Будь ласка, використовуйте цей ідентифікатор, щоб цитувати або посилатися на цей матеріал: https://dspace.mnau.edu.ua/jspui/handle/123456789/18808
Повний запис метаданих
Поле DCЗначенняМова
dc.contributor.authorKrasnobayev, Victor-
dc.contributor.authorYanko, Alina-
dc.contributor.authorHlushko, Alina-
dc.contributor.authorKruk, Oleg-
dc.contributor.authorKruk, Oleksandr-
dc.contributor.authorGakh, Vitalii-
dc.contributor.authorOnyshchenko, Svitlana-
dc.contributor.authorMaslii, Oleksandra-
dc.contributor.authorKivshyk, Oleksandr-
dc.contributor.authorPotapova, Kateryna-
dc.contributor.authorNalyvaichuk, Mykola-
dc.contributor.authorMeliukh, Vasyl-
dc.contributor.authorGurynenko, Stanislav-
dc.contributor.authorKoliada, Kostiantyn-
dc.contributor.authorScherbyna, Alexandre-
dc.contributor.authorПолторак, Анастасія Сергіївна-
dc.contributor.authorPoltorak, Anastasiya-
dc.contributor.authorТищенко, Світлана Іванівна-
dc.contributor.authorTischenko, Svetlana-
dc.contributor.authorХристенко, Ольга Андріївна-
dc.contributor.authorKhristenko, Olga-
dc.contributor.authorРибачук, Володимир Петрович-
dc.contributor.authorRybachuk, Volodymyr-
dc.contributor.authorКузьома, Віталій Вікторович-
dc.contributor.authorKuz'oma, Vitaliy-
dc.contributor.authorСтамат, Вікторія Михайлівна-
dc.contributor.authorStamat, Viktoriia-
dc.contributor.authorKolesnyk, Maksym-
dc.contributor.authorArefieva, Olena-
dc.contributor.authorOnopriienko, Dmytro-
dc.contributor.authorKovalenko, Yuliia-
dc.contributor.authorOstapenko, Tetiana-
dc.contributor.authorHrashchenko, Iryna-
dc.date.accessioned2024-10-16T07:36:12Z-
dc.date.available2024-10-16T07:36:12Z-
dc.date.issued2023-
dc.identifier.citationKrasnobayev, V., Yanko, A., Hlushko, A., Kruk, O., Kruk, O., Gakh, V., Onyshchenko, S., ... Hrashchenko, I. (2023). Economic and cyber security. Privat Company Technology Center. https://doi.org/10.15587/978-617-7319-98-5.uk_UA
dc.identifier.urihttps://dspace.mnau.edu.ua/jspui/handle/123456789/18808-
dc.description.abstractCollective monograph highlights the results of systematic scientific research devoted to the problems of economic cyber security as a component of the financial security of the state, and contains practical recommendations on measures to strengthen the security of the state, in particular strategically important enterprises, in the presence of modern threats. Chapter 1 analyzes the position of Ukraine in the global cyber security ratings and outlines promising directions for increasing its level, one of which is the improvement of information protection systems of critical infrastructure objects. A data comparison algorithm is considered, which consists in continuous monitoring and scanning of data by constantly comparing data with information patterns of users and services, as well as threat patterns and indicators based on previous experience, not only one's own, within a local network or system, but also globally scale. An improved method of rapid data comparison is presented, which provides maximum accuracy of comparison with a minimum amount of equipment for comparing devices. Its use makes it possible to identify potential cyber threats and take preventive measures, which will increase the level of protection of critical infrastructure objects. Chapter 2 focuses on defining strategic directions for ensuring economic cyber security of business in Ukraine. The importance of information protection in the context of the development of the digital economy has been updated, and the place of economic cyber security in the national security system has been determined. A thorough analysis of the dynamics of cyber incidents in the world in recent years was carried out and the specifics of the manifestation of cyber threats at the macro and micro levels were outlined. Special attention is paid to the intrusion detection process and a detailed study of the working principles of modern intrusion detection and prevention systems. It is expected that the use of the proposed recommendations on the cyber security policy will significantly increase the level of information security (confidentiality, integrity and availability) of the business. Chapter 3 is dedicated to solving the problem of strengthening the security of strategically important enterprises of Ukraine by developing effective forms of implementation of the state regulatory policy in this direction. The issue of identifying strategically important enterprises and forming their security at the state level as a basis for supporting and restoring the national economy has been updated. The strategic directions of deregulation of business activity in Ukraine, including strategically important enterprises, have been determined. One of them is