INTERSUBJECTIVE INTERACTION AS A SOURCE OF DESTRUCTIVE INFLUENCES ON THE SUBJECT OF CRITICAL INFORMATION INFRASTRUCTURE

2021 ◽  
Vol 54 (2) ◽  
pp. 71-80
Author(s):  
MAKSIMOVA ELENA A. ◽  
◽  
SADOVNIKOVA NATALYA P. ◽  

With the introduction of No. 187-FL in 2017, new priorities have been identified in the Russian Federation at the level of ensuring the stability and information security of society and the state as a whole. The issues of the security of the functioning of the subjects of the critical information infrastructure (CII) are identified as priorities. However, regulatory legal acts introduced on this issue are considered without a methodological assessment of intersubjective interaction at the level of the CII. At the same time, not taking this factor into account when building a security system at CII facilities reduces its effectiveness, brings a destructive effect to the system and can be considered as a vulnerability at the infrastructure level. In this article, the elements of the methodological basis for considering intersubjective interaction as a source of destructive influence on the subject of critical information infrastructure are proposed. The result of the analysis of the types of intersubjective relationships within the areas of functioning of the CII.

Author(s):  
Ilia Pavlovich Mikhnev ◽  
Svetlana Vladimirovna Mikhneva

The article discusses the competences and powers of the state authorities of the Russian Federation within their legal status in the field of ensuring the security of critical information infrastructure. Some functions and authorities in the field of information security have changed in a number of federal executive bodies. In particular, the Federal Security Service, on the basis of a presidential decree, is authorized to create a state system for detecting, preventing and eliminating the consequences of computer attacks on information resources of the Russian Federation. However, not all rights and obligations are enshrined; a number of powers cause the duality of the legal status of certain federal bodies of state power. The clarity and unambiguity of securing the rights and obligations of state bodies authorized in the field of information security are guarantees for effectively ensuring the security of important information infrastructure facilities.


Author(s):  
N.M. Kurbatov

The concept of critical information infrastructure is analyzed. The history of its formation and consolidation in the legal space of Russian legislation is considered. The article studies the experience of foreign countries in the field of ensuring information security in general and protecting critical infrastructure in particular. The relevance of the chosen topic is due to the course taken by the Russian Federation for the development of the information society in the country, as well as the need to protect significant information systems and resources of state authorities. The author of the article reveals the terms included in the definition of critical information infrastructure, enshrined in the legislation of the Russian Federation. In conclusion, the main problems of the considered regulatory legal acts are highlighted, recommendations are given on the further development of the information security system of critical infrastructure.


2020 ◽  
Vol 6 (2) ◽  
pp. 99-104
Author(s):  
Valeria A. Tabakaeva ◽  
Igor N. Karmanov ◽  
Vladimir R. An

The article discusses the problem of using intelligent systems in managing information security of critical information infrastructure objects. Currently, the development of information technologies reached the point of transition to widespread use of various intelligent systems. At the same time, their application is also noted in the sphere of ensuring the security of significant objects of critical information infrastructure of the Russian Federation. Cybersecurity parameter management systems have a special place as fundamental elements for ensuring security during operation, as well as responding to external and internal incidents with the required efficiency and speed. In the course of the research, we select ways to solve such problems as choosing a threat model and protection system architecture for an object of critical information infrastructure of the Russian Federation.


2020 ◽  
Vol 6 (1) ◽  
pp. 155-160
Author(s):  
Julia A. Isaeva ◽  
Anastasiya S. Goldobina ◽  
Dmitry M. Nikulin

The need to assess the compliance of information security means depends on the importance of the information, processed at the enterprise. The lack of specific requirements and criteria for conducting an assessment will cause the protection tools to function incorrectly this, in turn, will lead to unpredictable consequences, as well as to the disruption of the functioning of significant objects. Even with the changes made to the legislation of the Russian Federation, there is no specific algorithm for assessment the compliance of certain classes of security tools, such as DLP systems. This article describes the changes made to the legislation and how they will affect the compliance assessment process. The selected security profile, along with GOST 15408-2012, reveals such concepts as functional requirements of trust and security functions. Taking these regulations into account, it is possible to develop a method for conducting compliance assessment for DLP systems, which are an extremely important means of protecting against leaks of confidential information on significant objects of critical information infrastructures.


