<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Can hacking be ethical: A legal review</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Valeriia Filinovych</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Assel Mukasheva</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Kazakh-British Technical University</institution>
          ,
          <addr-line>Tole Bi Str., 59, Almaty, 050000</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Scientific Cyber Security Association of Ukraine</institution>
          ,
          <addr-line>Mykhaila Dontsia Str., 2A, Kyiv, 03161</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The concept of ethical hacking and its legal status in the Ukrainian legal system compared to international approaches is researched in this article. Although organizations often engage pen testers to identify vulnerabilities in their systems, their activities raise complex legal issues, especially in jurisdictions with no clear regulatory framework. The study analyzes Ukrainian legislation, particularly Article 361 of the Criminal Code. It compares it with relevant norms of the United States and the European Union, such as the Computer Fraud and Abuse Act and the NIS2 Directive. It is shown that Ukraine does not explicitly prohibit penetration testing, but it does not have a comprehensive legal framework to regulate such activities. The paper emphasizes the urgent need to define the legal status of ethical hackers, establish activity standards, and implement regulatory safeguards. In war conditions and the growth of cyber threats, legal clarity and structured mechanisms for cybersecurity testing have become crucial for Ukraine's national security and resilience.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;hacking</kwd>
        <kwd>ethical hacker</kwd>
        <kwd>penetration testing</kwd>
        <kwd>cybersecurity law</kwd>
        <kwd>white hat hackers</kwd>
        <kwd>NIS2 Directive</kwd>
        <kwd>Computer Fraud and Abuse Act</kwd>
        <kwd>legal regulation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        At the end of 2025, the Cyber Police Department of the National Police of Ukraine published a report,
according to which the most common cyber threats continue to be phishing, online fraud, database theft,
interference with the work of web resources, and the like [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Quite often, the reason for this is technical
and organizational vulnerabilities, such as insuficient system protection, software vulnerabilities, and
incorrect access management. Of course, the human factor also plays an important role in this.
      </p>
      <p>What can companies do to prevent this from happening? Of course, it is always necessary to start
with a well-developed cybersecurity policy at the enterprise, as well as staf training. It is also important
to search for vulnerabilities in the systems themselves. For this, business entities increasingly turn to
"ethical hackers" for help. However, can hacking be considered legal? In this article, we will answer the
question posed.</p>
      <p>Nevertheless, its basic concepts should be defined before proceeding to the regulatory support of
such a topic.</p>
      <p>
        Thus, hacking, according to the definition of A. Gupta and A. Anand, is a technique for searching for
loopholes and weak spots in ICT systems and networks with the subsequent use of such "soft spots" for
unscrupulous purposes (in particular, obtaining unauthorized access to certain information, modifying
the functions of systems or networks, and the like). That is, the subject committing the act of hacking
pursues clearly diferent goals than those of an ordinary user [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Accordingly, a hacker is a person
who commits the actions mentioned.
      </p>
      <p>The previous formulation clearly indicates the unscrupulousness of the hacker’s goals. However,
does he always act unscrupulous, and can his actions sometimes be helpful for companies and other
business entities?
