Abstract

The purpose of the article was to propose a classification of types of information security from the analysis of theoretical sources and legislative practice. The article substantiates that information security as a scientific legal definition can be considered in two aspects: broad and narrow. In a broad aspect, information security is a set of legal acts, bodies authorized by them, organization and practice of the latter, the combination of which generates a mechanism for ensuring and protecting the information rights and interests of a person, social groups, civil society institutions, subjects of economic relations, public authorities. and military formations. In a narrow aspect, information security is the state of maximum protection of a person, society and the state from information threats. Arguments are given that, in a broad aspect, information security can be classified: a) by the source of origin of the authority to implement measures to ensure information security (natural human rights and freedoms, the Constitution of Ukraine, laws of Ukraine, by-laws); b) by types of entities providing information security (individual and citizen, civil society institutions, state authorities, local governments, military formations, enterprises, institutions and organizations of all forms of ownership); c) according to the degree of obligation to implement measures to ensure information security: the main one (for specially authorized public authorities and military formations); optional (for other public authorities); delegated (for enterprises, institutions and organizations to which the authority to implement information security measures is delegated by the relevant legal acts; optional (for citizens and civil society entities). The article substantiates that in a narrow aspect, information security includes the following types: a) according to the criterion of subjects covered by information security measures (information security of a person, corporations, civil society and the state); b) according to the criterion of information threats (political information security, military information security, economic information security, environmental information security, etc.); c) according to the criterion of achieved results (perfect and imperfect information security).

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.