دور ممارسة العاملين في حقل المعلومات لأخلاقيات المهنة في تعزيز أمن المعلومات بوزارة الداخلية والأمن الوطني - الشق المدني بغزة (The Role of Practicing Profession Ethics by Workers in The Field of Information in Enhancing The Information Security in The Ministry of Interior and National Security – Civil Department in Gaza Strip)

2020 ◽  
Author(s):  
Nabil Alloh ◽  
Ashraf Mushtaha
2021 ◽  
Vol 1 (2) ◽  
pp. 80-95
Author(s):  
N. P. Gribin

The article reveals the content of the destructive influence of Western countries on the communication regimes and information space of the friendly Central Asian states, which poses a threat to their national security and contradicts the national interests of the Russian Federation. The importance of joint efforts with the states of the Central Asian region, including those in the format of the SCO and CSTO regional organizations, to ensure information security and a positive impact on the communication regimes of this region is noted. Attention is drawn to the role of national mass media in the arsenal of tools for influencing the minds and psychology of the population of Central Asian countries and in this regard gives a description of Western information structures that exercise such influence, the mechanisms of their functioning and the way to neutralize their activities. The dynamism of the matter under study and its subjection to changes in the balance of power in the international arena are noted. The role of the state in ensuring information security and protecting citizens from distorted information and communication influence is analyzed separately. The paper suggests considerations regarding the organization of a systematic counteraction to the destructive actions of individual states in the information field of countries in Central Asia, in particular, it suggests the need to create a comprehensive system, together with the Russian Federation, to block and neutralize malicious information and propaganda materials, and also a proposal regarding the creation of a global communication order based on the formation of an international legal framework for rational civilized regulation of country communication regimes at the global and regional levels.


Author(s):  
Oleksandr Malashko ◽  
◽  
Serhii Yesimov ◽  

The article examines trends in the development of legal regulation of information security in Ukraine in the context of the implementation of the Association Agreement between Ukraine and the European Union. The current information legislation and regulations on information security are analyzed. The tendencies in the legal regulation of information security that took place at the initial stage of the formation of information legislation are revealed. Based on the factors that took place before the adoption of the Doctrine of information security of Ukraine, the laws of Ukraine “On the basic principles of ensuring the cybersecurity of Ukraine”, “On the national security of Ukraine”, in the context of the current legislation, based on the methodology of legal forecasting, it is concluded that in the future the development of normative legal information security will be developed on the basis of by-laws, mainly at the departmental level.


Author(s):  
Clement Guitton

Attribution — tracing those responsible for a cyber attack — is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attribution as a problem forces us to consider it either as solved or unsolved. Yet attribution is far more nuanced, and is best approached as a process in constant flux, driven by judicial and political pressures. In the criminal context, courts must assess the guilt of criminals, mainly based on technical evidence. In the national security context, decision-makers must analyze unreliable and mainly non-technical information in order to identify an enemy of the state. Attribution in both contexts is political: in criminal cases, laws reflect society’s prevailing norms and powers; in national security cases, attribution reflects a state’s will to maintain, increase or assert its power. However, both processes differ on many levels. The constraints, which reflect common aspects of many other political issues, constitute the structure of the book: the need for judgment calls, the role of private companies, the standards of evidence, the role of time, and the plausible deniability of attacks.


Author(s):  
James E. Baker

This article discusses covert action within the context of the U.S. law. The first section describes the main elements of the U.S. legal regime, including the definition of covert action and the “traditional activity” exceptions, the elements of a covert action finding, and the thresholds and requirements for congressional notification. The second section describes some of the significant limitations on the conduct of covert action. The third section discusses the nature of executive branch legal practice in this area of the law. And the last section draws conclusions about the role of national security law within the context of covert action.


Sign in / Sign up

Export Citation Format

Share Document