CRIMINOLOGICAL PROTECTION OF CYBERSPACE AGAINST CRIMINAL OFFENSES IN THE FIELD OF EXPLOITATION OF ELECTRONIC COMPUTING EQUIPMENT
DOI:
https://doi.org/10.33244/2617-4154-3(16)-2024-296-302Keywords:
prevention, crime, cyber attacks, criminal offenses, cyber defense, criminology, electronic computing, cyber crimeAbstract
This article indicates the constant development of modern technologies, which creates the need for constant updating of cyber protection in the sphere of cyberspace. It is noted that the open invasion of the Russian Federation accelerated the improvement of current legislation and security guarantees in the modern information IT space. Modern progress does not leave anyone behind, which led to the appearance of such a phenomenon as cybercrime. All over the world, criminal offenses in the field of exploitation of electronic computing equipment in cyberspace from year to year cause losses of tens of billions of US dollars both to individuals and private companies, and to states as a whole.
Attention is drawn to the fact that during a war, state bodies, large enterprises, defense and critical infrastructure enterprises, as well as enterprises that provide the population and defense with everything necessary in war conditions are at risk. There are also risks for local residents who are in the war zone. During martial law, everyone should pay attention to several aspects of control: for companies, authorities and officials, the presence of a technical specialist from a specialized company will significantly increase the level of cyber protection. Professionals are able to complicate the enemyʼs work by introducing the necessary protection mechanisms in the company, including organizational ones.
It is noted that the basis for the legislative provision of mechanisms for effective cyber protection in the conditions of martial law exists.And it has existed since the beginning of the 2000s, when Ukraine ratified the international convention on the prevention of cybercrime dated November 23, 2001. Attention is focused on the fact that the task of everyone, when a cyber attack is detected, remains to activate this mechanism as soon as possible, so that in the future such cyber attacks and interventions and losses from them become less and less. And repelling such attacks became more and more effective.