Abstract

The article deals with the problems of information security in modern cyberspace. The problems arising from the use of an open Internet environment by hackers are analyzed, taking into account the introduction of such modern intelligent technologies as “embedded systems”, “smart cities”, “big data”, expert systems and decision-making support systems, as well as intelligent infrastructure management systems. The evolution of the international regulatory framework defining information security principles is considered. Prerequisites for the emergence and implementation of information concepts such as cyberspace and cybersecurity, as well as related concepts, have been analyzed and described in terms of information security. An analysis of the structure of the ISO / IEC 27032: 2012 standard is given, in which the formal definition of the new terminology is presented and the main subjects of information relations responsible for security are identified. Based on the analysis, it was shown that the reasons for the complexity of creating modern information protection systems are the increasing complexity of software and hardware of modern telecommunications systems and a significant expansion of the range of information services provided to users in the Internet environment. It is noted that the emergence of intelligent automation technology requires finding a new set of protection functions and means to ensure its security. The problems in the existing national regulatory framework governing the issues of information security are identified, and the conclusion is drawn on the need to improve it. It justifies the need to search for a new, more advanced protection model and methodology for assessing threats and information security, as well as tools for building protection systems that are adequate to modern threats.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.