scholarly journals The main directions of improving the legal policy to ensure information security in the context of globalization

2021 ◽  
Vol 3 ◽  
pp. 2-4
Author(s):  
V.A. Avdeev ◽  
◽  
O.A. Avdeeva ◽  

The article reveals the problems of ensuring information security in the context of modern globalization of international life, high rates of development of technical and information resources. The relevance of optimization of tools in the field of information security is noted. The priority role is given to the improvement of criminal and other sectoral legislation aimed at prevention, prevention, counteraction to crimes and offenses in the field of computer information. Particular importance in the field of information security is given to the criminallegal regulation of objects of criminal-legal protection. Close attention is paid to the issues of detection, disclosure and accurate legal assessment of crimes and offenses implemented in cyberspace. The importance of the international community in setting universal standards for information security is emphasized.

Author(s):  
Vadim Avdeevich Avdeev ◽  
◽  
Olga Anatolievna Avdeeva ◽  
Vera Vladimirovna Smirnova ◽  
Ilya Mihajlovich Rassolov ◽  
...  

The article reveals the problems of information security in modern conditions with the globalization of international life, changing polycentric relations, taking into account the high rates of development in technical and information resources. The special importance of ensuring information security as an object of legal protection protected by international and national law is noted. The issues of eliminating conflicts in the norms of international law, preventing the possibility of their spreading to the territory of individual sovereign states, are being addressed. The correlation between the norms of international and national law emphasizes the expediency of improvement and adoption of new normative legal acts of universal and regional significance which can be used by member states when innovating national criminal and other sectoral legislation. It is a priority to improve international and national legal policy for the modernization of national legal systems for the prevention and combating of cybercrime. An effective mechanism of legal regulation for the objects to be legally protected is of fundamental importance for ensuring information security. Particular attention is focused on solving the issues of detection, disclosure and accurate legal evaluation of crimes and offences committed in cyberspace. The importance of the international community to establish universal standards to ensure information security is emphasized


Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


2020 ◽  
Vol 23 (6) ◽  
pp. 99-114
Author(s):  
B. S. Dongak ◽  
A. S. Shatohin ◽  
R. V. Meshcheryakov

Purpose of research. The purpose of this study is to assess the possibility of applying the methodology for centralized management of systems and information risks using the example of informatization of public departments of Republic of Tyva in order to optimize the cost of purchasing technical, software and hardware-software means of protecting information, as well as the payroll of maintenance technical personnel.Methods. One of the main research methods is the creation of an experimental model of the mechanism of a single information and computing network, combining various government departments located within the same administrative building, which allows working simultaneously with distributed or centralized applications, databases and other services, as well as centralized information risk management security. The next research method is the analysis and study of the principle of operation of information resources, information systems, databases, and the increase in the number of domain users if they are combined into a single data transfer network. The interaction and effectiveness of personnel, a specialized unit based on one government agency, ensuring the regular functioning of the network and the necessary level of information security for all government departments.Results. As a result, an economic effect is achieved by eliminating the acquisition of duplicate software and hardware information protection, increasing the efficiency of using unified information services, and creating a centralized structural unit that uses risk management tools and makes information security management decisions based on the principles of system analysis , structuring method and expert survey methods. The results of the study have been used in solving problems of improving the information security management system of the authorities of Republic of Tyva.Conclusion. We have developed the original information technology architecture of the information security management system and centralized use of information technologies for the government of Republic of Tyva. The distinctive features of the structure of software tools for the centralized approach are the multi-agent implementation of the control elements of the decision support system and the integration of various types of security management models into a single complex. 


2014 ◽  
Vol 644-650 ◽  
pp. 3212-3215
Author(s):  
Shuang Liu

Digital library is a development direction of library, which has attracted the attention of the countries around the world widely. Digital library is an important part of informationization in university. As an information system, digital library is the backbone of the digital library information resources; the safety of library digital information resources is the key to the normal operation and development of digital library, which is also the guarantee for library to service. How to guarantee the security of information resources and the information system in open network environment has been considered by many people in the industry, the digital library information security has become one of core issues in digital library construction and development.


