Abstract

The purpose of this article is to analyze the main risks of information security in Russia in the new millennium and the effectiveness of information security programs in the Russian Federation. The object of the study is the information security system of the Russian Federation. The article identified the main risks of information security in Russia, such as cybercrime, violations of the rules for processing personal data, leaks of confidential information, and others. The authors analyzed the distribution of the listed types of threats to information security of Rostelecom's client companies for 2022. Attention is focused on the fact that a low culture of information security among military personnel and personnel working at the facilities of the Armed Forces can lead to vulnerabilities and risks of data leakage of important strategic facilities. The programs for ensuring information security of the Russian Federation were considered, including the Federal Target Program "Information Russia", the Federal Law "On the Protection of Personal Data" and others. The authors identified the main goals and indicators of such national programs. An analysis of the effectiveness of the information security system of the Russian Federation is carried out and a forecast of its development is presented. State programs aimed at developing the digital economy, protecting critical information infrastructure, developing mechanisms to combat cyber threats, as well as creating modern technologies for the Russian Armed Forces and cryptography are the key areas of Russia's work in this area. The authors also analyzed the forecast for the development of the Russian cybersecurity market, as well as the global forecast for the development of information security technologies. It is concluded that despite the measures taken by the Russian Federation to ensure information security, the system is still vulnerable to new threats. recommendations were developed to improve the current information security system in the Russian Federation.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call