Menu English Ukrainian russian Home

Free technical library for hobbyists and professionals Free technical library


Threats to information security of Russia. Basics of safe life

Fundamentals of Safe Life Activities (OBZhD)

Directory / Basics of safe life

Comments on the article Comments on the article

It should be noted that, although the problems of information security generated by informatization are global, for Russia they acquire special significance due to its geopolitical and economic position.

In the Information Security Doctrine of the Russian Federation, approved by the President of the Russian Federation on September 9, 2000, information security threatscountries according to their general focus are divided into threats:

  • constitutional rights and freedoms of man and citizen in the field of information activities;
  • spiritual life of society;
  • information infrastructure;
  • information resources.

Threats to constitutional rights and freedoms of man and citizen in the field of information security can be:

  • adoption by public authorities of regulatory legal acts that infringe on the constitutional rights and freedoms of citizens in the field of information activities;
  • creation of monopolies for the formation, receipt and dissemination of information in the Russian Federation, including through the use of telecommunication systems;
  • opposition, including by criminal structures, to the exercise by citizens of their constitutional rights to personal and family secrets, the secrecy of correspondence, telephone conversations and other communications, as well as the inefficient application of the existing legal framework in this area;
  • irrational, excessive restriction of access to socially necessary information;
  • violation of the constitutional rights and freedoms of man and citizen in the field of mass media;
  • non-compliance by public authorities, organizations and citizens with the requirements of the legislation of the Russian Federation regulating relations in the information sphere.

Threats to the spiritual life of society can be:

  • the use of means of influencing the mass consciousness of citizens;
  • disorganization and destruction of the system of accumulation and preservation of cultural values, including archives;
  • restriction of access of citizens to open state information resources of state authorities, other socially significant information;
  • the decline of the spiritual, moral and creative potential of Russia;
  • manipulation of information (misinformation, concealment or distortion of information).

Threats to information infrastructure may be:

  • violation of the targeting and timeliness of information exchange, illegal collection and use of information;
  • violation of information processing technology;
  • introduction into hardware and software products of components that implement functions that are not provided for in the documentation for these products;
  • development and distribution of programs that disrupt the normal functioning of information and information and telecommunication systems, including information security systems;
  • destruction, damage, electronic suppression or destruction of means and systems for processing information, telecommunications and communications;
  • theft of software or hardware keys and means of cryptographic information protection;
  • interception of information in technical channels, its leakage that occurs during the operation of technical means of processing and storage, as well as during the transmission of information through communication channels;
  • the introduction of electronic devices for intercepting information in the technical means of processing, storing and transmitting information via communication channels, as well as in the office premises of state authorities and organizations;
  • destruction, damage, destruction or theft of machine and other storage media;
  • interception, decryption and imposition of false information in data networks, communication lines and mass media systems;
  • impact on password-key systems for protecting automated systems for processing and transmitting information;
  • purchase abroad of information technologies, means of informatization, telecommunications and communications, which have domestic analogues, which are not inferior in their characteristics to foreign models.

Threats to information resources can be:

  • activities of space, air, sea and ground technical means of reconnaissance of foreign states;
  • implementation of unauthorized access to information resources and their illegal use;
  • theft of information resources from libraries, archives, banks and databases;
  • violation of legal restrictions on the dissemination of information resources.

In his Address on National Security (June 13, 1996), the President of the Russian Federation determined the main threats to Russia in the information sphere in the following way:

  • internal - the country lagging behind the leading countries in terms of the level and pace of informatization, the lack of a clearly formulated information policy;
  • external - attempts to prevent Russia from participating on equal terms in international information exchange, interference and targeted penetration into the activities and development of the information infrastructure of the Russian Federation, the desire to reduce the use of the Russian language as an international means of communication and through this narrowing of the Russian information space.

These and other internal and external threats by means of influence (realizations) are divided into informational, software-mathematical, physical and organizational ones.

