Legal Principles for Information Security Evaluations

2007 ◽  
pp. 285-350
2005 ◽  
pp. 99-146
Author(s):  
Bryan Cunningham ◽  
Ted Dykstra ◽  
Ed Fuller ◽  
Matthew Hoagberg ◽  
Chuck Little ◽  
...  

2020 ◽  
Vol 79 (4) ◽  
pp. 32-38
Author(s):  
І. Д. Казанчук ◽  
В. П. Яценко

Based on the analysis of scientific concepts and legal principles the author has provided the definition of information security, provision of information security in Ukraine and has characterized its components. The current state of legal regulation of the organization and activity of cyberpolice units of the National Police of Ukraine has been analyzed. Particular attention has been paid to the legal analysis of the tasks, functions and structure of the Cyberpolice Department of the National Police of Ukraine. Special attention has been drawn to certain shortcomings of Ukrainian legislation in the field of ensuring information security by the police, its compliance with the norms and standards of international law. Taking into account the specifics of the tasks, the author has provided characteristics of the functions of cyberpolice units in the information sphere, which should be divided according to the purpose into: 1) basic (external), which are focused on law enforcement and preventive aspects; 2) auxiliary (intrasystem), which are focused on promoting the implementation of basic functions, the introduction of appropriate management mechanisms within the system. It has been stated that the modern system of ensuring information security and cybersecurity in Ukraine should be one effective system, consisting of such mandatory components as legal, educational and technical. It has been concluded that in order to improve the legal principles for the organization and activities of cyberpolice units of the National Police in the field of ensuring information security and counteracting cyber threats, first of all, it is necessary to optimize the organizational structure of cyberpolice, reasonably distribute the functions (powers) between cyberpolice units and other subjects combating cyber threats in Ukraine, to create appropriate conditions for reaching a qualitatively new level of interaction between them and coordination of their activities in the field of ensuring information security in modern conditions.


2018 ◽  
Vol 5 (4) ◽  
pp. 9-16
Author(s):  
N I Kostenko

The aim of the study is to form basic approaches to formation and development of the law of international information security. The relevance of such an analysis is provided by the analysis of the legal nature of international information security. Examines the information component, which is an important component of international and national security. Explores the international information security management issues within the framework of the law of international law and of international information security in particular. Examines the problem of ensuring international information security on the improvement of the legal system of international information security. Analyses the legal nature of international information security in modern conditions. Explores approaches to the subject of education newly emerging branch of international law: the right of international information security. The work involves scientific and private scientific research methods, including analysis, synthesis, deductive, inductive, systematic methods, normative-logical method and other methods of cognition. In an article in a special way the role of information security at the international level and of ensuring international information security actors are the State, its bodies, legal entities and natural persons, who are required to carry out its activities in a specified direction. The novelty of the study is: firstly, the international information security is aimed at forming and ensuring international information security legal regime on the basis of the universally recognized principles and norms of international law and international treaties; secondly, international legal principles and norms regulating the legal status of the information space, usage of public persons, belong to the branch of international law: the right of international information security; thirdly, under the international information security understand global information system security from threats of «triad»- terrorist, kiberprestupnye and politico-military (under military-political threats means information warfare and information confrontation). Fourthly, the international information security is governed by universally recognized principles and norms of international law, international treaties of the Russian Federation and.


Author(s):  
Serhiі Oleksiyovych Lysenko

The article deals with the principles of creating a special theory of administrative and legal regulation of information security, analyzes the process of its analogy with physical laws, analyzes the threats and dangers to interests and all information security that affect the process of modeling, determines the principles of constructing and researching models of information security of social systems. It was noted that the administrative and legal regulation of information security is due to the need for state management of the processes of formation and use of information resources, the creation and application of information systems and the provision of information security of social systems. It is proved that to a large extent information security is caused by the need for administrative regulation of information relations in various spheres that form the system itself and maintain its integrity. It is determined that the administrative and legal basis of information security of social systems should provide an ideal state of activity of subjects, system and its models. Selected concrete administrative and legal principles of information security, such as physical formulas, create its model. Of course, for each social system, the model of information security is individual. However, there are also general patterns of modeling, for example — the construction of the model should be based on the simple and optimal (as we are referred to by the flow of light), administrative and legal principles. It is proved that high rates of development of information technologies, create new requirements to the sphere of security in general and to information security in particular. The reform of the legislation regulating activity in the field of information security should be based on the proper scientific theory. What is urgent is the need to create a General Security Theory, which would explain and regulate the set of processes of ensuring the safety of society.


Author(s):  
Serhiі Oleksiyovych Lysenko

The article deals with the principles of creating a special theory of administrative and legal regulation of information security, analyzes the process of its analogy with physical laws, analyzes the threats and dangers to interests and all information security that affect the process of modeling, determines the principles of constructing and researching models of information security of social systems.It was noted that the administrative and legal regulation of information secu- rity is due to the need for state management of the processes of formation and use of information resources, the creation and application of information systems and the provision of information security of social systems. It is proved that to a large extent information security is caused by the need for administrative regulation of information relations in various spheres that form the system itself and maintain its integrity. It is determined that the administrative and legal basis of information security of social systems should provide an ideal state of activity of subjects, system and its models. Selected concrete administrative and legal principles of information security, such as physical formulas, create its model. Of course, for each social system, the model of information security is individual. However, there are also general patterns of modeling, for example — the construction of the model should be based on the simple and optimal (as we are referred to by the flow of light), administrative and legal principles.It is proved that high rates of development of information technologies, create new requirements to the sphere of security in general and to information security in particular. The reform of the legislation regulating activity in the field of infor- mation security should be based on the proper scientific theory. What is urgent is the need to create a General Security Theory, which would explain and regulate the set of processes of ensuring the safety of society.


Sign in / Sign up

Export Citation Format

Share Document