scholarly journals PRACTICAL IMPLEMENTATION OF THE MODEL OF FORMATION OF CADETS' READINESS TO ENSURE INFORMATION SECURITY IN PROFESSIONAL ACTIVITIES

Author(s):  
Dmitry Dvoretsky ◽  
Natalia Kolesnikova ◽  
Oksana Makarkina ◽  
Kira Lagvilava

The mass introduction of information technologies in the activities of state structures has made it possible to transfer the efficiency of their functioning to a qualitatively new level. Unfortunately, as a means of action, they have characteristic vulnerabilities and can be used not only for good, but also for harm. For the state, as a guarantor of the stability of a civilized society, the issue of ensuring the security of information processing is particularly important. Despite the automation of many information processes, the most vulnerable link in the work of information systems remains a person. A person acts as an operator of information systems and a consumer of information. The entire service process depends on the competence of the operator and the quality of his perception. There are areas of government activity where the cost of error is particularly high. These include ensuring the life and health of citizens, protecting public order and the state system, and ensuring territorial integrity. The specifics of the spheres must be taken into account when ensuring the security of information. This study concerns official activities that are provided by paramilitary groups. Currently, there is a discrepancy in the level of competence of new personnel in the first months of service. The author traces the shortcomings of general and special professional qualities in the field of information security. The purpose of the study is to substantiate certain pedagogical means of forming cadets ' readiness to ensure information security. As forms of theoretical knowledge, we will use the traditional hypothesis and model, as well as functionally distinguishable judgments – problem, assumption, idea and principle. Empirical forms of knowledge will be observation (experimental method) and fixation of facts. To evaluate the effectiveness of the developed pedagogical tools, we use statistical methods: observation (documented and interrogated) and calculation of generalizing indicators. To formulate conclusions, we will use logical methods: building conclusions and argumentation. The approbation of certain pedagogical tools described in this article showed a significant positive trend in terms of competence in information security issues.

2020 ◽  
Vol 16 (4-1) ◽  
pp. 11-21
Author(s):  
Рушана Хазиева ◽  
Розалия Юсупова

This article focuses on information technologies and gives their classification. The advantages and disadvantages of the introduction of the latest information, telecommunication and cybernetic technologies are highlighted. The authors draw attention to the necessity to unite efforts of all countries regarding information security. It is emphasized that in modern conditions the information systems of one country are part of the global system, which in turn leads to the vulnerability of information systems and the possibility of external influence on politics and the economy. Purpose of the article: to show the positive and negative consequences of the achievements of information exchange. Methods: general scientific methods of theoretical knowledge, as well as general logical methods and research techniques are used. Results: In modern conditions of globalization and integration of various world systems, information security issues should remain a priority and be considered in close cooperation of all countries.


Author(s):  
Mykola Ryzhkov ◽  
Anastasiia Siabro

Achievements in the sphere of automatization and telecommunication are an essential component of transformation of the international peace and security system. This article presents, that consequences of changes are of a dual character. On the one hand, new technologies are becoming an important component of society modernization strategies in developing countries, on the other hand, they can be used for armament modernization or creation of new means of confrontation in modern international relations. APR countries face the most relevant issue of information technologies usage. The article deals with the process of discussion of new challenges and threats to international security, emerging as a result of development and large-scale implementation of information-communication technologies. Positions of states regarding the adoption of resolution in the sphere of international information security were studied through examples of Japan, India, and China. It is proved in the article, that information technologies have become an important component of the security system in the world. Technologies usage may lead to steady international development as well as to information arms race. That is why working out a common position on international information security issues is of crucial importance. It is within the framework of the UN, that different states of the world are given an opportunity to express their visions of the problem of international information security and work out common approaches to its solution. The article shows, that states’ positions have similar as well as different features. For instance, all states express concern regarding possible limitation of technology transfer for the establishment of a more controlled international political environment. But states’ positions have major differences as to mechanisms of information security provision. Thus, Japan and India strive to achieve a balanced system of international information security, which should at the same time have preventive mechanisms against the emergence of threats in the information and science and technology spheres and guarantee continuation of scientific-technological development, which is a crucial component of development and modernization strategies in many countries of the world. China came forward with position of strong regulation of international information security issues and suggested framing of corresponding regulations of the states’ conduct in the cyberspace.


