Analysis of Automated Transport Information Systems in the Context of Critical Information Infrastructure of the Russian Federation

Author(s):  
Kristina V. Egorova ◽  
Lidiya M. Ilchenko ◽  
Sergey S. Sokolov ◽  
Yuri F. Katorin
2020 ◽  
Vol 6 (1) ◽  
pp. 22-30
Author(s):  
Vladimir R. An ◽  
Valeria A. Tabakaeva ◽  
Valentin V. Selifanov

The problem of developing a cybersecurity audit methodology for state information systems related to significant objects (SO) of critical information infrastructure (CII), operating on the basis of data centers is considered. In accordance with the requirements of the legislation, state control is carried out in accordance with the Order of the FSTEC of Russia dated February 11, 2013 №17 “Requirements. Ensuring the protection of information not constituting a state secret.” Currently, there are many international and domestic recommendations and practices to conducting cybersecurity audit of information systems, but they do not meet the existing and emerging requirements in the field of cybersecurity of SO CII of the Russian Federation and cannot be applied without significant improvement. The authors consider the issues that need to be solved in order to develop an audit methodology, analyze existing legislative and regulatory acts of the Russian Federation and Federal Executive bodies authorized in this area, methodological documents (MD) and standards, as well as possible reasons for the current situation. An algorithm of possible actions for conducting a cybersecurity audit in the course of state control is proposed. The algorithm is a result of compiling international practices (standards) and requirements adopted in the Russian Federation, as well as requirements to the necessary tools - vulnerability analysis systems and support software (database management systems).


Author(s):  
Ilia Pavlovich Mikhnev ◽  
Svetlana Vladimirovna Mikhneva

The article discusses the competences and powers of the state authorities of the Russian Federation within their legal status in the field of ensuring the security of critical information infrastructure. Some functions and authorities in the field of information security have changed in a number of federal executive bodies. In particular, the Federal Security Service, on the basis of a presidential decree, is authorized to create a state system for detecting, preventing and eliminating the consequences of computer attacks on information resources of the Russian Federation. However, not all rights and obligations are enshrined; a number of powers cause the duality of the legal status of certain federal bodies of state power. The clarity and unambiguity of securing the rights and obligations of state bodies authorized in the field of information security are guarantees for effectively ensuring the security of important information infrastructure facilities.


Author(s):  
N.M. Kurbatov

The concept of critical information infrastructure is analyzed. The history of its formation and consolidation in the legal space of Russian legislation is considered. The article studies the experience of foreign countries in the field of ensuring information security in general and protecting critical infrastructure in particular. The relevance of the chosen topic is due to the course taken by the Russian Federation for the development of the information society in the country, as well as the need to protect significant information systems and resources of state authorities. The author of the article reveals the terms included in the definition of critical information infrastructure, enshrined in the legislation of the Russian Federation. In conclusion, the main problems of the considered regulatory legal acts are highlighted, recommendations are given on the further development of the information security system of critical infrastructure.


Author(s):  
Artem Nikolaevich Gulemin

The object of this research is the public relations with regards to processing of information in the Unified Federal Information Register Containing Data on the Population of the Russian Federation n. Besides the Federal Law “On the Unified Federal Information Register Containing Data on the Population of the Russian Federation”, the subject of this research is legislation in the area of personal data and legislation on the critical information infrastructure. Based on the main formal and substantive aspects, the author defines the indicated register as a variety of register-based information; substantiates the relevance of application of the principles of framework regulation of information law in the context of creating the register; raises the question on the need to recognize the information system that processes data contained in the register as a valuable object of critical information infrastructure. The novelty of this research consists in the fact that this article is one of the first works dedicated to provision of legal security of the Unified Federal Information Register Containing Data on the Population of the Russian Federation. The following conclusions and proposals on improvement of legislation are formulated: 1) The principles of legal regulation established by legislation with regards to information as the object of legal regulation should be applied to the created register; any unauthorized actions with a separate register entry should be viewed as violation of integrity of the entire object. 2) Due to critical importance of the data contained in the register, it is essential to set confidentiality restrictions, and recognize the federal nformation system that processes data contained in the register as a valuable object of critical information infrastructure. 3) In the text of the Law “On the Unified Federal Information Register Containing Data on the Population of the Russian Federation”, it is necessary to specify the responsibilities of operator of the federal information system who maintains the federal register and compliance with the requirements of legislation on the security of critical information infrastructure. It is also necessary to clarify the provisions of the Decree of the Government of the Russian Federation that establishes a list of criteria of importance of the objects of critical information infrastructure of the Russian Federation and their value.


