Cybersecurity as the core factor of national and international security in the economic sector: trends, basic concepts and terms
Stenkina E.N.1
1 Дальневосточный государственный технический рыбохозяйственный университет, Russia
Научное издание / монография
Выпущено ООО «Первое экономическое издательство»

Indexed in Russian Science Citation Index: https://elibrary.ru/item.asp?id=47251859
Get access via LAN BOOK: https://e.lanbook.com/book/276713
Get access via Znanium: https://znanium.com/catalog/document?id=424765
Please, cite as:
Книга в каталоге РГБ: https://search.rsl.ru/ru/record/01011040758
Рецензенты:
Бессонова А.А. - кандидат экономических наук, доцент Департамента финансов, ДВФУ.
Курасова Е.А. - кандидат экономических наук, доцент Департамента финансов, ДВФУ.
Abstract:
The monograph discusses the current problems of cybersecurity in
Russia and abroad. Cybersecurity is an integral part of national and international security in the economic sector. Currently, the emphasis is changing – cybersecurity problems are becoming
systemic, global in nature. The level of the issue is becoming more ambitious – it is no longer a separate object of computer technology, but a cybersecurity system of the state as an element of information and national security related to ensuring the protection of cyberspace.
The relevance of this work is due to the serious threat to humanity from
cyberterrorism. The experience currently available to the world community is insufficient to fully counter this threat and indicates the existence of a guaranteed vulnerability of any state.
Keywords: cybersecurity, information security, international security, cyberspace, cybercrime.
References:
Legislative and regulatory documents
1. Okinawa Charter of the Global Information Society.
Adopted on July 22, 2000 // Diplomatic Bulletin. – 2000. – No.
8. – http://www.mcrt.ru/index.php?nodeid=1218 .
2. Resolution of the UN General Assembly of 1974 // Current international law/ Comp. Yu.M. Kolosov and E.S. Krivchikova.
M.: Nauka, 2000. T. 2. p. 438.
3. Charter of the United Nations 1945//International Law in documents/ Comp. N.T. Blatov.
4. The North Atlantic Treaty of 1949 //Current international law/ Comp. Yu. M. Kolosov and E. S. Krivchikova.
5. Kotlyar, V. UN reform and the question of the revival of the Military Staff Committee under the UN Security Council // International Public and Private Law. 2006. No. 6.
6. Federal Law No. 35–FZ of March 6, 2006 On Countering Terrorism.
7. Terrorist act // "Criminal Code of the Russian Federation" dated 13.06.1996 No. 63–FZ (ed. dated 17.04.2017).
8. Sending a request for legal assistance // "Criminal Procedure Code of the Russian Federation" dated 18.12.2001 No. 174-
FZ.
9. About information, information technologies and information protection
feder. Law No. 149-FZ of 27.07.2006.
10. On the approval of the Information Security Doctrine
Decree of the President of the Russian Federation dated 05.12.2016 No. 646.
11. On personal data feder. Law No. 152-FZ of 27.07.2006
12. Federal Law No. 149-FZ of July 27, 2006 "On Information, Information Technologies and Information Protection"
13. Federal Law "On Security" No. 390-
FZ dated December 28, 2010.
247
14. Federal Law "On Ratification of the Council of Europe Convention on the Protection of Individuals with Automated Processing
of Personal Data" dated 19.12.2005 No. 160-FZ.
15. Federal Law "On Amendments to Certain
legislative acts of the Russian Federation in connection with the adoption
of the Federal law "On Ratification of the Council of Europe Convention on
the Protection of Individuals with Automated Processing of Personal Data" and the Federal Law "On Personal Data"
dated 7.05.2013 No. 99-FZ.
16. Federal Law "On Amendments to Certain Legislative Acts of the Russian Federation in Terms of Clarifying the Procedure for Processing Personal Data in Information and Telecommunications Networks" dated 21.07.2014 No. 242-FZ.
17. Federal Law "On the Security of Critical Information Infrastructure of the Russian Federation" dated 26.07.2017
No. 187-FZ.
