The State of Information Security Law: A Focus on the Key Legal Trends

Author(s):  
Thomas J. Smedinghoff
Author(s):  
Sergey Valerevich Belov ◽  
Irina Mikhalovna Kosmacheva ◽  
Irina Vyacheslavovna Sibikina

To solve the problem of information security management the method was proposed that allows determining the degree of importance of confidential documents of the organization. The urgency of the proposed algorithm was substantiated taking into account the requirements of the legislation of the Russian Federation in the sphere of information security. The stages prior to the formation of the list of confidential documents of the organization were described. A review of the main documents of the legal and regulatory framework was carried out including documents relating to the state regulation of relations in the sphere of information security. The classes of protected information for the accessing categories were considered. The criteria changes of the value of information in the process of time were represented. The algorithm of formation of the list of confidential documents of the organization based on the properties of information was offered. The algorithm is based on an expert method of pair comparison of alternatives. The result of the use of this method is a number of confidential documents, ranked in descending order of importance. For each document the weighting factor of importance can be calculated. The verification stage of the degree of expert consistency was included in the methodology to eliminate the use of erroneous expert data. The application of the methodology is illustrated by a calculated example.


2020 ◽  
Vol 15 (16) ◽  
pp. 128-132
Author(s):  
V. V. Shapovalov ◽  
◽  
A. A. Gudzenko ◽  
V. A. Shapovalova ◽  
V. V. Shapovalov ◽  
...  

Introduction. Modern turbulent state of society actualizes need for scientifically based methods and technological solutions to improve the information security system not only for the state, but also for society and the person in particular. Objective. To highlight the significant factors of information security of social development and to study the role of public admini-stration in the context of the actualization of information threats and risks. Study results. The article considers the essence of state management approaches to information security based on interpretation in terms of risk management. Information security is presented as a dynamic system that needs balance. Balance can be disturbed by external and internal factors. The 8 most significant factors that need to be taken into account to develop effective models of public administration in the field of information security are identified. 4 paradigms of information security management (systemic, synergetic, phenomenological and cognitive) which can be involved are considered. However, they are not universal and separate in any particular case, that is they are systemic in nature, and security management should be based on their integrated application depending on the situation and the specifics of the management process. Based on the analysis of the classical model of maintaining the state balance of a dynamic system, it is concluded that it can be used to ensure information security. A model is proposed to explain the reasons for the imbalance of the dynamic system of information security under the action of factors of influence and the risks that accompany them, and to determine the measures of public administration to ensure it. Conclusion. The model is proposed to explain the reasons for the imbalance of the dynamic system of information security under the action of factors of influence and the risks that accompany them, and to determine the measures of public administration to ensure it. Key words: Information security; Information security factors; Society; Public administration; Information security model.


2020 ◽  
Vol 15 (16) ◽  
pp. 121-128
Author(s):  
O. A. Panchenko ◽  

Introduction. Modern turbulent state of society actualizes need for scientifically based methods and technological solutions to improve the information security system not only for the state, but also for society and the person in particular. Objective. To highlight the significant factors of information security of social development and to study the role of public admini-stration in the context of the actualization of information threats and risks. Study results. The article considers the essence of state management approaches to information security based on interpretation in terms of risk management. Information security is presented as a dynamic system that needs balance. Balance can be disturbed by external and internal factors. The 8 most significant factors that need to be taken into account to develop effective models of public administration in the field of information security are identified. 4 paradigms of information security management (systemic, synergetic, phenomenological and cognitive) which can be involved are considered. However, they are not universal and separate in any particular case, that is they are systemic in nature, and security management should be based on their integrated application depending on the situation and the specifics of the management process. Based on the analysis of the classical model of maintaining the state balance of a dynamic system, it is concluded that it can be used to ensure information security. A model is proposed to explain the reasons for the imbalance of the dynamic system of information security under the action of factors of influence and the risks that accompany them, and to determine the measures of public administration to ensure it. Conclusion. The model is proposed to explain the reasons for the imbalance of the dynamic system of information security under the action of factors of influence and the risks that accompany them, and to determine the measures of public administration to ensure it. Key words: Information security; Information security factors; Society; Public administration; Information security model.