Author(s):  
Artem Nikolaevich Gulemin

The object of this research is the public relations with regards to processing of information in the Unified Federal Information Register Containing Data on the Population of the Russian Federation n. Besides the Federal Law “On the Unified Federal Information Register Containing Data on the Population of the Russian Federation”, the subject of this research is legislation in the area of personal data and legislation on the critical information infrastructure. Based on the main formal and substantive aspects, the author defines the indicated register as a variety of register-based information; substantiates the relevance of application of the principles of framework regulation of information law in the context of creating the register; raises the question on the need to recognize the information system that processes data contained in the register as a valuable object of critical information infrastructure. The novelty of this research consists in the fact that this article is one of the first works dedicated to provision of legal security of the Unified Federal Information Register Containing Data on the Population of the Russian Federation. The following conclusions and proposals on improvement of legislation are formulated: 1) The principles of legal regulation established by legislation with regards to information as the object of legal regulation should be applied to the created register; any unauthorized actions with a separate register entry should be viewed as violation of integrity of the entire object. 2) Due to critical importance of the data contained in the register, it is essential to set confidentiality restrictions, and recognize the federal nformation system that processes data contained in the register as a valuable object of critical information infrastructure. 3) In the text of the Law “On the Unified Federal Information Register Containing Data on the Population of the Russian Federation”, it is necessary to specify the responsibilities of operator of the federal information system who maintains the federal register and compliance with the requirements of legislation on the security of critical information infrastructure. It is also necessary to clarify the provisions of the Decree of the Government of the Russian Federation that establishes a list of criteria of importance of the objects of critical information infrastructure of the Russian Federation and their value.


2019 ◽  
Vol 6 (1) ◽  
pp. 203-208
Author(s):  
Julia Isaeva ◽  
Valentin Selifanov

The need for conformity assessment of information security tools at significant objects of critical information infrastructures is demonstrated. In the absence of necessary criteria description for information systems, a possibility of threats implementation appears, which will lead to disruption of functioning of significant objects.


2021 ◽  
Vol 2 ◽  
pp. 97-107
Author(s):  
Ya. О. Kuchina ◽  

A new article was introduced into the Criminal Code of the Russian Federation in 2017, which establishes criminal liability for unlawful impact on the critical information infrastructure of the Russian Federation. However, there is still no developed legal practice of applying this article, despite repeated statements of experts about the significant prevalence of crimes that encroach on the security of critical information infrastructure. The author of the article discovered one criminal case instituted on the grounds of a crime prohibited by Art. 2741 of the Criminal Code. The proposed article contains an analysis of the legal issues of this article, including the consideration of the specifics of qualification under Part 1, Part 2, and Part 3 of Art. 2741 of the Criminal Code. The concept of critical information infrastructure as an object of crime is considered, suggestions are made about the features of qualification of acts that will minimize law enforcement errors.


Author(s):  
Filipp Alekseevich Golubev

This article provides comprehensive description of the crime established by the Article 274.1 of the Criminal Code of the Russian Federation. The subject of this research is the crimes in the area of information technologies and their circumstances set by the Article 274.1 of the Criminal Code of the Russian Federation, as well as comprehensive characteristic of criminal impact upon the critical information infrastructure of the Russian Federation. The subject of research also includes the concept of the object of infringement – the critical information structure of the Russian Federation, isolated circumstances of the instance of crime that determine the nature and dynamics of criminal activity thereof, classification and criminalistic characteristic of the objects of crime, essential evidence of unfavorable consequences of undue influence upon critical information structure of the Russian Federation. Definition is given to the concept of the object of infringement – the critical information structure of the Russian Federation. The author examines isolated circumstances the instance of crime that determine the nature and dynamics of criminal activity thereof. Classification and criminalistic characteristic are given to the objects of crime; essential evidence of unfavorable consequences of undue influence upon the critical information structure of the Russian Federation is identified and analyzed. The author concludes that taking into consideration the fact that currently there is no practice, guidelines, recommendations on investigation and detection of crimes established by the Article 274.1 of the Criminal Code of the Russian Federation, the crimes that fall under the indicated category have even grater latency compared to other crimes of the Chapter 28 of the Criminal Code of the Russian Federation, which necessitates the development of guidelines, recommendations, normative legal and local acts on detection, investigation and prevention of crimes in the area of computer technologies.


Sign in / Sign up

Export Citation Format

Share Document