Legality of Activity</p>
      <p>Legal and authorized</p>
      <p>Semi-legal
Purpose of Activity</p>
      <p>Hired to find holes and
vulnerabilities
White Hat Hacker</p>
      <p>Grey Hat Hacker
Cannot be clearly called
bad; typically act due
to ideological reasons or
“for fun”
Motivation
Typical Actions</p>
      <p>Professional activity; le- Disagreement with
politgal and ethical motiva- ical position or company
tion policy; entertainment
Penetration testing,
vulnerability scanning with
permission</p>
      <p>Hack without
permission, then disclose
vulnerabilities found
Other titles</p>
      <p>Ethical hackers</p>
      <p>Hacktivists</p>
      <p>Crackers
Black Hat Hacker
Unethical and illegal
Act with a negative,
malicious purpose
Usually economic
incentives; less often –
revenge, gaining
popularity
Destroy data, disable
systems, violate
organizational
confidentiality/integrity</p>
      <p>
        Today, many types of hacking are known, and, accordingly, types of hackers. Thus, 10Guards, in
particular, lists 15 such "specialists" (from black hackers to botnet hackers) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. According to the
definition of the already mentioned A. Gupta and A. Anand, there are three main ones - black, gray and
white (Black Hat Hackers, Grey Hat Hackers, White Hat Hackers) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Zoran Cekerevac and others
came to a similar classification, who, in particular, note that both motivated women and men with basic
knowledge and desire, as well as a large reserve of patience and the ability to plan goals, can engage
in hacking, depending on the "classification" such individuals can pursue diferent goals [
        <xref ref-type="bibr" rid="ref1 ref4">1, 4</xref>
        ]. Saachi
Joshi also divides them into three types "by color" [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        Summarizing the existing approaches [
        <xref ref-type="bibr" rid="ref5 ref6 ref7 ref8">5, 6, 7, 8</xref>
        ] to the identification of types of hackers, we note the
following:
• black hackers - always act with a negative, malicious purpose, usually with economic incentives
(less often - for revenge, gaining popularity, and the like.), they are also called crackers. These
attackers try to penetrate a protected network to destroy data, turn of the network, etc. Unethical
ofenders often violate the confidentiality, integrity, or availability of systems and data of a
company or other organization;
• gray hackers - they cannot be unequivocally called bad guys. Usually, their goal is ideological
motives (for example, speaking out against a hostile political position or company policy alien to
them) or "have fun." They are often known as hacktivists. That is, they do not pursue a negative
goal but do not have the appropriate permissions to access information, communication systems,
and networks. Usually, they inform the hacked party about the vulnerabilities found;
• white hackers - they are specially hired to search for holes and other vulnerabilities. They are also
called ethical hackers. They do not violate the law because access is provided to them directly by
the owners, but the methods they use for testing are, in particular, the same as those of black
hats (see Table 1).
      </p>
      <p>In conclusion, we note that black hackers are clearly ofenders, gray ones too, however, they do not
have a useful purpose, but also act without appropriate permission, and white ones are specially hired
individuals who commit hacking on behalf of the organization, network and system that needs to be
tested for vulnerability. The latter and their activities are the subject matter of this article.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Summary of the primary material</title>
      <p>
        White hats are hired to perform penetration testing. It is a comprehensive vulnerability testing, with
a thorough analysis of the system, particularly for poor or incorrect system configuration, hardware,
software deficiencies, and operational weaknesses in the process. Testers can suggest technical
countermeasures [
        <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
        ]. Therefore, ethical hackers are oficially called pentesters.
      </p>
      <p>In Ukraine, the attitude towards hacking is quite specific. The existing legislation does not define
ethical or other types of hackers and generally does not fully regulate this area. An analysis of US and
EU legislation indicates the absence of such definitions in relevant international entities.</p>
      <p>In the context of this issue, the following regulatory acts should be mentioned as of our state: the
Criminal Code of Ukraine, the Laws of Ukraine "On Information", "On Information Protection in
Information and Communication Systems", "On the Basic Principles of Ensuring Cybersecurity in
Ukraine", and the like.</p>
      <p>Thus, Chapter XVI of the Criminal Code consists of six articles devoted to ofenses in the field of
using computers, systems, and networks.</p>
      <p>
        • Its Article 361 regulates the issue of hacking and deals with unauthorized interference with the
operation of computers, systems, and networks, for which a fine of 1-3 tax-free minimum incomes
of citizens (hereinafter - TFMI), or from 1 to 3 years of restriction of liberty or probationary
supervision (without isolation from society) is provided.
• If hackers commit such an ofense by prior conspiracy or repeatedly, the fine will increase to 3-7
thousand TFMI or 2-5 years of restriction or imprisonment.
• If, as a result of the above actions, data is leaked, blocked, forged, or lost, then the fine increases to
7-10 thousand TFMI, and imprisonment will last 3-8 years; the guilty party may also be prohibited
from working in certain positions and engaging in certain types of activities for a period of up to
3 years.