2006 ◽  
Vol 36 (1) ◽  
pp. 73
Author(s):  
Freddy Harris ◽  
Bono Budi Priambodo

The authors here explain regarding the role of regulation to anticipating information security By sociological approaches it has reflected on the Indonesian conditions which had not adequate organized. Existing arranged is limited on certain sectors. social group. and corporations group either domestic and multinational levels. Most efforts to reach to better level have been initiated by many parties such as public sector. education. information technology industrial. professional community and civil. Here also recommended needs for clear policy and the whole implementation which be coordinated integrally under government chief's. Government leads under the authority to accomplishing the state under effective law and regulations


Author(s):  
Dmitry Dvoretsky ◽  
Natalia Kolesnikova ◽  
Oksana Makarkina ◽  
Kira Lagvilava

The mass introduction of information technologies in the activities of state structures has made it possible to transfer the efficiency of their functioning to a qualitatively new level. Unfortunately, as a means of action, they have characteristic vulnerabilities and can be used not only for good, but also for harm. For the state, as a guarantor of the stability of a civilized society, the issue of ensuring the security of information processing is particularly important. Despite the automation of many information processes, the most vulnerable link in the work of information systems remains a person. A person acts as an operator of information systems and a consumer of information. The entire service process depends on the competence of the operator and the quality of his perception. There are areas of government activity where the cost of error is particularly high. These include ensuring the life and health of citizens, protecting public order and the state system, and ensuring territorial integrity. The specifics of the spheres must be taken into account when ensuring the security of information. This study concerns official activities that are provided by paramilitary groups. Currently, there is a discrepancy in the level of competence of new personnel in the first months of service. The author traces the shortcomings of general and special professional qualities in the field of information security. The purpose of the study is to substantiate certain pedagogical means of forming cadets ' readiness to ensure information security. As forms of theoretical knowledge, we will use the traditional hypothesis and model, as well as functionally distinguishable judgments – problem, assumption, idea and principle. Empirical forms of knowledge will be observation (experimental method) and fixation of facts. To evaluate the effectiveness of the developed pedagogical tools, we use statistical methods: observation (documented and interrogated) and calculation of generalizing indicators. To formulate conclusions, we will use logical methods: building conclusions and argumentation. The approbation of certain pedagogical tools described in this article showed a significant positive trend in terms of competence in information security issues.


Author(s):  
Tamar Makasarashvili ◽  
Tea Khorguashvili ◽  
Giuli Giguashvili ◽  
Aleksandre Sadagashvili

With the development of Internet technologies, cybercrime has also evolved and diversified. Much of the world's economic and business information comes from electronic information, and the need for remote work caused by the coronavirus (COVID-19) pandemic has further increased demand for e-services, which in turn has contributed to increased technology risks, threats, and incidents. The main task of the states is to actively fight against the negative socio-economic, financial, and political consequences caused by the growth of cybercrime. The main purpose of the study is to assess the negative consequences of cybercrime in Georgia, the main threats to information security, to develop recommendations for the prevention of cybercrime, to improve its legal regulation mechanisms. The fight against cybercrime in Georgia is carried out using criminal norms. The law "On Information Security" is in force in the country, Georgia's cyber security strategy has been developed, but this process needs constant development. The main task of the state is to gradually improve the legislation and bring it in line with modern technologies, to ensure close cooperation between the state and society, to raise the awareness of civil society. It is essential to constantly inform the public and companies about cyber threats, as effective prevention is the best form of crime prevention policy.


