Cybersecurity as the core factor of national and international security in the economic sector: trends, basic concepts and terms

Stenkina E.N.1
1 Дальневосточный государственный технический рыбохозяйственный университет, Russia

Научное издание / монография

Выпущено ООО «Первое экономическое издательство»

Стенькина Е.Н. (2021) Кибербезопасность, как основной фактор национальной и международной безопасности в отрасли экономики: тенденции, базовые понятия и термины  / ISBN: 978-5-91292-403-3
  • Авторы: Стенькина Е.Н.
  • Год издания: 2021
  • УДК: 304.4
  • ББК: 71.0
  • Тираж: 500 экз.
  • Формат: 60x84/16
  • Обложка: Мягкая обложка
  • Страниц: 258
  • Усл. печ. л.: 15,0
  • ISBN: 978-5-91292-403-3
  • DOI: 10.18334/9785912924033
  • Indexed in Russian Science Citation Index: https://elibrary.ru/item.asp?id=47251859

    Get access via LAN BOOK: https://e.lanbook.com/book/276713

    Get access via Znanium: https://znanium.com/catalog/document?id=424765

     

    Please, cite as:

    Книга в каталоге РГБ: https://search.rsl.ru/ru/record/01011040758

    Рецензенты:
    Бессонова А.А. - кандидат экономических наук, доцент Департамента финансов, ДВФУ.
    Курасова Е.А. - кандидат экономических наук, доцент Департамента финансов, ДВФУ.

    Abstract:
    The monograph discusses the current problems of cybersecurity in Russia and abroad. Cybersecurity is an integral part of national and international security in the economic sector. Currently, the emphasis is changing – cybersecurity problems are becoming systemic, global in nature. The level of the issue is becoming more ambitious – it is no longer a separate object of computer technology, but a cybersecurity system of the state as an element of information and national security related to ensuring the protection of cyberspace. The relevance of this work is due to the serious threat to humanity from cyberterrorism. The experience currently available to the world community is insufficient to fully counter this threat and indicates the existence of a guaranteed vulnerability of any state.

    Keywords: cybersecurity, information security, international security, cyberspace, cybercrime.

    References:

