scholarly journals FEATURES OF INTELLIGENT INFORMATION SECURITY MANAGEMENT SYSTEMS FOR CRITICAL INFORMATION INFRASTRUCTURE OBJECTS

2020 ◽  
Vol 6 (2) ◽  
pp. 99-104
Author(s):  
Valeria A. Tabakaeva ◽  
Igor N. Karmanov ◽  
Vladimir R. An

The article discusses the problem of using intelligent systems in managing information security of critical information infrastructure objects. Currently, the development of information technologies reached the point of transition to widespread use of various intelligent systems. At the same time, their application is also noted in the sphere of ensuring the security of significant objects of critical information infrastructure of the Russian Federation. Cybersecurity parameter management systems have a special place as fundamental elements for ensuring security during operation, as well as responding to external and internal incidents with the required efficiency and speed. In the course of the research, we select ways to solve such problems as choosing a threat model and protection system architecture for an object of critical information infrastructure of the Russian Federation.

Author(s):  
Ilia Pavlovich Mikhnev ◽  
Svetlana Vladimirovna Mikhneva

The article discusses the competences and powers of the state authorities of the Russian Federation within their legal status in the field of ensuring the security of critical information infrastructure. Some functions and authorities in the field of information security have changed in a number of federal executive bodies. In particular, the Federal Security Service, on the basis of a presidential decree, is authorized to create a state system for detecting, preventing and eliminating the consequences of computer attacks on information resources of the Russian Federation. However, not all rights and obligations are enshrined; a number of powers cause the duality of the legal status of certain federal bodies of state power. The clarity and unambiguity of securing the rights and obligations of state bodies authorized in the field of information security are guarantees for effectively ensuring the security of important information infrastructure facilities.


Author(s):  
N.M. Kurbatov

The concept of critical information infrastructure is analyzed. The history of its formation and consolidation in the legal space of Russian legislation is considered. The article studies the experience of foreign countries in the field of ensuring information security in general and protecting critical infrastructure in particular. The relevance of the chosen topic is due to the course taken by the Russian Federation for the development of the information society in the country, as well as the need to protect significant information systems and resources of state authorities. The author of the article reveals the terms included in the definition of critical information infrastructure, enshrined in the legislation of the Russian Federation. In conclusion, the main problems of the considered regulatory legal acts are highlighted, recommendations are given on the further development of the information security system of critical infrastructure.


2021 ◽  
Vol 54 (2) ◽  
pp. 71-80
Author(s):  
MAKSIMOVA ELENA A. ◽  
◽  
SADOVNIKOVA NATALYA P. ◽  

With the introduction of No. 187-FL in 2017, new priorities have been identified in the Russian Federation at the level of ensuring the stability and information security of society and the state as a whole. The issues of the security of the functioning of the subjects of the critical information infrastructure (CII) are identified as priorities. However, regulatory legal acts introduced on this issue are considered without a methodological assessment of intersubjective interaction at the level of the CII. At the same time, not taking this factor into account when building a security system at CII facilities reduces its effectiveness, brings a destructive effect to the system and can be considered as a vulnerability at the infrastructure level. In this article, the elements of the methodological basis for considering intersubjective interaction as a source of destructive influence on the subject of critical information infrastructure are proposed. The result of the analysis of the types of intersubjective relationships within the areas of functioning of the CII.


Author(s):  
Alexander Dubrovskiy ◽  
Nikolay Ruzaev

В современной международной обстановке Российская Федерация встречается все с большим количеством вызовов в области информационной безопасности, а именно: ряд зарубежных государств наращивает возможности в области информационного воздействия на информационную инфраструктуру в военных целях; специальные службы отдельных государств увеличивают масштабы использования информационных технологий в военно-политических целях. Увеличивается рост компьютерных атак на объекты информационной инфраструктуры, усиливается разведывательная деятельность иностранных государств в отношении Российской Федерации. В соответствии с Доктриной информационной безопасности Российской Федерации развитие кадрового потенциала является одним из направлений обеспечения информационной безопасности. Все это актуализирует задачи по подготовке специалистов в области защиты государственной тайны на базе военных образовательных учреждений высшего профессионального образования. В статье рассматриваются актуальные проблемы формирования у будущих офицеров подразделений связи компетенций в области защиты государственной тайны. Проводится анализ требований федеральных государственных образовательных стандартов к компетенциям в области защиты государственной тайны. Определяются научные подходы к формированию компетенций специалистов связи в области защиты государственной тайны.In the present international situation the Russian Federation can be found with a lot of challenges in the field of information security, namely: the number of foreign countries increases opportunities for the information technology impact on information infrastructure for military purposes; special services individual states increase the use of information technologies for military-political purposes. The growth of computer attacks on the objects of information infrastructure is increasing, the intelligence activities of foreign states against the Russian Federation are increasing. In accordance with the Doctrine of information security of the Russian Federation, one of the directions of information security in the field of science, technology and education is the development of human resources in the field of information security and the use of information technologies. All this actualizes the task of training specialists in the field of protection of state secrets on the basis of military educational institutions of higher professional education. The article deals with the actual problems of the formation of future officers of communication units competencies in the field of protection of state secrets. The analysis of requirements of Federal state educational standards to competences in the field of protection of the state secret is carried out. Scientific approaches to the formation of competences of communication specialists in the field of protection of state secrets are determined.