18. Federal Law "On Amendments to Certain
Legislative Acts of the Russian Federation in Connection with the Adoption of the Federal Law "On the Security of Critical Information Infrastructure of the Russian Federation" dated 26.07.2017
No. 193-FZ.
19. Federal Law "On Amendments to the Criminal Code
The Code of the Russian Federation and Article 151 of the Criminal Procedure Code of the Russian Federation in connection with the adoption of the Federal Law "On the Security of Critical Information Infrastructure of the Russian Federation" dated 26.07.2017 No. 194-FZ.
20. Federal Law "On Information, Information Technologies and Information Protection" dated July 27, 2006 No. 149-FZ.
Literature
21. Alpeev, A. S. Basic concepts of safety // Monthly supplement to the journal "Standards and quality". Environmental
248
aspects of reliability problems and safety of technical systems.
2014, issue 7. – pp. 3-9
22. Avcharov I.V. Fight against cybercrime / I.V. Avcharov.
// Informatization and information security of law enforcement agencies. XI inter. conf. – M., 2012. – pp. 191-194.
23. Aikov D.V. Computer crimes. Guidelines for
combating computer crimes / D. Aikov, K. Seiger, U.
Fonstorh. – M.: Mir, 2014.- 351 p.
24. Antonos G. A. International changes in the law of cyberspace./ G.A. Antonos // Law and informatization of society: collection
of scientific tr. – M.: INIONRAN, 2012. - pp. 174-186.
25. Akhtyrskaya N. Organized crime in the field of information technology / N. Akhtyrskaya // Computer crime and cyberterrorism. Research, analytics. Issue 1. – Zaporozhye, 2014. – pp. 30-35.
26. Bukin D.A. Hackers. About those who do it / D. Bukin //
Securities Market. 2013, – No. 23. – pp. 54-57.
27. Bukin D.A. Underground cyberspace / D. Bukin // Securities Market. 2013. – No. 8. – pp. 104-108.
28. Bykov V. Improving criminal liability
for crimes, coupled with computer technology /
V. Bykov, A. Bad, V. Cherkasov. // Criminal law. 2013. –
No. 3. – pp. 9-11.
29. Vekhov V. B. Computer crimes: methods of commission and disclosure / V.B. Vekhov; Ed. Academician B.P. Smagorinsky. –
M.: Law and the law, 2014.- 182 p.
30. Prikhodko, A. Ya. Information security in events
and facts / A. Ya. Prikhodko – M.: SINTEG, 2001. – pp. 187-193
31. Konyavsky, V.A. Development of means of technical protection of information / V. A. Konyavsky // Complex protection of information.
Collection of materials of the XII International Conference (May 13-16
2008, Yaroslavl (Russia)). M., 2008. pp. 109-113
32. Zegzhda, D. P. Fundamentals of information systems security
249
/ D. P. Zegzhda, A.M. Ivashko – M.: Hotline-Telecom, 2000. –
pp. 232-245
33. Pyarin, V. A. Security of electronic business / V. A.
Pyarin, A. S. Kuzmin, S. N. Smirnov – M.: Helios-ARV, 2002. –
pp. 197-218
34. Malyuk, A.A. Foreign experience
of information security culture formation in society / A.A. Malyuk, O.Yu Polyanskaya// Information technology security. – 2016. – No. 4. –
pp. 25-37
35. Streltsov, A.A. On the issue of digital sovereignty / A.A.
Streltsov, P.L. Pilyugin // Informatization and communication. – 2016. –
No. 2. – pp. 25-30
36. Ratkin, L.S. Means of information protection as part of the infrastructure system of global national security / L.S. Ratkin //
Information protection. Inside. – 2016. – № 4 (70). – Pp. 25-29
37. Zharova, A.K. Legal classification of threats and risks in the information sphere / A.K. Zharova // Issues of defense technology. Series 16: Technical means of countering terrorism. –
2016. – № 7-8 (97-98). – Pp. 130-138
38. Astakhova, L.V. Personnel problems of building
an information security management system at an enterprise / L.V.