Information threats implemented through unauthorized access to information resources and their theft for the purpose of illegal use, negative manipulation of information (misinformation, distortion of information, its concealment), violation of information processing technology, etc.

Software and mathematical threats are implemented by introducing into hardware and software systems components that perform functions that are not described in the documentation for these systems and reduce the efficiency of their functioning, the development and distribution of programs (viruses, Trojan horses, etc.) that disrupt the normal functioning of systems, including information security systems.

Physical Threats associated with physical impact (destruction, damage, theft) on information systems and their elements, signal interception of information in transmission channels or in office premises, etc.

К organizational threats First of all, the weak legal framework for ensuring information security should be attributed. There is practically no legal support for information security at the regional level. The requirements of existing legislative acts (the Constitution of the Russian Federation, the laws of the Russian Federation "On Security", "On State Secrets", "On Information, Informatization and Information Protection", etc.) are not always met. The shortcomings of the legal system lead to the fact that a significant amount of information with limited access in the financial and exchange, tax, customs, foreign economic, housing and other areas in the form of specific databases is distributed by various commercial firms.

В information space from the position of information security, the most typical are two dangers:

1) control (extraction) of information resources of the state, i.e. actually information intelligence (espionage). The information space has been and remains the sphere of activity of numerous intelligence services. Today, information intelligence can be implemented in two ways: unauthorized penetration into information and control systems; in a legal way, due to the active participation of foreign companies in the creation of the information structure of Russia. At the same time, in addition to the negative consequences associated with the fact that the country's information resources are under the control of relevant foreign structures, direct damage is inflicted on the economy - domestic science and production are left without their own orders;

2) the threat of destruction or disorganization of information resources of elements of state structures. With the current level of information technology development, such impacts can be carried out even in peacetime. They are fraught with the destruction of valuable information for the state, its distortion or the introduction of negative information in order to disorganize or make wrong decisions at the appropriate level of government.

It occupies a special place computer network security, which allow you to combine and share a large amount of information resources on a local and global scale. Computer networks are becoming one of the main means of information communication. At the same time, their enormous capabilities conflict with the problem of ensuring information security. This circumstance must be taken into account when creating and developing both local and global computer networks. Thus, in the process of creating the Internet in the United States in January 1981, the Computer Security Center of the Department of Defense was created, in 1985 it was transformed into the National Computer Security Center and transferred to the National Security Agency.

An analysis of the above threats, the forms and methods of their impact on security objects in the information sphere, as well as the methods and means of combating these threats, allows us to assert that at present two directions are already beginning to crystallize in the theory and practice of information security, which can be identified (although rather conditionally) as information-psychological security and information protection.

Information and psychological security - the state of protection of citizens, individual groups and social strata of society, mass associations of people, the population as a whole from negative information and psychological influences carried out in the information space (more on this will be discussed later).

Data protection - ensuring information security (parrying threats to information infrastructure and information resources).

Currently, the most actively developed problems of information security: organizational, legal, technical and technological measures to prevent and repel threats to information resources and systems, eliminate their consequences. The theory of information security is being formed, methods and means of information security are being created and actively used in practice, specialists are being trained in a number of specialties and specializations, such as information security technology, integrated information security of automated systems, information security and protection, etc.

Authors: Gubanov V.M., Mikhailov L.A., Solomin V.P.

 We recommend interesting articles Section Basics of safe life:

▪ Sex education

▪ Elimination of the consequences of emergency situations in wartime. Entering formations into the lesion

▪ Drug addiction and substance abuse

See other articles Section Basics of safe life.

Read and write useful comments on this article.