Author(s):  
Sergey Valerevich Belov ◽  
Irina Mikhalovna Kosmacheva ◽  
Irina Vyacheslavovna Sibikina

To solve the problem of information security management the method was proposed that allows determining the degree of importance of confidential documents of the organization. The urgency of the proposed algorithm was substantiated taking into account the requirements of the legislation of the Russian Federation in the sphere of information security. The stages prior to the formation of the list of confidential documents of the organization were described. A review of the main documents of the legal and regulatory framework was carried out including documents relating to the state regulation of relations in the sphere of information security. The classes of protected information for the accessing categories were considered. The criteria changes of the value of information in the process of time were represented. The algorithm of formation of the list of confidential documents of the organization based on the properties of information was offered. The algorithm is based on an expert method of pair comparison of alternatives. The result of the use of this method is a number of confidential documents, ranked in descending order of importance. For each document the weighting factor of importance can be calculated. The verification stage of the degree of expert consistency was included in the methodology to eliminate the use of erroneous expert data. The application of the methodology is illustrated by a calculated example.


2020 ◽  
Vol 6 (1) ◽  
pp. 155-160
Author(s):  
Julia A. Isaeva ◽  
Anastasiya S. Goldobina ◽  
Dmitry M. Nikulin

The need to assess the compliance of information security means depends on the importance of the information, processed at the enterprise. The lack of specific requirements and criteria for conducting an assessment will cause the protection tools to function incorrectly this, in turn, will lead to unpredictable consequences, as well as to the disruption of the functioning of significant objects. Even with the changes made to the legislation of the Russian Federation, there is no specific algorithm for assessment the compliance of certain classes of security tools, such as DLP systems. This article describes the changes made to the legislation and how they will affect the compliance assessment process. The selected security profile, along with GOST 15408-2012, reveals such concepts as functional requirements of trust and security functions. Taking these regulations into account, it is possible to develop a method for conducting compliance assessment for DLP systems, which are an extremely important means of protecting against leaks of confidential information on significant objects of critical information infrastructures.


2020 ◽  
Vol 16 (4-1) ◽  
pp. 54-63
Author(s):  
Татьяна Полякова

The article is devoted to the analysis of amendments to the Constitution of the Russian Federation relating to the protection of national security, including in the field of information. Purpose: to analyze the role and impact of the amendments to the Constitution of the Russian Federation in 2020. These amendments are related to the State regulation at the federal level of information security and the tasks of ensuring the support and preservation of scientific and technological potential and the development of Russia. Methods: the work is based on the methods of dialectics and system analysis of the information and legal sphere, which allow to comprehensively, logically and consistently study the processes of implementation of constitutional and legal norms and the prospects for their development in the legal regulation of information security in order to identify existing patterns and development trends, as well as priority tasks. Results: the study leads to the well-founded conclusion that referring in the Basic Law to the federal authorities the security of the person, society and the State in the use of information technologies and digital data circulation is a constitutional and legal innovation that is fundamental to the development of legal and scientific research in the field of information security as an important component of the national security of the State, as well as for the development of the system of legal regulation in this areas in information law.


Author(s):  
Artem Nikolaevich Gulemin

The object of this research is the public relations with regards to processing of information in the Unified Federal Information Register Containing Data on the Population of the Russian Federation n. Besides the Federal Law “On the Unified Federal Information Register Containing Data on the Population of the Russian Federation”, the subject of this research is legislation in the area of personal data and legislation on the critical information infrastructure. Based on the main formal and substantive aspects, the author defines the indicated register as a variety of register-based information; substantiates the relevance of application of the principles of framework regulation of information law in the context of creating the register; raises the question on the need to recognize the information system that processes data contained in the register as a valuable object of critical information infrastructure. The novelty of this research consists in the fact that this article is one of the first works dedicated to provision of legal security of the Unified Federal Information Register Containing Data on the Population of the Russian Federation. The following conclusions and proposals on improvement of legislation are formulated: 1) The principles of legal regulation established by legislation with regards to information as the object of legal regulation should be applied to the created register; any unauthorized actions with a separate register entry should be viewed as violation of integrity of the entire object. 2) Due to critical importance of the data contained in the register, it is essential to set confidentiality restrictions, and recognize the federal nformation system that processes data contained in the register as a valuable object of critical information infrastructure. 3) In the text of the Law “On the Unified Federal Information Register Containing Data on the Population of the Russian Federation”, it is necessary to specify the responsibilities of operator of the federal information system who maintains the federal register and compliance with the requirements of legislation on the security of critical information infrastructure. It is also necessary to clarify the provisions of the Decree of the Government of the Russian Federation that establishes a list of criteria of importance of the objects of critical information infrastructure of the Russian Federation and their value.


Author(s):  
Sergey A. Korchagin ◽  

The article discusses the main trends in the field of artificial intelligence in relation to the educational sphere. The analysis of the use of artificial intelligence technologies and their impact on the higher education system was carried out. The attitude of the citizens of the Russian Federation to artificial intelligence in education was investigated. The main reasons for the fears of the respondents about the use of intelligent information systems in the educational sphere were identified. The proposals for the implementation of the models and methods of artificial intelligence in the higher education system of the Russian Federation were developed. The potential of the possibilities of the influence of new information technologies on the modern society was indicated.


Sign in / Sign up

Export Citation Format

Share Document