2020 ◽  
pp. 2-13
Author(s):  
Vadim Kuchurov ◽  
◽  
Roman Maximov ◽  
Roman Sherstobitov ◽  
◽  
...  

Regulators charge to counter information security threats against the structural and functional characteristics of the information system to ensure the information security requirements. These requirements include information system structure and composition, information technologies and functioning characteristics, physical and logical, functional and technological interconnections between information system segments. They order false components of information system emulation as a basic step of protection, as well as information technologies hiding, information system configuration management and its switching to predetermined configuration that provides a protection. However that steps are not included into basic set and they protection aims are reached with compensative assets, formalizing and implementing inhibitory orders and set of organizational and technical measures on threat source. The purpose of research – to disclose and to state main ways of search of new technical solutions for structure masking of distributed information systems in cyberspace implementing masking traffic taking into account the requirements for the timeliness of information exchange. The method of research – operations research in the face of uncertainty, the application of the theory of Markov processes and Kolmogorov equation for solving the problem of increasing the efficiency of masking exchange. The result of research – finding the probabilistic and temporal characteristics of the functioning process of the data transmission network when applying technical solutions for information systems masking in cyberspace. The results obtained make it possible to explicitly implement protection measures aimed at forming persistent false stereotypes among violators about information systems and control processes implemented with their help.


2020 ◽  
Vol 1 (2) ◽  
pp. 1-9
Author(s):  
Jabbor Mukhammadiev

In the international media space the issues of ensuring information security of the state is inseparably interrelated with the political, economic and legal guarantees for exercising freedom of speech and expression. The problem of ensuring the information security of any state is one of the most important aspects of its foreign policy, since it is the information sphere that is today considered to be the most important object of application of the activities of various participants in international relations. In connection with the rapid development of information technologies, threats of a new type are emerging - threats to information security on a national scale, respectively, the state must respond quickly to a changing situation and take decisive steps to organize a coherent complex information security system. The article analyzes the main approaches to providing information security of the country, formulated the goal, tasks, functions, principles of ensuring information security of the country


2021 ◽  
pp. 99-106
Author(s):  
Roman Vyacheslavovich Streltsov ◽  
◽  
Igor Valerevich Zolnikov ◽  
Sergey Yurievich Ermolaev ◽  
Evgeny Ivanovich Melnikov ◽  
...  

The main tasks in the field of information security organization are: creating a departmental segment and ensuring the required level of information security; improvement of regulatory legal acts and methodological documents of the National Guard Troops; ensuring the required level of information security when fulfilling tasks assigned to the National Guard Troops; development of an information security system and ensuring the provision of public services. The paper reveals the direct relations between information literacy and information security. Information security and information literacy are the two concepts that complement each other. It is impossible to imagine ensuring of information security without the information literacy of a military man. Issues related to the formation of information literacy of the National Guard Troops personnel of the Russian Federation are considered. The analysis of literary sources confirming the significance of the considered issue in the world community is performed. The main tasks for the formation of information literacy among military personnel are presented. The aim of the study is to search for scientific and methodological approaches to the organization of information literacy among military personnel. The purpose of the article military personnel is not only the ability to find the necessary information at various resources, the ability to use information technologies in service and professional activities, but also the ability to navigate in changing technologies taking into account the great pace of their development and increase the volume of information.


Author(s):  
Pamela R. McCauley-Bell ◽  
Lesia L. Crumpton

The information technology field has been increasingly plagued by threats to the security of information systems, networks, and communication media. The solutions to these problems have primarily focused on the techniques to more closely safeguard networks (i.e. firewalls) with similar efforts being put into assessing the vulnerabilities of the hardware and software aspects of the systems. With the exception of discussions into more creative password selection, discussion pertaining to the role of the user, can play in reducing the risk of human error and thus promoting system security has been extremely limited. This lecture will present an overview of information security issues impacted by human interaction that may or may not play a role in promoting system security. Understanding that information systems are in fact composed of hardware and software components which must be addressed using traditional information security protocol, this lecture will provide an understanding of the possible risk that the human/user poses to an information system. Once the risks or factors associated with the human in the security of the system are identified, the next question is do the factors matter? The objective of this lecture is to present an intellectual discussion of human factors issues and their impact on information security. This is an important discussion topic that the information technology field can not afford to ignore.


