Cybersecurity and the information protection during the COVID-19 pandemic




cybersecurity, cyberattack, cyber risk, cybercrime, COVID-19 pandemic, fishing., COVID-reality, token


Background. The society has entered the era of innovation, where industrial robots, 3D-printing, cloud sources of information, unmanned vehicles in mass production, 4G and 5G communications, genomics, VR-technologies, smart cities are becoming the usual practice and form the new face of management. However, the COVID-19 pandemic is changing our everyday life: the population is experiencing concern and worry, making actual the need for help and support, a sense of safety and a desire for certainty.
The aim is to identify trends in the spread of cybercrime in the information security market during the COVID-19 pandemic and to substantiate the recommendations for cybersecurity by enterprises in the conditions of COVID-reality.
Materialand methods. In the research process we used a set of general scientific and special methods: analytical, historical, and logical generalizations; economic and sta­tis­tical methods (selective observation, comparative and technical and economic analysis, grouping based on the usage of MS Excel software products); marketing and sociological researches (surveys) as well as the expert assessments.
Results. Every day groups of experienced cybercriminals seize the control of some­one else’s cloud environment, servers, computers and mobile gadgets by launching the series of destructive programs against particular web-sites. Powerful attacks are organized by affecting the servers and clients’ computers, which in a matter of seconds shut down ATMs, the telephone lines, the whole companies, and even the Presidential websites around the world. In different countries, more and more attention is paid to the cybersecurity and the information resources management.
ConclusionAutomated control systems will make possible the use of technical devices instead of workforce in the life-threatening circumstances. In addition, it is very important to change the stereotype in society that a person and his personal data are not interesting to anyone, it is advisable to train professionals to use secure information transfer protocols, use secure information systems to work, and IT workers – to justify the need to apply new secure customer principles in information systems of enterprises.

Author Biographies

Yuliya BILIAVSKA, Kyiv National University of Trade and Economics

Candidate of Economic Sciences, Associate Professor,
Associate Professor at the Department of Management

Nelya MYKYTENKO, Kyiv National University of Trade and Economics

Candidate of Economic Sciences,
Associate Professor, Associate Professor at the Department of Management

Yaroslav SHESTAK, Kyiv National University of Trade and Economics

director of IСC MCIT of KNUTE,
senior lecturer at the Department of Software Engineering and Cybersecurity


Pro osnovni zasady zabezpechennja kiberbezpeky Ukrai’ny: Zakon Ukrai’ny vid 5 zhovtnja 2017 roku № 2163-VIII (V redakcii’ Zakonu Ukrai’ny vid 24.10.2020 № 2163-VIII) [On the Basic Principles of Cyber Security of Ukraine: Law of Ukraine of October 5, 2017, № 2163-VIII (As amended by the Law of Ukraine of October 24, 2020, № 2163-VIII)]. (2020). Retrieved from

Marushhak, A. I. (2018). Informacijno-pravovi aspekty protydii’ kiberzlochynnosti [Information and legal aspects of combating cybercrime]. Informacija i pravo – Information and law, 1 (24), 127-132.

Gucaljuk, M. V. (2019). Okremi aspekty borot’by z organizovanoju kiberzlo­chyn­nistju [Some aspects of the fight against organized cybercrime]. Aktual’ni problemy upravlinnja informacijnoju bezpekoju derzhavy – Actual problems of information security management of the state: Proceeding sof the International Scientific and Practical Conference. (pp. 199-201). Kyi’v: Nacional’na akademija SBU.

Oficijnyj sajt Merezhevoi’ akademii’ Cisco [Official site of the Cisco Networking Academy]. Retrieved from

Oficijnyj sajt Kiberpolicii’ Ukrai’ny [Official site of the Cyber police of Ukraine]. Retrieved from

Kryminal’nyj kodeks Ukrai’ny vid 5 kvitnja 2001 r. № 2341-ХІV [Criminal Code of Ukraine of April 5, 2001, № 2341-XIV]. Verhovna Rada Ukrai’ny – Verkhovna Rada of Ukraine. Retrieved from

Oficijnyj sajt TOV "KPMG-Ukrai’na" [Official site of "KPMG-Ukraine" Ltd.]. Retrieved from

Novye ugrozy kiberbezopasnosti: vse namnogo masshtabnee, chem vy dumali [New cybersecurity threats: everything is much larger than you thought]. Retrieved from

Dubov, D. V. (2014). Kiberprostir jak novyj vymir geopolitychnogo supernyctva [Cyber­space as a new dimension of geopolitical rivalry]. Kyi’v: NISD.

Pechenjuk, A. V. Informacijna bezpeka Ukrai’ny jak skladova nacional’noi’ bezpeky [Information security of Ukraine as a component of national security]. Retrieved from



How to Cite

BILIAVSKA Ю., MYKYTENKO Н., & SHESTAK Я. (2021). Cybersecurity and the information protection during the COVID-19 pandemic. NTERNATIONAL CIENTIFIC-RACTICAL OURNAL OMMODITIES ND ARKETS, 37(1), 34–46.