    Legislative and regulatory documents
    1. Okinawa Charter of the Global Information Society.
    Adopted on July 22, 2000 // Diplomatic Bulletin. – 2000. – No.
    8. – http://www.mcrt.ru/index.php?nodeid=1218 .
    2. Resolution of the UN General Assembly of 1974 // Current international law/ Comp. Yu.M. Kolosov and E.S. Krivchikova.
    M.: Nauka, 2000. T. 2. p. 438.
    3. Charter of the United Nations 1945//International Law in documents/ Comp. N.T. Blatov.
    4. The North Atlantic Treaty of 1949 //Current international law/ Comp. Yu. M. Kolosov and E. S. Krivchikova.
    5. Kotlyar, V. UN reform and the question of the revival of the Military Staff Committee under the UN Security Council // International Public and Private Law. 2006. No. 6.
    6. Federal Law No. 35–FZ of March 6, 2006 On Countering Terrorism.
    7. Terrorist act // "Criminal Code of the Russian Federation" dated 13.06.1996 No. 63–FZ (ed. dated 17.04.2017).
    8. Sending a request for legal assistance // "Criminal Procedure Code of the Russian Federation" dated 18.12.2001 No. 174-
    FZ.
    9. About information, information technologies and information protection
    feder. Law No. 149-FZ of 27.07.2006.
    10. On the approval of the Information Security Doctrine
    Decree of the President of the Russian Federation dated 05.12.2016 No. 646.
    11. On personal data feder. Law No. 152-FZ of 27.07.2006
    12. Federal Law No. 149-FZ of July 27, 2006 "On Information, Information Technologies and Information Protection"
    13. Federal Law "On Security" No. 390-
    FZ dated December 28, 2010.
    247
    14. Federal Law "On Ratification of the Council of Europe Convention on the Protection of Individuals with Automated Processing
    of Personal Data" dated 19.12.2005 No. 160-FZ.
    15. Federal Law "On Amendments to Certain
    legislative acts of the Russian Federation in connection with the adoption
    of the Federal law "On Ratification of the Council of Europe Convention on
    the Protection of Individuals with Automated Processing of Personal Data" and the Federal Law "On Personal Data"
    dated 7.05.2013 No. 99-FZ.
    16. Federal Law "On Amendments to Certain Legislative Acts of the Russian Federation in Terms of Clarifying the Procedure for Processing Personal Data in Information and Telecommunications Networks" dated 21.07.2014 No. 242-FZ.
    17. Federal Law "On the Security of Critical Information Infrastructure of the Russian Federation" dated 26.07.2017
    No. 187-FZ.
    18. Federal Law "On Amendments to Certain
    Legislative Acts of the Russian Federation in Connection with the Adoption of the Federal Law "On the Security of Critical Information Infrastructure of the Russian Federation" dated 26.07.2017
    No. 193-FZ.
    19. Federal Law "On Amendments to the Criminal Code
    The Code of the Russian Federation and Article 151 of the Criminal Procedure Code of the Russian Federation in connection with the adoption of the Federal Law "On the Security of Critical Information Infrastructure of the Russian Federation" dated 26.07.2017 No. 194-FZ.
    20. Federal Law "On Information, Information Technologies and Information Protection" dated July 27, 2006 No. 149-FZ.
    Literature
    21. Alpeev, A. S. Basic concepts of safety // Monthly supplement to the journal "Standards and quality". Environmental
    248
    aspects of reliability problems and safety of technical systems.
    2014, issue 7. – pp. 3-9
    22. Avcharov I.V. Fight against cybercrime / I.V. Avcharov.
    // Informatization and information security of law enforcement agencies. XI inter. conf. – M., 2012. – pp. 191-194.
    23. Aikov D.V. Computer crimes. Guidelines for
    combating computer crimes / D. Aikov, K. Seiger, U.
    Fonstorh. – M.: Mir, 2014.- 351 p.
    24. Antonos G. A. International changes in the law of cyberspace./ G.A. Antonos // Law and informatization of society: collection
    of scientific tr. – M.: INIONRAN, 2012. - pp. 174-186.
    25. Akhtyrskaya N. Organized crime in the field of information technology / N. Akhtyrskaya // Computer crime and cyberterrorism. Research, analytics. Issue 1. – Zaporozhye, 2014. – pp. 30-35.
    26. Bukin D.A. Hackers. About those who do it / D. Bukin //
    Securities Market. 2013, – No. 23. – pp. 54-57.
    27. Bukin D.A. Underground cyberspace / D. Bukin // Securities Market. 2013. – No. 8. – pp. 104-108.