• The latter is also provided with imprisonment for 8-12 years if the relevant hacking caused the
danger of serious man-made accidents or environmental disasters, death, or mass illness of people
[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>
        Given the martial law regime introduced in Ukraine, it is important to consider Part 5 of Article 361,
which concerns cases 3 and 4 above. Accordingly, during such a period, the commission of the above
actions will entail the imposition of liability on the guilty person in the form of imprisonment for 10-15
years [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. These norms apply, first of all, to black and gray hats.
      </p>
      <p>
        As for pentesters, there is a particular Part 6 of Article 361, which directly provides that the listed
actions will not be considered unauthorized interference if they were committed “following the procedure
for searching and identifying potential vulnerabilities of such systems or networks” [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] (see Figure 1).
      </p>
      <p>
        For unauthorized actions with data on computers, systems, and networks, namely their modification,
destruction, or blocking, as well as interception or copying, one can receive a fine in the amount of 2-4
thousand TFMI or be sent to 2 years of corrective labor or be deprived of liberty for a term of up to 3
years, respectively. Suppose such an act is committed again or by a group with prior consent or leads to
significant damage. In that case, the punishment will be more serious - deprivation of liberty for 3-6
years. Such is provided for in Article 362 [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>Table 2 below summarizes the sanctions mentioned, which are applicable to unauthorized interference
and data manipulation as outlined in Articles 361 and 362 of the Criminal Code.</p>
      <p>
        According to Article 20 of the Law on Information, the latter is divided into open and information
with limited access. Article 21 clearly states that there is information with limited access, which is
divided into oficial, secret, and confidential. Collecting, using, distributing, and storing the latter
is prohibited. Nevertheless, there are exceptions: national security, protection of human rights, and
economic well-being. Also, Article 29 allows the dissemination of information with limited access if it
is a subject of public interest [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>
        Article 1 of the Law on Information Protection in Information and Communication Systems defines
unauthorized actions regarding information in the system. These are performed in violation of the
established access procedure [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Accordingly, such actions can be called hacking.
      </p>
      <p>
        According to Article 9 of the said law, the owner of the system or its administrator must ensure the
protection of information in the system. According to Article 1, it is necessary to ensure information
integrity, availability, and confidentiality. Article 11 imposes liability under the law on those guilty of
the relevant violations [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. That is, this law covers the activities of black and gray hats, and violations
will be considered, in particular, disruption of work or unauthorized access to system resources, as well
as the distribution of malicious programs. Therefore, the system must provide for the possibility of user
identification and authentication, measures to counter potential threats, and registration of security
events. The so-called Law on Cybersecurity (2163-VIII) defines the legal framework for cybersecurity but
does not directly mention the terms "hacking," "pentester," or "ethical hacker." Nevertheless, the document
contains several provisions directly related to countering hacking and regulating the possibility of
lawful security testing.
      </p>
      <p>
        Thus, Article 1 of the aforementioned Law defines a cyberattack as an example of hacking. These
are targeted malicious actions in cyberspace using electronic communications, committed to violating
the confidentiality, integrity, availability, or unauthorized access to electronic information resources,
breaking the security and normal functioning of systems, or using such systems to carry out cyberattacks
on other objects of protection in cyberspace. Article 10 of the Law provides for public-private interaction
in the relevant field, which includes, in particular, the development and operation of a system for timely
detection, prevention, and neutralization of threats in cyberspace, "including with the involvement
of volunteer organizations" and interaction with individuals and organizations and companies to
implement cyber defense measures [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. That is, there is a permission to involve pentsters in checking
systems. Three types of liability are provided for illegal actions: civil, administrative, and criminal.