<< Back

Latest news of science and technology, new electronics:

Machine for thinning flowers in gardens 02.05.2024

In modern agriculture, technological progress is developing aimed at increasing the efficiency of plant care processes. The innovative Florix flower thinning machine was presented in Italy, designed to optimize the harvesting stage. This tool is equipped with mobile arms, allowing it to be easily adapted to the needs of the garden. The operator can adjust the speed of the thin wires by controlling them from the tractor cab using a joystick. This approach significantly increases the efficiency of the flower thinning process, providing the possibility of individual adjustment to the specific conditions of the garden, as well as the variety and type of fruit grown in it. After testing the Florix machine for two years on various types of fruit, the results were very encouraging. Farmers such as Filiberto Montanari, who has used a Florix machine for several years, have reported a significant reduction in the time and labor required to thin flowers. ... >>

Advanced Infrared Microscope 02.05.2024

Microscopes play an important role in scientific research, allowing scientists to delve into structures and processes invisible to the eye. However, various microscopy methods have their limitations, and among them was the limitation of resolution when using the infrared range. But the latest achievements of Japanese researchers from the University of Tokyo open up new prospects for studying the microworld. Scientists from the University of Tokyo have unveiled a new microscope that will revolutionize the capabilities of infrared microscopy. This advanced instrument allows you to see the internal structures of living bacteria with amazing clarity on the nanometer scale. Typically, mid-infrared microscopes are limited by low resolution, but the latest development from Japanese researchers overcomes these limitations. According to scientists, the developed microscope allows creating images with a resolution of up to 120 nanometers, which is 30 times higher than the resolution of traditional microscopes. ... >>

Air trap for insects 01.05.2024

Agriculture is one of the key sectors of the economy, and pest control is an integral part of this process. A team of scientists from the Indian Council of Agricultural Research-Central Potato Research Institute (ICAR-CPRI), Shimla, has come up with an innovative solution to this problem - a wind-powered insect air trap. This device addresses the shortcomings of traditional pest control methods by providing real-time insect population data. The trap is powered entirely by wind energy, making it an environmentally friendly solution that requires no power. Its unique design allows monitoring of both harmful and beneficial insects, providing a complete overview of the population in any agricultural area. “By assessing target pests at the right time, we can take necessary measures to control both pests and diseases,” says Kapil ... >>

Random news from the Archive

Bulletproof vest with cooling system 26.05.2012

The military and law enforcement officers have a very hard time in the summer. On duty, they wear bulletproof vests, which in hot weather become natural instruments of torture. Yes, body armor can protect against a bullet, but in the summer it is actually a sauna that a person wears on his own body. The engineers of the Swiss company Empa tried to solve the problem; it specializes in innovative materials.

Swiss specialists have developed a bulletproof vest with a built-in cooling system based on the Coolpad technology. Water-filled pillows are built into the protective wardrobe item, the liquid evaporates through the membranes, lowering the wearer's body temperature. And under the pillows are small fans that enhance the effect.

As reported, in the process of work, scientists encountered a number of obstacles. So, the fans selected by the developers turned out to be too large to be integrated into body armor. In addition, the water in the pillows not only evaporated, but also leaked from the impact of the outer armor layer. That's why Empa has developed its own fan design, as well as a technology whereby tanks are "welded" to armored plates using a laser beam.

The first tests have already been held in Zurich, they were attended by local police officers. And in the near future, serial production of bulletproof vests of a new type will be launched, this was entrusted to Unico Swisstex.

Other interesting news:

▪ 5,5" XOLO Q2000 Android smartphone

▪ 5G communication module for cars

▪ Onda V972 Tablet with 9,7" Retina Display

▪ Skin blood vessels

▪ LeTV X1 door lock with 3D face ID

News feed of science and technology, new electronics

 

Interesting materials of the Free Technical Library:

▪ section of the site for the Builder, home craftsman. Selection of articles

▪ article Socrates. Famous aphorisms

▪ article Which hyphen has been named the most expensive hyphen in history? Detailed answer

▪ article Caches in cars.. Spy stuff

▪ article Light-dynamic device Traveling wave. Encyclopedia of radio electronics and electrical engineering

▪ article Pinwheel on a pin. physical experiment

Leave your comment on this article:

Name:


Email (optional):


A comment:





All languages ​​of this page

Home page | Library | Articles | Website map | Site Reviews

www.diagram.com.ua

www.diagram.com.ua
2000-2024