2019 ◽  
Vol 6 (1) ◽  
pp. 203-208
Author(s):  
Julia Isaeva ◽  
Valentin Selifanov

The need for conformity assessment of information security tools at significant objects of critical information infrastructures is demonstrated. In the absence of necessary criteria description for information systems, a possibility of threats implementation appears, which will lead to disruption of functioning of significant objects.


2021 ◽  
Vol 2 ◽  
pp. 97-107
Author(s):  
Ya. О. Kuchina ◽  

A new article was introduced into the Criminal Code of the Russian Federation in 2017, which establishes criminal liability for unlawful impact on the critical information infrastructure of the Russian Federation. However, there is still no developed legal practice of applying this article, despite repeated statements of experts about the significant prevalence of crimes that encroach on the security of critical information infrastructure. The author of the article discovered one criminal case instituted on the grounds of a crime prohibited by Art. 2741 of the Criminal Code. The proposed article contains an analysis of the legal issues of this article, including the consideration of the specifics of qualification under Part 1, Part 2, and Part 3 of Art. 2741 of the Criminal Code. The concept of critical information infrastructure as an object of crime is considered, suggestions are made about the features of qualification of acts that will minimize law enforcement errors.


2020 ◽  
Vol 6 (2) ◽  
pp. 99-104
Author(s):  
Valeria A. Tabakaeva ◽  
Igor N. Karmanov ◽  
Vladimir R. An

The article discusses the problem of using intelligent systems in managing information security of critical information infrastructure objects. Currently, the development of information technologies reached the point of transition to widespread use of various intelligent systems. At the same time, their application is also noted in the sphere of ensuring the security of significant objects of critical information infrastructure of the Russian Federation. Cybersecurity parameter management systems have a special place as fundamental elements for ensuring security during operation, as well as responding to external and internal incidents with the required efficiency and speed. In the course of the research, we select ways to solve such problems as choosing a threat model and protection system architecture for an object of critical information infrastructure of the Russian Federation.


2019 ◽  
Vol 8 (6) ◽  
Author(s):  
Ildar R. Begishev ◽  
Zarina I. Khisamova ◽  
Guzel I. Mazitova

The article considers the problems associated with the development of new state approaches to ensure the security of critical information infrastructure (hereinafter - the CII) in the context of the existence of threats to their information security, including computer attacks in its regard. We analyzed the main provisions of the Federal Law No. 187-FZ dated July 26, 2017 “On the Safety of the CII of the Russian Federation”.We disclosed the content and essence of the concept of “security of the CII”. It is justified that the security of the CII shall be based on the principles and methodology of ensuring national security. We have developed proposals to classify part of the subjects of economic activity as the CII subjects, as well as offered some additional mechanisms to increase the security of the CII. We proposed to develop and implement: the federal state standard of higher education in the direction of “safety of the CII”; retraining and advanced training courses in the direction of “safety of the CII”; a mechanism for improving the qualifications of officials of the CII subjects on various issues of ensuring its security; security insurance mechanism for the CCI; a mechanism for organizing international, all-Russian, regional and sectoral cyber orders at the CII objects. It has been established that the security of the CII directly depends on the correctness of decision-making in countering computer attacks, the speed and effectiveness of the actions of their entities. It is proved that the criminal law norm on liability for unlawful influence on the CII of the Russian Federation shall be changed


2021 ◽  
Vol 54 (2) ◽  
pp. 71-80
Author(s):  
MAKSIMOVA ELENA A. ◽  
◽  
SADOVNIKOVA NATALYA P. ◽  

With the introduction of No. 187-FL in 2017, new priorities have been identified in the Russian Federation at the level of ensuring the stability and information security of society and the state as a whole. The issues of the security of the functioning of the subjects of the critical information infrastructure (CII) are identified as priorities. However, regulatory legal acts introduced on this issue are considered without a methodological assessment of intersubjective interaction at the level of the CII. At the same time, not taking this factor into account when building a security system at CII facilities reduces its effectiveness, brings a destructive effect to the system and can be considered as a vulnerability at the infrastructure level. In this article, the elements of the methodological basis for considering intersubjective interaction as a source of destructive influence on the subject of critical information infrastructure are proposed. The result of the analysis of the types of intersubjective relationships within the areas of functioning of the CII.


Sign in / Sign up

Export Citation Format

Share Document