institutional support of state regulatory policy, improvement of regulatory policy. On the basis of the analysis of the existing institutional support of the state regulatory policy regarding strategically important enterprises, it has been proved that the basis of the formation of effective forms of implementation of the state regulatory policy of support and strengthening of the security of strategically important enterprises is the need to improve the current legislation, the formation of effective institutional and organizational support and the clustering of the national economy based on strategic important. enterprises with the possibility of creating integrated corporate structures. A model of the process of assessing the effectiveness of the implementation of the state regulatory policy on ensuring the security of strategically important enterprises is proposed, which provides regulatory bodies with a tool to influence its level with the provision of economic development and social stability in Ukraine. Chapter 4 explores Semantic role labeling (SRL) as a key Natural Language Processing (NLP) task that plays a vital role in extracting meaningful information from text. The role of SRL and its application is considered in the context of economics and cyber security, because the accurate definition and analysis of semantic roles in text is critical due to the rapid increase in the amount and complexity of textual information. State-of-the-art NLP classifiers used in decision-making, market analysis and financial reports, media articles, and economic texts are reviewed. It is emphasized that the process of determining relevant information from a large array of data collected from disparate sources requires an optimal methodological base, which should include the use of special tools for cleaning, tokenization, marking parts of speech with labels for preparation for NLP analysis. With the help of NLP classifiers, it becomes possible to automatically identify data, which allows to get information about market trends or security threats, depending on the specific field. Chapter 5 is dedicated to the comprehensive substantiation of the theoretical and methodological foundations and practical methods of monitoring the state of financial security of Ukraine in conditions of economic turbulence as a factor ensuring the preservation of the state's financial system. Indicators of the state of financial security of regions are proposed and it is proved that they are not strongly connected, and also interconnected with the state of financial security of the state, which allows their use as input information in the process of calculating the integral indicator of the state of financial security of the region. On the basis of the proposed methodology for assessing the state of financial security of regions, integral indicators of the state of financial security of regions of Ukraine were calculated, which are actually the result of collapsing indicators by subsystems into a system index for a certain region. Chapter 6 discusses the essence and features of the circular economy as an innovative component of the modern economy, which functions and develops on the basis of sustainable development, the deep reasons for its emergence, formation and transformation into a factor in the formation of a new paradigm of the global economy. Being a mechanism for the implementation of the Global Goals of sustainable development, the concept of a closed cycle economy encourages highly developed countries and businesses to introduce innovations and define the development of a circular economy as a priority in their long-term strategies.uk_UA
dc.language.isoenuk_UA
dc.subjectCircular economyuk_UA
dc.subjectEconomic cyber securityuk_UA
dc.subjectInstitutional supportuk_UA
dc.subjectInteger economic data processing systemsuk_UA
dc.subjectIntrusion detection systemsuk_UA
dc.subjectModular number systemuk_UA
dc.subjectMonitoring financial securityuk_UA
dc.subjectNational economyuk_UA
dc.subjectNational securityuk_UA
dc.subjectNatural language processinguk_UA
dc.subjectNon-positional number systemuk_UA
dc.subjectSemantic role labelinguk_UA
dc.subjectState regulatory policyuk_UA
dc.subjectStrategically important enterprisesuk_UA
dc.subjectUnauthorized accessuk_UA
dc.titleEconomic and cyber securityuk_UA
dc.typeBookuk_UA
Розташовується у зібраннях:Монографії (Обліково-фінансовий факультет)
Монографії (Факультет менеджменту)
Публікації науково-педагогічних працівників МНАУ у БД Scopus

Файли цього матеріалу:
Файл Опис РозмірФормат 
210-Book Manuscript-850-1-10-20231130.pdf7,78 MBAdobe PDFПереглянути/Відкрити


Усі матеріали в архіві електронних ресурсів захищені авторським правом, всі права збережені.