      </p>
      <p>In contrast, we will point to the experience of leading players in the international arena in this
matter. As already noted above, the legislation of the United States also does not contain a legislative
definition of ethical hacking. However, this practice has gained wide recognition in the cybersecurity
community. The key American legal instrument, the Computer Fraud and Abuse Act, criminalizes</p>
      <p>Aggravated circum- Fine (3-7 TFMI) / 2-5 years of liberty
stances restriction or imprisonment
leak/block/361(3)</p>
      <p>Consequential dam- Fine (7-10 TFMI) or 3-8 years
imprisonage caused ment + optional disqualification (up to</p>
      <p>3 years)
Danger of man-made
accident,
environmental disaster,
death, or mass illness
8-12 years imprisonment + optional
disqualification (up to 3 years)
Under martial law – 10-15 years imprisonment + optional
danger to public disqualification (up to 3 years)
With prior authoriza- NOT punishable – exempted explicitly
tion for testing
362(1)</p>
      <p>Basic ofense</p>
      <p>
        Fine (2-4 TFMI) / corrective labor (up
to 2 years)
Consequential dam- Up to 3 years imprisonment +
disqualiage caused fication (up to 3 years)
Aggravated circum- 3-6 years imprisonment +
disqualificastances tion (up to 3 years)
exactly unauthorized access. Nevertheless, in practice, courts have already begun to distinguish between
malicious hacking and authorized testing. The issue of pen testing is also afected to one degree or
another by the norms of the following documents: Digital Millennium Copyright Act, Electronic
Communications Privacy Act, Health Insurance Portability and Accountability Act, and Children’s
Online Privacy Protection Act [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>Note: TFMI refers to Tax-Free Minimum Income (a unit used for calculating fines under Ukrainian law).</p>
      <p>
        The European Union has a special NIS 2 Directive (Directive 2022/2555) that establishes measures to
“achieve a high common level of cybersecurity across the Union” [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. Although it does not contain the
word “pentesting,” it does provide for appropriate procedures.
      </p>
      <p>
        Such a measure simulates a cyber attack on an organization’s assets to identify vulnerabilities.
Systems should be tested once a year after significant IT infrastructure changes or after cyber incidents.
It is worth emphasizing that system testing is not a choice; it is a direct obligation under the Directive
and applies, in particular, to essential entities (providing critical infrastructure), important entities (not
critical but important for the economy), and non-European companies operating in the EU [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>So, although Ukrainian legislation does not contain direct regulation of the activities of pentesters as
a separate category of specialists, this issue is indirectly regulated. The situation is similar with gray
and black hackers. Nevertheless, there is no direct ban on conducting pentesting, the main thing is
that such relations are regulated at the contractual level between the company that needs to check
the system for vulnerability, and the ethical hacker himself. Otherwise, his activities will already be
considered illegal.</p>
      <p>
        We agree with Brian Smith, who insists on the following rules for pentesters:
• first of all, it is necessary to obtain written permission to conduct testing;
• clearly set limits on the scope of testing;
• perform all actions with maximum protection of Sensitive Data;
• avoid interception of communications;
• document all actions;
• provide high-quality reports on the results of testing [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <sec id="sec-2-1">
        <title>For a visual perception of these steps, Figure 2 is presented below.</title>
        <p>Furthermore, from our side, we want to add the importance of absolutely following the current
legislation of Ukraine.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Conclusions</title>
      <p>Summing up the above, hacking activities can indeed be ethical and legal, but only if the owner of the
system or network has previously granted permission for the relevant actions. Agreeing clearly on
technical and legal aspects between the parties is mandatory. Otherwise, the tester’s actions will be
qualified as a criminal ofense.</p>
      <p>Ukrainian legislation does not suficiently regulate this issue; it is fragmentary. However, the analysis
of existing regulatory legal acts allowed us to identify the legal framework of ethical hacking. In
particular, it was determined that, following Part 6 of Article 361 of the Criminal Code, the activities of
pentesters, if they act with prior consent of the owner of the system or network, are legitimate.</p>
      <p>Nevertheless, the existing legislation requires significant improvements; in particular, it is considered
necessary to provide an oficial concept of ethical hacking, with a clear definition of the legal status of
pentesters, and to develop and implement a standardized procedure for security testing. In this regard,
for the sake of legal certainty and protection of the rights of the relevant parties, it is advisable to
develop regulatory documents and instructions for conducting pentesting in the public and private
sectors.</p>
