• Abstract

    The growing dependence of modern society on digital technologies leads to an increase in cyber threats, which makes the issue of cyber security particularly relevant. The problem of the research is to determine the effective mechanisms of protection of information systems in the conditions of globalization and growing geopolitical challenges. The purpose of the article is to analyze the development of international data privacy standards, the role of the latest technologies in cyberspace protection, and the formation of an effective global network strategy. Special attention is paid to the directions of international cooperation in the development of technological innovations and the training of qualified personnel. The article examines the legal, technological and educational aspects of data security policy, analyzes the experience and practices of different countries, which allows determining effective directions for improving the effectiveness of protection against cyber threats. Based on the conducted research, the main challenges and prospects for the development of the global defense system were determined, including the need to integrate efforts at the international level and integrate into the rapidly changing conditions of cyberspace. The results emphasize the importance of creating a unified global network protection system that ensures the protection of relevant information resources and the privacy of personal data in the digital world. Outlined recommendations for the effective integration of countermeasures into national and international strategies can serve as a factor in ensuring a secure digital future and building an appropriate infrastructure. The results of the article highlight the critical role of global cyber security in ensuring stability and security in today’s digital world, emphasizing the need for a comprehensive approach to its implementation.

  • References

    1. Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions. Electronics, 12(6), 1333. https://doi.org/10.3390/electronics12061333
    2. Botta, A., Rotbei, S., Zinno, S., & Ventre, G. (2023). Cyber security of robots: A comprehensive survey. Intelligent Systems with Applications, 18. https://doi.org/10.1016/j.iswa.2023.200237
    3. Cains, M., Flora, L., Taber, D., King, Z., & Henshel, D. S. (2022). Defining Cyber Security and Cyber Security Risk within a Multidisciplinary Context using Expert Elicitation. Risk Analysis, 42(8), 1643–1669. https://doi.org/10.1111/risa.13687
    4. Cartwright, A., Cartwright, E., & Edun, E. S. (2023). Cascading information on best practice: Cyber security risk management in UK micro and small businesses and the role of IT companies. Computers and Security, 131. https://doi.org/10.1016/j.cose.2023.103288
    5. Catal, C., Ozcan, A., Donmez, E., & Kasif, A. (2023). Analysis of cyber security knowledge gaps based on cyber security body of knowledge. Education and Information Technologies, 28(2), 1809–1831. https://doi.org/10.1007/s10639-022-11261-8
    6. De Azambuja, A. J. G., Plesker, C., Schützer, K., Anderl, R., Schleich, B., & Almeida, VR (2023). Artificial Intelligence-Based Cyber Security in the Context of Industry 4.0 - A Survey. Electronics, 12(8), 1920. https://doi.org/10.3390/electronics12081920
    7. Eze, V. H. U., Ugwu, C. N., & Ugwuanyi, I. C. (2023). A Study of Cyber Security Threats, Challenges in Different Fields and its Prospective Solutions. A Review. INOSR Journal of Scientific Research, 9(1), 13–24. https://www.researchgate.net/publication/367742804. Accessed: March 28, 2024.
    8. Fan, Z., Zhao, P., Jin, B., Tang, Q., Zheng, C., & Li, X. (2023). Research on Key Method of Cyber Security Situation Awareness Based on ResMLP and LSTM Network. IETE Journal of Research. https://doi.org/10.1080/03772063.2023.2176365
    9. Galinec, D. (2023). Cyber Security and Cyber Defense: Challenges and Building of Cyber Resilience Conceptual Model. International Journal of Applied Sciences & Development, 1, 83–88. https://doi.org/10.37394/232029.2022.1.10
    10. Garcia-Perez, A., Cegarra-Navarro, J., Sallos, M., Martinez-Caro, E., & Chinnaswamy, A. (2023). Resilience in healthcare systems: Cyber security and digital transformation. Technovation, 121. https://doi.org/10.1016/j.technovation.2022.102583
    11. Gupta Bhol, S., Mohanty, J.R., & Kumar Pattnaik, P. (2023). Taxonomy of cyber security metrics to measure strength of cyber security. Materials Today: Proceedings, 80, 2274–2279. https://doi.org/10.1016/j.matpr.2021.06.228
