The training was organized by the Cybersecurity and Infrastructure Security Agency of the Department of National Security of the United States of America (CISA) with the support of the USAID Project "Cybersecurity of Critical Infrastructure of Ukraine".
The curriculum consisted of 2 modules and practice:- Module 1 - SQL 1 Fundamentals;- Module 2 - PL/SQL Fundamentals.The training concept was to present the basic principles of operation of industrial control systems, possible vulnerabilities and methods of protection.
The training program consisted of two modules:- Module I – general training;- Module II – specialized training.The concept of the training was to present the training group in the form of a SOC (Security Operations Center) and, using theoretical and practical training elements, familiarize the training group with SOC activities.
Representatives of the State Research Institute of Cyber Security Technologies participated in the ICS-UKR-CERT program and gained theoretical and practical skills in understanding the work of CERT/CSIRT INCIBE, their interaction with the public/private sector and citizens.Completion of the specified training event allowed the participants to find useful tools for testing systems and networks for vulnerability (Shodan), to increase the general level of knowledge about the features and nature of attacks and vulnerabilities, the level of knowledge about cyber defense of systems and networks, to learn new features of testing systems for vulnerability, to obtain statistical data regarding the most common vulnerabilities in network infrastructures, to consider the possibility of applying and implementing the obtained tools and methods in their own activities.
In the conditions of the rapid development of information technologies, the formation of effective approaches that will ensure the cyber resilience of information systems is extremely important. In order for this work to be as effective as possible, it is necessary to develop cooperation both within the state and at the interstate level, create a modern regulatory framework, and train specialists who will be able to resist threats in cyberspace. This was emphasized by Oleksandr Potii, the deputy head of the State Special Service, during his speech at the World Economic Forum.
The Administration of the State Service for Special Communications and Information Protection of Ukraine and the Information Technology and Cyber Security Service of the Republic of Moldova concluded a Memorandum of Understanding in the field of cyber protection. Signatories to the document are Yuriy Shchygol, head of the State Intelligence Service, and Alesandru Koretskyi, head of the Moldovan service.
In addition to the groups controlled by the FSB of the Russian Federation and the Russian Main Directorate of the General Staff of the Armed Forces of the Russian Federation (Gu Gsh ZS RF, formerly Gru), Ukraine is also actively attacked by the so-called "independent hacktivists", who turned out to be an "umbrella" for state-controlled criminals. In particular, these are Killnet, NoName057(16), XakNet, Anonymous Russia and Cyber Army of Russia. These hacker groups actually cooperate with each other. They attacked the same or similar targets and retweeted each other's messages on social media.
In Ukraine, work continues on improving the personnel training system and strengthening personnel potential in the field of information and cyber security. The reform envisages, in particular, the development and implementation of new professional standards taking into account the best international experience. The new professional standards are important both for employers and for educational institutions, which can adapt their educational and professional programs accordingly.
The occupiers in the temporarily occupied territories are trying to connect Ukrainians to Russian Internet networks, where there is equipment for filtering Internet traffic, which made it possible to block many Ukrainian and international web resources. To avoid tracking and bypass restrictions, we advise Ukrainian users connected to Russian networks to use VPN services.
An IP address, or Internet Protocol address, is a unique numerical identifier of a gadget on the network, which is needed to transfer information between devices. Every computer, tablet, smartphone connected to the Internet has an IP address. It can be static (permanent, provided by the provider) and dynamic (changes every time you connect to the Internet).