Evaluating Information Security Strategies in the Public Sector: Efficiency and Cybersecurity Risks
Main Article Content
Abstract
Introduction: Given the steady growth of the importance of information and communication technologies in developing socio-economic and managerial activities, the issue of cybersecurity is becoming particularly relevant. The problem is exacerbated by the military aggression of the Russian Federation in Ukraine, where cybersecurity is positioned as an integral part of national security.
Objectives: The purpose of the article is to analyse modern methods of information protection in the public sector.
Methods: The research methodology is based on several modern scientific methods, including the following: a systemic method, a method of retrospective analysis, comparative analysis.
Results: The author examines the NCSI (National Cyber Security Index) cybersecurity rating and the correspondence of the level of digital development of several countries, particularly Ukraine. Current risks and challenges in the cybersecurity sector are identified. The most effective approaches to the information security strategy, mainly using artificial intelligence and innovative technologies, cooperation with international institutions and monitoring, are studied. The specifics of creating modern integrated information protection systems (IPS), which use artificial intelligence and innovative technologies today, are investigated. It is substantiated that cybersecurity in the public sector should be based on the principle of effective implementation of the functionality of the relevant public authorities.
Conclusions: Thus, it is established that in the cyber defence system, the priority role of protecting information resources and the state’s digital infrastructure is assigned to public authorities. It is substantiated that against the background of active digitalisation of all spheres of public life, active interaction between government agencies, the business sector, research institutions and the public in the context of effective prevention of cyber threats and mitigation of their consequences is becoming a priority.