    12. Hasan, M. K., Habib, A. A., Shukur, Z., Ibrahim, F., Islam, S., & Razzaque, M. A. (2023). Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations. Journal of Network and Computer Applications, 209. https://doi.org/10.1016/j.jnca.2022.103540
    13. Jamil, A. S., Azeez, R. A., & Hassan, N. F. (2023). An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments. International Journal of Online and Biomedical Engineering, 19(1), 93–106. https://doi.org/10.3991/ijoe.v19i01.36901
    14. Khan, N.F., Ikram, N., Saleem, S., & Zafar, S. (2023). Cyber-security and risky behaviors in a developing country context: a Pakistani perspective. Security Journal, 36(2), 373–405. https://doi.org/10.1057/s41284-022-00343-4
    15. Marican, M. N. Y., Razak, S. A., Selamat, A., & Othman, S.H. (2023). Cyber Security Maturity Assessment Framework for Technology Startups: A Systematic Literature Review. IEEE Access, 11, 5442–5452. https://doi.org/10.1109/ACCESS.2022.3229766
    16. Mishra, S. (2023). Exploring the Impact of AI-Based Cyber Security Financial Sector Management. Applied Sciences, 13(10). https://doi.org/10.3390/app13105875
    17. Muthuswamy, V. V. (2023). Cyber Security Challenges Faced by Employees in the Digital Workplace of Saudi Arabia’s Digital Nature Organization. International Journal of Cyber Criminology, 17(1), 40–53. https://doi.org/10.5281/zenodo.4766603
    18. Nguyen, T. T., & Reddy, V.J. (2023). Deep Reinforcement Learning for Cyber Security. IEEE Transactions on Neural Networks and Learning Systems, 34(8), 3779–3795.https://doi.org/10.1109/TNNLS.2021.3121870
    19. NSCI (2023). National cyber security index in Europe. https://ncsi.ega.ee/ncsi-index/?order=rank&archive=1. Accessed on March 28, 2024.
    20. Patterson, C. M., Nurse, J. R. C., & Franqueira, V. N. L. (2023). Learning from cyber security incidents: A systematic review and future research agenda. Computers and Security, 132. https://doi.org/10.1016/j.cose.2023.103309
    21. Pöyhönen, J., Simola, J., & Lehto, M. (2023). Basic Elements of Cyber Security for a Smart Terminal Process. International Conference on Cyber Warfare and Security, 18(1), 300–308. https://doi.org/10.34190/iccws.18.1.966
    22. Raju, R., Rahman, N. H. A., & Ahmad, A. (2022). Cyber Security Awareness in Using Digital Platforms Among Students in A Higher Learning Institution. Asian Journal of University Education, 18(3), 756–766. https://doi.org/10.24191/ajue.v18i3.18967
    23. Safaei Pour, M., Nader, C., Friday, K., & Bou-Harb, E. (2023, May 1). A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security. Computers and Security, 128. https://doi.org/10.1016/j.cose.2023.103123
    24. Seki, T., Çimen, F., & Dilmaç, B. (2023). The Effect of Emotional Intelligence on Cyber Security: The Mediator Role of Mindfulness. Bartın Üniversitesi Eğitim Fakültesi Dergisi, 12(1), 190–199. https://doi.org/10.14686/buefad.1040614
    25. Shreeve, B., Gralha, C., Rashid, A., Araújo, J., & Goulão, M. (2023). Making Sense of the Unknown: How Managers Make Cyber Security Decisions. ACM Transactions on Software Engineering and Methodology, 32(4). https://doi.org/10.1145/3548682
    26. Statista. (2023). Average cost of all cyber attacks to European and North American firms from 2018 to 2023, by size. https://www.statista.com/statistics/1008112/european-north-american-firms-cyberattack-cost. Accessed on March 28, 2024.
    27. Vesić, S., & Bjelajac, M. (2023). Cyber security of a critical infrastructure. Law - Theory and Practice, 40(2), 77–88. https://doi.org/10.5937/ptp2302077v
    28. Wazid, M., Das, A. K., Chamola, V., & Park, Y. (2022). Uniting cyber security and machine learning: Advantages, challenges and future research. ICT Express, 8, 313–321. https://doi.org/10.1016/j.icte.2022.04.007
    29. Zouqiong H. (2023). Cyber Security Evolution and Conceptualization. Social Science Journal for Advanced Research, 3(1), 1–5. https://ssjar.singhpublication.com. Accessed on March 28, 2024.
    30. Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., & Basim, H. N. (2022). Cyber Security Awareness, Knowledge and Behavior: A Comparative Study. Journal of Computer Information Systems, 62(1), 82–97. https://doi.org/10.1080/08874417.2020.1712269

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Copyright (c) 2024 The Authors

How to cite

Lysenko, S., Liubchenko, A., Коzakov V., Demianchuk, Y., & Krutik, Y. (2024). Global cybersecurity: Harmonising international standards and cooperation. Multidisciplinary Reviews, 7, 2024spe021. https://doi.org/10.31893/multirev.2024spe021
  • Article viewed - 77
  • PDF downloaded - 13