    28. Bykov V. Improving criminal liability
    for crimes, coupled with computer technology /
    V. Bykov, A. Bad, V. Cherkasov. // Criminal law. 2013. –
    No. 3. – pp. 9-11.
    29. Vekhov V. B. Computer crimes: methods of commission and disclosure / V.B. Vekhov; Ed. Academician B.P. Smagorinsky. –
    M.: Law and the law, 2014.- 182 p.
    30. Prikhodko, A. Ya. Information security in events
    and facts / A. Ya. Prikhodko – M.: SINTEG, 2001. – pp. 187-193
    31. Konyavsky, V.A. Development of means of technical protection of information / V. A. Konyavsky // Complex protection of information.
    Collection of materials of the XII International Conference (May 13-16
    2008, Yaroslavl (Russia)). M., 2008. pp. 109-113
    32. Zegzhda, D. P. Fundamentals of information systems security
    249
    / D. P. Zegzhda, A.M. Ivashko – M.: Hotline-Telecom, 2000. –
    pp. 232-245
    33. Pyarin, V. A. Security of electronic business / V. A.
    Pyarin, A. S. Kuzmin, S. N. Smirnov – M.: Helios-ARV, 2002. –
    pp. 197-218
    34. Malyuk, A.A. Foreign experience
    of information security culture formation in society / A.A. Malyuk, O.Yu Polyanskaya// Information technology security. – 2016. – No. 4. –
    pp. 25-37
    35. Streltsov, A.A. On the issue of digital sovereignty / A.A.
    Streltsov, P.L. Pilyugin // Informatization and communication. – 2016. –
    No. 2. – pp. 25-30
    36. Ratkin, L.S. Means of information protection as part of the infrastructure system of global national security / L.S. Ratkin //
    Information protection. Inside. – 2016. – № 4 (70). – Pp. 25-29
    37. Zharova, A.K. Legal classification of threats and risks in the information sphere / A.K. Zharova // Issues of defense technology. Series 16: Technical means of countering terrorism. –
    2016. – № 7-8 (97-98). – Pp. 130-138
    38. Astakhova, L.V. Personnel problems of building
    an information security management system at an enterprise / L.V.
    Astakhova, L.O. Ovchinnikova // Bulletin of the Ural Federal District. Security in the information sphere. – 2016. – № 3 (21). – Pp. 38-46
    39. Markov, R.A. Approach to the identification of information security incidents / R.A. Markov, V.V. Bukhtoyarov, A.M. Popov;
    edited by R.A. Markov // Scientific and Technical Bulletin of the Volga region. -
    2016. – No. 1. – pp. 78-80
    40. Ostroukh, E.N. Development of methods and algorithms for checking
    the work of the enterprise from the point of view of information security
    its functioning / E.N. Ostroukh, Yu.O. Chernyshev, S.A. Mukhtarov; edited by E.N. Ostroukh // Engineering Bulletin of the Don. – 2016. T.
    41. – № 2 – (41). Pp. 31-32
    41. Poltavtseva, M.A. Database security: problems and
    250
    prospects / M.A. Poltavtseva // International scientific and practical journal "Software products and Systems". – 2016. –
    No. 3. – pp. 36-41
    42. Golubchikov, S.V. Levels and legal model of information security / S.V. Golubchikov // International scientific and practical journal "Software products and systems". – 2017. –
    No. 2. – pp. 320-323
    43. Matveikin, V.G. Software-algorithmic complex of enterprise protection and management / V.G. Matveikin, B.S. Dmitrievsky, V.I. Mednikov; edited by V.G. Matveikin // International
    scientific and practical journal "Software products and Systems". - 2017. – No. 2. – pp. 307-313
    44. Prikhodko A. Ya. Information security in events
    and facts / A. Ya. Prikhodko – M.: SINTEG, 2001. – pp. 187-193
    45. Bezrukov, N.N./ Computer viruses. – M.: Nauka, 1991.–
    159 p.
    46. Vekhov, V.B. // Computer crimes: methods
    of commission, methods of investigation. / –Moscow: Law and the law, 1998.–
    p. 348
    47. Threats to information security: f o r m i r o v a n i e
    conceptual approaches. Journal of Russian Law – 2015. –
    No. 8, – pp. 89-91.
    48. Cybersecurity: economic risks and efficiency. Journal
    USA/ Canada– 2008. –No. 4, – pp. 15-34
    49. Rogovsky E.A. Global information technologies as
    a factor of inter-security. USA Magazine\Canada – 2010. – No. 12, –
    pp. 13-25
    50. U.S. policy on Cyberspace security. US Magazine\Canada–2012. –No. 6, – pp. 20-27
    51. Chinese cyberthreats of the US National Security. Journal
    USA\Canada – 2014. – No. 11, – pp. 34-41