2021 ◽  
Vol 2032 (1) ◽  
pp. 012051
Author(s):  
M E Sukhoparov ◽  
I A Sikarev ◽  
T M Tatarnikova ◽  
I S Lebedev ◽  
A A Butsanets

Author(s):  
К. В. К. В. Захаренко

In our state there are a number of complex problems in the field of information security that require urgent and radical solution. That’s why theoretical, methodological and political research of the problem of information security in Ukraine, which is experiencing a crisis phase of its development, is becoming especially relevant today. In order to develop an effective system of national information security, a detailed study of the experience of the leading countries of the world, which carry out effective information protection of their states and citizens, is necessary. Today there are national information security systems that have really proven their effectiveness and structural and functional perfection. Indeed, the successful development of a democratic state and civil society is possible only if the information resources are properly used and the state policy is implemented, which would ensure a high level of national information security. In the modern world, the basic principles and tools for the formation of effective information protection of the national security space have been developed already. At the same time, Ukraine needs to apply adequately the foreign experience of the most successful countries in this regard, correctly transforming it taking into account national specificity and the unique role of Ukraine in modern geopolitics. As an important indicator of the protection of citizens, society and state, information security is an integral part of national security. Therefore, its determination mainly focuses on preventing harmful effects that may result in various information threats, as well as eliminating and overcoming those effects with the least possible harm to society and humans. In this aspect, the study of not only the philosophical and phenomenological and socio-psychological determinants of information security of citizens, but also political and legal resources and mechanisms of protection of the information space of the state in the conditions of the functioning of the global information society acquires a special significance. А content analysis of the notion «information security» as a form of national security aimed at ensuring human rights and freedoms in relation to free information access, creation and implementation of secure information technologies and protection of the property rights of all participants of information activities, includes consideration of possible diversions in this area, especially at the international level. Today there is a situation of incompleteness of formation and fragmentary filling of the information space content of the country and the legislative base in our society. The efficiency of the information weapon itself has increased too quickly due to the rapid information circulation and the spread of information networks. As a result, mass media forms the «mass» person of our time, in turn this fact displaces traditional direct contacts, by dissociating people and replacing them by computers and television. At the same time it gives rise to apathy, uncritical attitude and indifference, it complicates the adequate orientation, causing the social disorientation. Informative safety has the human measuring. Therefore an important role in opposition to destructive external and internal informative influences is played by education of citizens. Her proper level called to provide the state and civil society. An in fact uneducated population easily is under destructive influence of informative threats of the modern global world. Unfortunately, Ukraine, does not have sufficient resources and technologies for adequate opposition to the external threats. Taking into account it strategy of forming of the national system of informative safety of our state can be only the maximal leveling of destructive influences from the side of external informative threats. To the end it is necessary to carry out democratic reforms Ukraine, generate civil society, to provide functioning of the legal state and increase of political and civil culture of population. At the same time it is necessary to bear reformers in a mind, that global nature of informative society predetermines rapid transformation of external threats in internal, converting them into permanent calls which are opened out within the limits of national in a civilized manner-informative and socio-political space. Besides modern global informative systems, mass medias, network facilities do a limit between external and internal threats almost unnoticeable.


2020 ◽  
Vol 1 (2) ◽  
pp. 1-9
Author(s):  
Jabbor Mukhammadiev

In the international media space the issues of ensuring information security of the state is inseparably interrelated with the political, economic and legal guarantees for exercising freedom of speech and expression. The problem of ensuring the information security of any state is one of the most important aspects of its foreign policy, since it is the information sphere that is today considered to be the most important object of application of the activities of various participants in international relations. In connection with the rapid development of information technologies, threats of a new type are emerging - threats to information security on a national scale, respectively, the state must respond quickly to a changing situation and take decisive steps to organize a coherent complex information security system. The article analyzes the main approaches to providing information security of the country, formulated the goal, tasks, functions, principles of ensuring information security of the country


Sign in / Sign up

Export Citation Format

Share Document