Statistical Indicators of Cybersecurity Development in the Context of Digital Transformation of Economy and Society
Keywords:cybersecurity, cyber threats, cybercrime, global cybersecurity index, national cybersecurity index, security management
Introduction. The scale and destructive consequences of the unlawful impact on cyberspace is a key problem of modern geopolitics, and cyber reliability is recognized as one of the most important security priorities by the subjects of international relations.
Problem Statement. Monitoring of cyber incidents and anomalies in information and communication systems and prompt response to risks determined by cyber threats require the development of a system of indicators and criteria for cybersecurity assessment.
Purpose. Summarize the international experience of assessing the cybersecurity, to position countries by their level of development in the global space, to identify strengths and weaknesses in cybersecurity management, and to ensure effective protection of cyberspace at the national level.
Materials and Methods. Used the component indices of the international rankings characterizing the potential of the digital economy (ICT IDI, NRI, EGDI) and the participation of countries in the field of cybersecurity
(GCI and NCSI).
Results. It has been argued that cybersecurity ratings play the role of a kind of identifier of the relative advantages and vulnerabilities of the national cyber strategies, and indicate the need for their review in order to
strengthen protection against cyber-attacks and improve the cyber risk management system. In countries with a high level of economic development, which is largely based on the contribution of IT technologies to the national production, the cybersecurity potential is significantly higher, regardless of geolocation. The discovered correlation between GCI, information society development indices (IDI, NRI, EGDI) and GDP
per capita confirms that the digital transformation of the economy and society acts as a key driver of economic
development if the information- and cyber-security are assured only. The best practices are highlighted, and
critically weak segments of the national cybersecurity are identified.
Conclusions. Using the NCSI indicators, the preparedness of Georgia and Ukraine to prevent the implementation of fundamental cyber threats and to manage cyber incidents and large-scale cyber crises is assessed.
Diorditsa, I. (2017). The concept and content of cyber threats at the present stage. Entrepreneurship, Economy and Law, 4, 99—107 [in Ukrainian].
Dubov, D. (2010). Approaches to the formation of thesaurus in cybersecurity. Political Management: Science Journal, 5, 19—30 [in Ukrainian].
2019 Cybersecurity Almanac: 100 Facts, Figures, Predictions and Statistics. URL: https://cybersecurityventures.com/ cybersecurity-almanac-2019 (Last accessed: 26.12.2019).
Dubov, D. (2014). Cyberspace as a new dimension of geopolitical rivalry. Kyiv: National Institute for Strategic Studies.
Danyk, Yu., Vorobiienko, P., Cherneha, V. (2018). The basics of cyber security and cyber defense. Odessa: Odessa National Academy of Telecommunications A.S. Popov.
Global cybercrime-2019: development trends. URL: http://cyberfort.com.ua/analytics/globalnaja_kiberprestupnost2019_tendentsii_razvitija.html (Last accessed: 26.12.2019).
Allianz Risk Barometer Top Business Risks For 2019. URL: https://www.agcs.allianz.com/content/dam/onemarketing/
agcs/agcs/reports/Allianz-Risk-Barometer-2019.pdf (Last accessed: 26.12.2019).
Pupillo, Lorenzo (2018). EU Cybersecurity and the Paradox of Progress. CEPS Policy Insight, № 2018/06, February 2018. URL: https://ssrn.com/abstract=3131559 (Last accessed: 26.12.2019).
Cyber Security in the Deployment of the Fourth Industrial Revolution (Industry 4.0): Challenges and Opportunities for Ukraine. URL: https://niss.gov.ua/en/node/135 (Last accessed: 26.12.2019).
Voytsikhovkyy, A. (2018). Cybersecurity as an Important Component of the National Security System of European Countries. The Journal of Eastern European Law, 53, 26—37 [in Ukrainian].
Cyber defence / NATO-Cyber security. URL: https://www.nato.int/cps/en/natohq/topics_78170.htm (Last accessed: 26.12.2019).
ISO/IEC 27032. (2012). Information technology — Security techniques — Guidelines for cybersecurity. URL: https://
www.sis.se/api/document/preview/915118/ (Last accessed: 26.12.2019).
Cyber Readiness Index 2.0. A plan for cyber readiness: a baseline and an Index. URL: https://www.belfercenter.org/
sites/default/files/files/publication/cyber-readiness-index-2.0-web-2016.pdf (Last accessed: 26.12.2019).
The ICT Development Index (IDI): conceptual framework and methodology. URL: https://www.itu.int/en/ITU-D/ Statistics/Pages/publications/mis/methodology.aspx (Last accessed: 26.12.2019).
Networked Readiness Index. URL: https://reports.weforum.org/global-information-technology-report-2016/networked-readiness-index (Last accessed: 26.12.2019).
UN E-Government Knowledgebase. URL: https://publicadministration.un.org/egovkb/en-us/Reports/UN-E-Government-Survey-2018 (Last accessed 2019.12.26).
Global Cybersecurity Index 2018. URL: https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2018-PDF-E. pdf (Last accessed: 26.12.2019).
National Cyber Security Index 2018. URL: http://ncsi.ega.ee/ncsi-index (Last accessed: 26.12.2019).
Petrov, V. (2018). NATO-Ukraine Cooperation on Cybersecurity International Relations. Political Science Series, 18—19, URL: http://journals.iir.kiev.ua/index.php/pol_n/article/download/3384/3062 (Last accessed: 26.12.2019).
How to Cite
Authors published in the journal “Science and Innovation” agree to the following conditions:
Authors retain copyright and grant the journal the right of first publication.
Authors may enter into separate, additional contractual agreements for non-exclusive distribution of the version of their work (article) published in the journal “Science and Innovation” (for example, place it in an institutional repository or publish in their book), while confirming its initial publication in the journal “Science and innovation.” Authors are allowed to place their work on the Internet (for example, in institutional repositories or on their website).