    52. US Cybersecurity. US Magazine\Canada – 2014. –
    No. 10, – pp. 10-13
    251
    53. Kulkov, V.M., Tenyakov, I.M. - The influence
    of the information revolution on security. US Magazine\Canada –
    2015. – No. 1, – pp. 14-19
    54. Sharikov, P.A. Problems of information security in a polycentric world. US Magazine\Canada – 2015. –No. 11, – pp. 27-35
    55. Kosolapov, N.A. National security in a changing world// World Economy and International Relations, -
    1992. – No. 10.– pp. 12-15
    56. Bogaturov, A.D. // Great Powers in the Pacific Ocean. /– M.:
    Gardariki, - 1997.– 234 p.
    57. Mazurov, V.A. Cyberterrorism: concept, problems of counteraction, –M.: Nauka, -2010. –pp. 41-45
    58. Zgoba, A.I., Markelov, D.V., Smirnov, P.I. //Cybersecurity: threats, challenges, solutions. /–M.: Bustard, -2015, -432 p.
    59. Vasiliev, K.I. On the question of the concept of "Cyberterrorism" in
    Russian science
    // Scientific journal "Young Scientist". – 2015. – № 17 (97), Pp
    . 337-340.
    60. 28Nemov, M.V.Cybercrime as a new criminal
    threat. The Epoch of Science magazine. –Krasnoyarsk, -2017. – No. 9. –pp. 53-59
    61. Protasevich, A.A., Zveryanskaya, L.P. The fight against cybercrime as an urgent task of modern science //Problems of combating certain types of crimes. – Irkutsk. – All–Russian Criminological Journal. -2011. – No. 3. -pp. 28-33
    62. Nemov, M.V. Cybercrime as a new criminal
    threat. The Epoch of Science magazine. –Krasnoyarsk, -2017. –No. 9. –pp. 53-59.
    63. Gospodarik, Yu. P. International economic security : textbook : [16+] / Yu. P. Gospodarik, M. V. Pashkovskaya. – 3rd
    ed., erased. – Moscow : Synergy University, 2018. – 416 p.
    64. Arzumanyan, A. B. International standards of legal protection
    of information and information technologies : textbook : [16+]
    / A. B. Arzumanyan ; Southern Federal University. – Rostov-on-Don; Taganrog : Southern Federal University, 2020. – 140 p.
    252
    65. Gurevich, V. I. Vulnerabilities of microprocessor protection relays: problems and solutions: textbook / V. I. Gurevich. – Moscow : Infra-Engineering, 2014. – 256 p.
    66. Yeremiychuk, A. K. Cybersecurity policy of the People's Republic of China from 1996
    to 2019 / A. K. Yeremiychuk; Russian State University for the Humanities. – Moscow : B.I., 2020. – 68 p.
    67. Terekhov, A. N. The political economy of information and communication technologies: Russia's place on the global market /
    A. N. Terekhov, S. L. Tkachenko. – Moscow : Publishing House of the Higher
    School of Economics, 2019. – 312 p.
    68. The State in Political science and social reality
    of the XXI century / ed. by I. S. Semenenko; edited by V. V. Lapkin, V. I.
    Pantin; E.M. Primakov National Research Institute of World Economy and International Relations of the Russian Academy of Sciences. –
    Moscow : The Whole World, 2020. – 385 p.
    69. Kovalev, D. V. Information security : textbook : [16+] / D. V. Kovalev, E. A. Bogdanova ; Southern Federal
    University. – Rostov-on-Don : Southern Federal University,
    2016. – 74 p.
    70. Artemov, A.V. Information security: a course of lectures
    / A.V. Artemov; Interregional Academy of Security and Survival. – Orel : Interregional Academy of Security and Survival, 2014. – 257 p.
    71. Bashly, P. N. Information security: educational and practical manual : textbook / P. N. Bashly, E. K. Baranova,
    A.V. Babash. – Moscow : Eurasian Open Institute, 2011. –
    375 pp .
    72. Morgunov, A.V. Information security : educational and methodological manual : [16+] / A.V. Morgunov ; Novosibirsk State Technical University. – Novosibirsk : Novosibirsk State Technical University, 2019. – 83 p.
    73. Efremov, I. V. Information technologies in the field of security: workshop : textbook / I. V. Efremov, V. A. So-
    253
    lopova ; Orenburg State University. – Orenburg :
    Orenburg State University, 2013. – 116 p.
    74. Wiener N. Cybernetics, or control and communication in an animal and
    a machine. – M.: Nauka, – 341 p.
    Online sources
    75. Types and sources of information security threats
    [electronic resource]. Access mode: http://infoprotect.net/note /
    vidyi_i_istochniki_ugroz_informacionnoy_bezopasnost
    76. The concept of the cybersecurity strategy of the Russian Federation http://www.council.gov.ru / media/fi les/41d4b3dfbdb25cea8a73.
