the non-exclusive spreading of the journal’s published version of the work (for example, to post work in the electronic repository of the institution or to publish it as part of a monograph), with the reference to the first publication of the work in this journal.
3. Journal’s politics allows and encourages the placement on the Internet (for example, in the repositories of institutions, personal websites, SSRN, ResearchGate, MPRA, SSOAR, etc.) manuscript of the work by the authors, before and during the process of viewing it by this journal, because it can lead to a productive research discussion and positively affect the efficiency and dynamics of citing the published work (see The Effect of Open Access).