Astakhova, L.O. Ovchinnikova // Bulletin of the Ural Federal District. Security in the information sphere. – 2016. – № 3 (21). – Pp. 38-46
39. Markov, R.A. Approach to the identification of information security incidents / R.A. Markov, V.V. Bukhtoyarov, A.M. Popov;
edited by R.A. Markov // Scientific and Technical Bulletin of the Volga region. -
2016. – No. 1. – pp. 78-80
40. Ostroukh, E.N. Development of methods and algorithms for checking
the work of the enterprise from the point of view of information security
its functioning / E.N. Ostroukh, Yu.O. Chernyshev, S.A. Mukhtarov; edited by E.N. Ostroukh // Engineering Bulletin of the Don. – 2016. T.
41. – № 2 – (41). Pp. 31-32
41. Poltavtseva, M.A. Database security: problems and
250
prospects / M.A. Poltavtseva // International scientific and practical journal "Software products and Systems". – 2016. –
No. 3. – pp. 36-41
42. Golubchikov, S.V. Levels and legal model of information security / S.V. Golubchikov // International scientific and practical journal "Software products and systems". – 2017. –
No. 2. – pp. 320-323
43. Matveikin, V.G. Software-algorithmic complex of enterprise protection and management / V.G. Matveikin, B.S. Dmitrievsky, V.I. Mednikov; edited by V.G. Matveikin // International
scientific and practical journal "Software products and Systems". - 2017. – No. 2. – pp. 307-313
44. Prikhodko A. Ya. Information security in events
and facts / A. Ya. Prikhodko – M.: SINTEG, 2001. – pp. 187-193
45. Bezrukov, N.N./ Computer viruses. – M.: Nauka, 1991.–
159 p.
46. Vekhov, V.B. // Computer crimes: methods
of commission, methods of investigation. / –Moscow: Law and the law, 1998.–
p. 348
47. Threats to information security: f o r m i r o v a n i e
conceptual approaches. Journal of Russian Law – 2015. –
No. 8, – pp. 89-91.
48. Cybersecurity: economic risks and efficiency. Journal
USA/ Canada– 2008. –No. 4, – pp. 15-34
49. Rogovsky E.A. Global information technologies as
a factor of inter-security. USA Magazine\Canada – 2010. – No. 12, –
pp. 13-25
50. U.S. policy on Cyberspace security. US Magazine\Canada–2012. –No. 6, – pp. 20-27
51. Chinese cyberthreats of the US National Security. Journal
USA\Canada – 2014. – No. 11, – pp. 34-41
52. US Cybersecurity. US Magazine\Canada – 2014. –
No. 10, – pp. 10-13
251
53. Kulkov, V.M., Tenyakov, I.M. - The influence
of the information revolution on security. US Magazine\Canada –
2015. – No. 1, – pp. 14-19
54. Sharikov, P.A. Problems of information security in a polycentric world. US Magazine\Canada – 2015. –No. 11, – pp. 27-35
55. Kosolapov, N.A. National security in a changing world// World Economy and International Relations, -
1992. – No. 10.– pp. 12-15
56. Bogaturov, A.D. // Great Powers in the Pacific Ocean. /– M.:
Gardariki, - 1997.– 234 p.
57. Mazurov, V.A. Cyberterrorism: concept, problems of counteraction, –M.: Nauka, -2010. –pp. 41-45
58. Zgoba, A.I., Markelov, D.V., Smirnov, P.I. //Cybersecurity: threats, challenges, solutions. /–M.: Bustard, -2015, -432 p.
59. Vasiliev, K.I. On the question of the concept of "Cyberterrorism" in
Russian science
// Scientific journal "Young Scientist". – 2015. – № 17 (97), Pp
. 337-340.