2020 ◽  
Vol 2020 (2) ◽  
pp. 36-42
Author(s):  
A. Metelkov

In theory and in practice, there is a problem of removing uncertainty in the implementation of technical measures due to the unclear right-hand regulation of classification of measures to ensure the security of data automatically processed in information systems. In the article, based on the application of set theory, it is proposed to remove this uncertainty by selecting groups of measures to ensure the security of information. Information protection in the Federal law "on information, information technologies and information protection" is the adoption of legal, organizational and technical measures. However, in practice, in the system of measures to ensure the information security of objects of protection, they are found not only in a "pure" form, but also in a close relationship, interaction with each other (organizational-legal, organizational-technical, technical-legal), and very often can not be implemented independently.


Vestnik NSUEM ◽  
2020 ◽  
pp. 44-53
Author(s):  
M. N. Kulapov ◽  
I. A. Kalinina ◽  
O. I. Shcherbakova ◽  
S. V. Badmaeva

Rumors as a socio-psychological phenomenon, characteristic of any team and is a reflection of the characteristics of corporate culture. Rumors occupy a special place in the information space of the organization. However, there is no systematic description of the possible effects of rumors on professional activities. Defined in the article 3 of the catalyst in the development of the destructive effect of rumors, given its characteristics, the principal reasons for the emergence and development of rumors in high school bands. Based on the analysis, it is proposed to introduce a system of prevention and regulation of rumors as an element of corporate culture management.This need is associated with ensuring the stability of the development of the University, ensuring its personnel and information security, as well as in terms of the development of a positive image of the University.


Author(s):  
N. Baisholan ◽  
K.E. Kubayev ◽  
T.S. Baisholanov

Efficiency of business processes in modern organizations depends on the capabilities of applied information technologies. The article describes and analyzes the role and features of audit tools and other methodological tools and models in ensuring the quality and security of information systems. The standard’s principles are reviewed, as well as the importance of meeting business needs. In order to protect virtual values in a company’s system environment, the importance of using information security models is revealed. Practical proposals in risk management and information security in information technology are analyzed through the COBIT standard. Measures for protecting the information system of an organization from accidental, deliberate or fake threats are considered. The possibility of using one of the real information security models by the information recipient or provider in accordance with the requirements of external processes is reported. Furthermore, in connection with increase in the number of attack methods and techniques and development of their new tools and vectors, the need to improve and ways to ensure information security are being considered. The essential tasks of security audit are considered, and the stages of their implementation are described. With regard to security of information systems, an analytical model is proposed for determining vulnerability’s numerical value.


2020 ◽  
Vol 16 (4-1) ◽  
pp. 54-63
Author(s):  
Татьяна Полякова

The article is devoted to the analysis of amendments to the Constitution of the Russian Federation relating to the protection of national security, including in the field of information. Purpose: to analyze the role and impact of the amendments to the Constitution of the Russian Federation in 2020. These amendments are related to the State regulation at the federal level of information security and the tasks of ensuring the support and preservation of scientific and technological potential and the development of Russia. Methods: the work is based on the methods of dialectics and system analysis of the information and legal sphere, which allow to comprehensively, logically and consistently study the processes of implementation of constitutional and legal norms and the prospects for their development in the legal regulation of information security in order to identify existing patterns and development trends, as well as priority tasks. Results: the study leads to the well-founded conclusion that referring in the Basic Law to the federal authorities the security of the person, society and the State in the use of information technologies and digital data circulation is a constitutional and legal innovation that is fundamental to the development of legal and scientific research in the field of information security as an important component of the national security of the State, as well as for the development of the system of legal regulation in this areas in information law.


Sign in / Sign up

Export Citation Format

Share Document