10.12737/6581 ◽  
2014 ◽  
Vol 2 (12) ◽  
pp. 0-0
Author(s):  
Зульфия Байниязова ◽  
Zulfiya Bayniyazova

The article investigates the issue of consolidation of an individual legal status in the Russian legal system. The author claims that at the present moment an individual legal status is not represented as a consolidated institution of the legal system, and the situation does not meet the needs of the legal life of the Russian society. In this connection the author suggests that a notion of “consolidated individual legal status” should be singled out in the legal science. The characteristics of consolidated individual legal status have been singled out and analyzed in the article. The author also looks into significance of consolidation of individual rights and liabilities. The author emphasizes that the value of the consolidated condition of individual rights and liabilities determines significance of the issue of consolidation of an individual legal status. The author pays close attention to the legal policy; the author claims that legal policy alongside with the legal system must be a phenomenon that fully guarantees legal self-realization of an individual, an opportunity to exercise their rights and freedoms. The author stresses the necessity of an individual legal status as a consolidated legal phenomenon, which is one of the priorities of the Russian legal system.


2013 ◽  
Vol 107 (3) ◽  
pp. 576-579 ◽  
Author(s):  
Mahmoud Hmoud

Daniel Bethlehem’s note on self-defense principles is intended to stimulate debate on one of the most contentious issues facing the international community today, namely, the legal response to imminent or actual terrorist attacks by nonstate actors. The note contains a set of principles that are sensitive to the practical realities of the circumstances that it addresses. But it is also intended to take up a legal policy matter—to create or amend principles of international law related to the use of armed force in dealing with threats from nonstate actors. To create or amend these principles, there must be clear evidence and sufficient state practice, or at least opinio juris, pointing toward the change of existing rules or the creation of new rules to “fill the gap.” The whole balance in international law among the various rights, obligations, and interests of international actors will be compromised if the notion of self-defense is to be expanded beyond its legitimate limitations. As illustrated below by some basic examples drawn from the existing law of self-defense, there is sufficient flexibility in the current legal order to allow for the lawful exercise of self-defense in response to most situations of armed terrorist attacks.


2021 ◽  
Vol 9 (01) ◽  
pp. 1177-1182
Author(s):  
Nargiza Noufarbekovna Dusmukhamedova ◽  

The article centers on the health of children at a time when the process of globalization is in full swing investigation of the international and national lawful system for the legal protection of information security, which is detrimental to ethical and spiritual development, regulation of relations in the field of protection of children from data destructive to their health, sorts of information products prohibited for distribution among children, the examination of the forms of improving the legislation of the CIS countries in the field of protection of children from data harmful to their health is covered.


Author(s):  
Borys Leonov ◽  
Valerii Serohin

The article is devoted to the analysis of the problems of legal and expert support of law enforcement activities in the field of cybercrime counteraction. The article deals with the issues of criminal and legal protection of information security in the context of the implementation of inter-national treaties into the field of national legislation. The authors both analyzed legislation in the field of cybersecurity provision; the modern doctrine devoted to its interpretation and made some suggestions for its improvement. Key words: cybersecurity, cybercrime, computer crime, harmful software, special software for secretly obtaining information.


2021 ◽  
Vol 9 (4) ◽  
pp. 21-25
Author(s):  
Anna Garashko

The article contains a study of the prospects of using block chain technologies in the system of state and legal policy. The entire document flow implemented within the framework of public administration related to the identification of identity transactions, payments and identification of subjects of legal relations, cadastre management, as well as law-making, law-making and law-protecting practices in general are able to qualitatively improve their level, become more effective and improved with the use of the latest achievements in the system of information security – block chain technologies.


Sign in / Sign up

Export Citation Format

Share Document