    pdf
    77. Monthly supplement to the magazine "Standards and Quality". Environmental aspects of reliability problems and safety
    of technical systems. "Basic concepts of security". Alpeev
    A.S. M., 1994, issue 7.
    78. RBC. – https://www.rbc.ru/society/16/10/2018/5bc5d6f49a7947f
    779d76eaf
    79. The first hacker in the USSR. VAZ stopped the conveyor and remained
    free/ http://yandex.ru/yandsea rch?lr=213&text=%D0%BF%D0
    %B5%D1%80%D 0%B2%D1%8B%D0%B9+%D1%85%D0%B0%D0
    %BA%D0%B5%D1%80+%D1%81%D1%81%D1% 81%D1%80&csg
    =5649%2C41594%2C12%2C25% 2C3%2C0%2C0.
    80. Army Bulletin of 04.09.2012 "World Cyber wars".
    http://lastbabylon.com/node/387.
    81. Sokolov M.S. Cybernetic security – concept, meaning and evolution. – http://lib.znate.ru/download/docs59946/59946.doc
    82. Fundamentals of information security and information protection [Electronic resource]. Access mode: https://sites.google.com /
    site/anisimovkhv/learning/kripto/lecture/tema1
    83. Protection of information from unauthorized access [Electronic resource]. Access mode: http://bukvasha.ru /
    referat/393529
    254
    84. Information technologies in professional activity [Electronic resource]. Access mode: https://www.bibliofond .
    ru/view.aspx?id=863692
    85. Office security. Modern solutions [Electronic
    resource] / D. A. Polukhina // Director of Security: electronic
    scientific journal. Access mode: http://www.sdirector.ru/magazine /
    magdocs/view/136.html
    86. Information system. Wikipedia [Electronic resource]. Access mode: https://ru.wikipedia.org/wiki / Information_system
    87. The role of information security in the modern world
    [electronic resource]. Access mode: https://searchinform.ru /
    informatsionnayabezopasnost/osnovy-ib/ib-v-rossii-i-mire
    88. Means of ensuring information security from
    malware [Electronic resource]. Access mode: http://
    www.livesafety.ru/content/notes/information_security.php?ELEMENT_
    ID=16 79
    89. Konyavsky, V.A. Development of means of technical protection of information / V. A. Konyavsky // Complex protection of information.
    Collection of materials of the XII International Conference (May 13-16
    2008, Yaroslavl (Russia)). M., 2008. pp. 109-113.)
    90. Forecast of Orange Business Services and IDC until 2022 [Electronic resource]. Access mode: http://www.tadviser.ru/index.php/
    Article:Information Security(Market_Russia)
    91. Karl Frederik Rauscher, Russia-USA Bilateral Cybersecurity Project. Fundamentals of Critical
    Terminology, 2011– URL:http://www.iisi.msu.ru/UserFiles/File/
    Terminology%20IISI%20EWI/Russia-U%20S%20%20bilateral%20
    on%20terminology%20RUS.pdf
    92. Golubev, V.A. Cyberterrorism – the threat of national security. – http://www.crive-research.ru .
    93. Saytarly T. The US experience in the investigation of computer
    crimes. – http://www.crime-research.org/news/2000/0
    94. Ibragimov, V. Cyberterrorism on the Internet before and after 11
    September 2001: threats and neutralization.– http://www.crime-research.
    ru/articles/vagif.
    95. Vasenin, V.A. Information security and computer terrorism. – http://www . crime-research.ru
    96. Grinyaev S. The USA is deploying an information
    security system. In Russia, however, the matter does not go further than talking:
    independent military review No. 45 (405) http://www.cnews.ru /
    security /part3 /rus-edu.shtml.
    97. Nye J. S. Jr., Cohen R.O. (ed.)//Transnational relations and world politics. – http://grachev62.narod.ru/tmo/chapt12.
    html.
    98. Information security / ed. by O. Rytenkov. – Moscow
    : GROTEK, 2014. – No. 1. – 68 p. : ill. – Access mode: by subscription. –
    URL: https://biblioclub.ru/index.php?page=book&id=230502 . – Text :
    electronic.
    99. Information security / ed. by O. Rytenkov. – Moscow
    : GROTEK, 2014. – No. 3. – 68 p. : ill. – Access mode: by subscription. –
    URL: https://biblioclub.ru/index.php?page=book&id=238446 . – Text :
    electronic.
    100. Information security / ed. by O. Rytenkov. – Moscow
    : GROTEK, 2013. – No. 5. – 60 p. : ill. – Access mode: by subscription. –
    URL: https://biblioclub.ru/index.php?page=book&id=226268 . – Text :
    electronic.

    Страница обновлена: 24.01.2023 в 10:57:10