60. 28Nemov, M.V.Cybercrime as a new criminal
threat. The Epoch of Science magazine. –Krasnoyarsk, -2017. – No. 9. –pp. 53-59
61. Protasevich, A.A., Zveryanskaya, L.P. The fight against cybercrime as an urgent task of modern science //Problems of combating certain types of crimes. – Irkutsk. – All–Russian Criminological Journal. -2011. – No. 3. -pp. 28-33
62. Nemov, M.V. Cybercrime as a new criminal
threat. The Epoch of Science magazine. –Krasnoyarsk, -2017. –No. 9. –pp. 53-59.
63. Gospodarik, Yu. P. International economic security : textbook : [16+] / Yu. P. Gospodarik, M. V. Pashkovskaya. – 3rd
ed., erased. – Moscow : Synergy University, 2018. – 416 p.
64. Arzumanyan, A. B. International standards of legal protection
of information and information technologies : textbook : [16+]
/ A. B. Arzumanyan ; Southern Federal University. – Rostov-on-Don; Taganrog : Southern Federal University, 2020. – 140 p.
252
65. Gurevich, V. I. Vulnerabilities of microprocessor protection relays: problems and solutions: textbook / V. I. Gurevich. – Moscow : Infra-Engineering, 2014. – 256 p.
66. Yeremiychuk, A. K. Cybersecurity policy of the People's Republic of China from 1996
to 2019 / A. K. Yeremiychuk; Russian State University for the Humanities. – Moscow : B.I., 2020. – 68 p.
67. Terekhov, A. N. The political economy of information and communication technologies: Russia's place on the global market /
A. N. Terekhov, S. L. Tkachenko. – Moscow : Publishing House of the Higher
School of Economics, 2019. – 312 p.
68. The State in Political science and social reality
of the XXI century / ed. by I. S. Semenenko; edited by V. V. Lapkin, V. I.
Pantin; E.M. Primakov National Research Institute of World Economy and International Relations of the Russian Academy of Sciences. –
Moscow : The Whole World, 2020. – 385 p.
69. Kovalev, D. V. Information security : textbook : [16+] / D. V. Kovalev, E. A. Bogdanova ; Southern Federal
University. – Rostov-on-Don : Southern Federal University,
2016. – 74 p.
70. Artemov, A.V. Information security: a course of lectures
/ A.V. Artemov; Interregional Academy of Security and Survival. – Orel : Interregional Academy of Security and Survival, 2014. – 257 p.
71. Bashly, P. N. Information security: educational and practical manual : textbook / P. N. Bashly, E. K. Baranova,
A.V. Babash. – Moscow : Eurasian Open Institute, 2011. –
375 pp .
72. Morgunov, A.V. Information security : educational and methodological manual : [16+] / A.V. Morgunov ; Novosibirsk State Technical University. – Novosibirsk : Novosibirsk State Technical University, 2019. – 83 p.
73. Efremov, I. V. Information technologies in the field of security: workshop : textbook / I. V. Efremov, V. A. So-
253
lopova ; Orenburg State University. – Orenburg :
Orenburg State University, 2013. – 116 p.
74. Wiener N. Cybernetics, or control and communication in an animal and
a machine. – M.: Nauka, – 341 p.
Online sources
75. Types and sources of information security threats
[electronic resource]. Access mode: http://infoprotect.net/note /
vidyi_i_istochniki_ugroz_informacionnoy_bezopasnost
76. The concept of the cybersecurity strategy of the Russian Federation http://www.council.gov.ru / media/fi les/41d4b3dfbdb25cea8a73.
pdf
77. Monthly supplement to the magazine "Standards and Quality". Environmental aspects of reliability problems and safety
of technical systems. "Basic concepts of security". Alpeev
A.S. M., 1994, issue 7.
78. RBC. – https://www.rbc.ru/society/16/10/2018/5bc5d6f49a7947f
779d76eaf
79. The first hacker in the USSR. VAZ stopped the conveyor and remained
free/ http://yandex.ru/yandsea rch?lr=213&text=%D0%BF%D0
%B5%D1%80%D 0%B2%D1%8B%D0%B9+%D1%85%D0%B0%D0
%BA%D0%B5%D1%80+%D1%81%D1%81%D1% 81%D1%80&csg
=5649%2C41594%2C12%2C25% 2C3%2C0%2C0.