      <p>A separate document should be developed to determine the requirements for pentesters, particularly
the qualifications, prerequisites, and rules for issuing written consent to conduct testing with a record
of permitted actions. Also, a professional standard for ethical hackers in Ukraine is needed.</p>
      <p>Finally, it is worth pointing out the importance of educational activities in society, both in the ethical
aspects of hacking and in general, to raise awareness among citizens in cyber hygiene.</p>
      <p>In this dificult time for Ukraine, when the enemy is everywhere using not only conventional methods
of warfare but also cyber warfare means, a qualitative analysis of systems and networks for vulnerability,
especially for critical infrastructure facilities, with the subsequent elimination of such "holes" can become
the basis for obtaining significant advantages for our state.</p>
    </sec>
    <sec id="sec-4">
      <title>Declaration on Generative AI</title>
      <sec id="sec-4-1">
        <title>The author(s) have not employed any Generative AI tools.</title>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Cyber</given-names>
            <surname>Police</surname>
          </string-name>
          <string-name>
            <surname>Department</surname>
          </string-name>
          ,
          <article-title>Report on the activities of the cyber police department of the national police of ukraine in 2024, 2025</article-title>
          . URL: https://cyberpolice.gov.ua/news/ zvitpro-diyalnist
          <article-title>-departamentu-kiberpolicziyi-naczionalnoyi-policziyi-</article-title>
          <string-name>
            <surname>ukrayiny-</surname>
          </string-name>
          u--roczi-7074/, accessed:
          <volume>12</volume>
          .
          <fpage>06</fpage>
          .
          <year>2025</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A.</given-names>
            <surname>Gupta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Anand</surname>
          </string-name>
          ,
          <article-title>Ethical hacking and hacking attacks</article-title>
          ,
          <source>International Journal of Engineering and Computer Science</source>
          <volume>6</volume>
          (
          <year>2017</year>
          )
          <fpage>21042</fpage>
          -
          <lpage>21050</lpage>
          . doi:
          <volume>10</volume>
          .18535/ijecs/v6i4.
          <fpage>42</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <article-title>[3] 10Guards, The thin line between cybercrime and ethical hacking - the 15 types of hackers you need to know in 2023, 2023</article-title>
          . URL: https://10guards.com/, accessed:
          <volume>12</volume>
          .
          <fpage>06</fpage>
          .
          <year>2025</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Cekerevac</surname>
          </string-name>
          , et al.,
          <article-title>Hacking, protection and the consequences of hacking</article-title>
          ,
          <source>Communications - Scientific letters of the University of Zilina</source>
          <volume>20</volume>
          (
          <year>2018</year>
          )
          <fpage>68</fpage>
          -
          <lpage>72</lpage>
          . doi:
          <volume>10</volume>
          .26552/com.c.
          <year>2018</year>
          .
          <volume>2</volume>
          .
          <fpage>83</fpage>
          -
          <lpage>87</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.</given-names>
            <surname>Joshi</surname>
          </string-name>
          , et al.,
          <article-title>Cybersecurity in the modern world: ethical hacking</article-title>
          ,
          <source>International Research Journal of Modernization in Engineering Technology and Science</source>
          <volume>5</volume>
          (
          <year>2023</year>
          )
          <fpage>1792</fpage>
          -
          <lpage>1798</lpage>
          . doi:
          <volume>10</volume>
          .56726/ irjmets44859.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6] ScienceDirect, Black hat hacker,
          <year>2025</year>
          . URL: https://www.sciencedirect.com/topics/ computer-science/black-hat-hacker,
          <source>accessed: 12.06</source>
          .
          <year>2025</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>J.</given-names>
            <surname>Gaia</surname>
          </string-name>
          , et al.,
          <article-title>Psychological profiling of hacking potential</article-title>
          ,
          <source>in: Proceedings of the 53rd Hawaii International Conference on System Sciences</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>2230</fpage>
          -
          <lpage>2239</lpage>
          . URL: http://hdl.handle.net/ 10125/64014.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>K.</given-names>
            <surname>Zetter</surname>
          </string-name>
          ,
          <article-title>Hacker lexicon: what are white hat, gray hat, and black hat hackers?</article-title>
          , WIRED, ???? URL: https://www.wired.com/
          <year>2016</year>
          /04/hacker-lexicon
          <article-title>-white-hat-gray-hat-black-hat-hackers/</article-title>
          , accessed:
          <volume>12</volume>
          .