80. Army Bulletin of 04.09.2012 "World Cyber wars".
http://lastbabylon.com/node/387.
81. Sokolov M.S. Cybernetic security – concept, meaning and evolution. – http://lib.znate.ru/download/docs59946/59946.doc
82. Fundamentals of information security and information protection [Electronic resource]. Access mode: https://sites.google.com /
site/anisimovkhv/learning/kripto/lecture/tema1
83. Protection of information from unauthorized access [Electronic resource]. Access mode: http://bukvasha.ru /
referat/393529
254
84. Information technologies in professional activity [Electronic resource]. Access mode: https://www.bibliofond .
ru/view.aspx?id=863692
85. Office security. Modern solutions [Electronic
resource] / D. A. Polukhina // Director of Security: electronic
scientific journal. Access mode: http://www.sdirector.ru/magazine /
magdocs/view/136.html
86. Information system. Wikipedia [Electronic resource]. Access mode: https://ru.wikipedia.org/wiki / Information_system
87. The role of information security in the modern world
[electronic resource]. Access mode: https://searchinform.ru /
informatsionnayabezopasnost/osnovy-ib/ib-v-rossii-i-mire
88. Means of ensuring information security from
malware [Electronic resource]. Access mode: http://
www.livesafety.ru/content/notes/information_security.php?ELEMENT_
ID=16 79
89. Konyavsky, V.A. Development of means of technical protection of information / V. A. Konyavsky // Complex protection of information.
Collection of materials of the XII International Conference (May 13-16
2008, Yaroslavl (Russia)). M., 2008. pp. 109-113.)
90. Forecast of Orange Business Services and IDC until 2022 [Electronic resource]. Access mode: http://www.tadviser.ru/index.php/
Article:Information Security(Market_Russia)
91. Karl Frederik Rauscher, Russia-USA Bilateral Cybersecurity Project. Fundamentals of Critical
Terminology, 2011– URL:http://www.iisi.msu.ru/UserFiles/File/
Terminology%20IISI%20EWI/Russia-U%20S%20%20bilateral%20
on%20terminology%20RUS.pdf
92. Golubev, V.A. Cyberterrorism – the threat of national security. – http://www.crive-research.ru .
93. Saytarly T. The US experience in the investigation of computer
crimes. – http://www.crime-research.org/news/2000/0
94. Ibragimov, V. Cyberterrorism on the Internet before and after 11
September 2001: threats and neutralization.– http://www.crime-research.
ru/articles/vagif.
95. Vasenin, V.A. Information security and computer terrorism. – http://www . crime-research.ru
96. Grinyaev S. The USA is deploying an information
security system. In Russia, however, the matter does not go further than talking:
independent military review No. 45 (405) http://www.cnews.ru /
security /part3 /rus-edu.shtml.
97. Nye J. S. Jr., Cohen R.O. (ed.)//Transnational relations and world politics. – http://grachev62.narod.ru/tmo/chapt12.
html.
98. Information security / ed. by O. Rytenkov. – Moscow
: GROTEK, 2014. – No. 1. – 68 p. : ill. – Access mode: by subscription. –
URL: https://biblioclub.ru/index.php?page=book&id=230502 . – Text :
electronic.
99. Information security / ed. by O. Rytenkov. – Moscow
: GROTEK, 2014. – No. 3. – 68 p. : ill. – Access mode: by subscription. –
URL: https://biblioclub.ru/index.php?page=book&id=238446 . – Text :
electronic.
100. Information security / ed. by O. Rytenkov. – Moscow
: GROTEK, 2013. – No. 5. – 60 p. : ill. – Access mode: by subscription. –
URL: https://biblioclub.ru/index.php?page=book&id=226268 . – Text :
electronic.
Страница обновлена: 24.01.2023 в 10:57:10