          <fpage>06</fpage>
          .
          <year>2025</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A. G.</given-names>
            <surname>Bacudio</surname>
          </string-name>
          , et al.,
          <article-title>An overview of penetration testing</article-title>
          ,
          <source>International Journal of Network Security &amp; Its Applications</source>
          <volume>3</volume>
          (
          <year>2011</year>
          )
          <fpage>19</fpage>
          -
          <lpage>38</lpage>
          . doi:
          <volume>10</volume>
          .5121/ijnsa.
          <year>2011</year>
          .
          <volume>3602</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Mirza</surname>
          </string-name>
          ,
          <article-title>Nis 2 penetration testing</article-title>
          ,
          <source>Cyphere</source>
          ,
          <year>2024</year>
          . URL: https://thecyphere.com/blog/ nis2-penetration-testing/, accessed:
          <volume>12</volume>
          .
          <fpage>06</fpage>
          .
          <year>2025</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <source>[11] Criminal code of Ukraine: Code of Ukraine of 05.04</source>
          .
          <year>2001</year>
          no.
          <issue>2341-iii</issue>
          ,
          <year>2001</year>
          . URL: https://zakon. rada.gov.ua/laws/show/2341-14#
          <article-title>Text, as of 7 June 2025</article-title>
          . Accessed:
          <volume>12</volume>
          .
          <fpage>06</fpage>
          .
          <year>2025</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <source>[12] On information: Law of Ukraine of 02.10</source>
          .
          <year>1992</year>
          no.
          <issue>2657-xii</issue>
          ,
          <year>1992</year>
          . URL: https://zakon.rada.gov.ua/ laws/show/2657-12#
          <article-title>Text, as of 15 November 2024</article-title>
          . Accessed:
          <volume>12</volume>
          .
          <fpage>06</fpage>
          .
          <year>2025</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <article-title>On information protection in information and communication systems:</article-title>
          <source>Law of Ukraine of 05.07</source>
          .
          <year>1994</year>
          no.
          <issue>80</issue>
          -94-vr,
          <year>1994</year>
          . URL: https://zakon.rada.gov.ua/laws/,
          <source>as of 20 April</source>
          <year>2025</year>
          . Accessed:
          <volume>12</volume>
          .
          <fpage>06</fpage>
          .
          <year>2025</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <source>[14] On the basic principles of cybersecurity in Ukraine: Law of Ukraine of 05.10</source>
          .
          <year>2017</year>
          no.
          <issue>2163-viii</issue>
          ,
          <year>2017</year>
          . URL: https://zakon.rada.gov.ua/laws/show/2163-19#
          <article-title>Text, as of 20 April 2025</article-title>
          . Accessed:
          <volume>12</volume>
          .
          <fpage>06</fpage>
          .
          <year>2025</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>B.</given-names>
            <surname>Smith</surname>
          </string-name>
          ,
          <article-title>Laws and regulations for penetration testing</article-title>
          ,
          <source>LinkedIn</source>
          ,
          <year>2025</year>
          . URL: https://www.linkedin. com/pulse/laws-regulations
          <article-title>-penetration-testing-brian-smith-mlfpe/</article-title>
          , accessed:
          <volume>12</volume>
          .
          <fpage>06</fpage>
          .
          <year>2025</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Directive</surname>
          </string-name>
          (EU)
          <year>2022</year>
          /
          <article-title>2555 of the European Parliament and of the council of 14 december 2022 on measures for a high common level of cybersecurity across the union</article-title>
          ,
          <source>EUR-Lex</source>
          ,
          <year>2022</year>
          . URL: https://eur-lex.europa.eu/eli/dir/2022/2555/2022-12-27/eng, accessed:
          <volume>12</volume>
          .
          <fpage>06</fpage>
          .
          <year>2025</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>