Abstract

Introduction. The issue of ensuring state security, including security in the information sphere, is critical in the current conditions for the development of global information space, which is determined by the country’s long-term national interests in protecting interests of society, individuals and state from external and internal information threats. Ensuring state security in information sphere is becoming significantly relevant in connection with the increased number of cyber attacks, cyber espionage, theft of information, disclosure of information constituting state secrets, interference with privacy, etc. Protection of world community and countries from the use of information space by terrorist groups for criminal purposes, the use of information technologies for military or peaceful purposes by influencing mass consciousness are particularly important. The goal of the research is to explore law, political, economic mechanisms, and specifics of the countries’ approaches to ensuring state security in the information space. Materials and methods. The implementation of the research tasks was achieved through the study of official documents, including Doctrine of Information Security of the Russian Federation (2016), Cybersecurity Strategy of the USA (2015), UNGA Resolution No. 55/63 of 4 December 2000 “Combating the Criminal Use of Information Technologies”, Convention Council of Europe on Cybercrime (2001). The research methodology is based on system approach; law and statistical methods. Results. The article analyzes approaches to ensuring security in the global information space - cyber security and information security; contains analysis of world trends in the field of cyber defense, Russian market of information security; comprehensive analysis of the American approach to ensuring cyber security and ensuring system of information security in Russia; threats to Russia’s information security and the USA’s cyber security. Discussions and conclusion. Today threats related to the use of ICT for military-political and military-strategic purposes come from global information space, and in recent years, they have become a powerful destabilizing factor that determines the focus of international relations. This requires the development of a legal framework and an international system for monitoring the global information security.

Highlights

  • The issue of ensuring state security, including security in the information sphere, is critical in the current conditions for the development of global information space, which is determined by the country’s long-term national interests in protecting interests of society, individuals and state from external and internal information threats

  • Ensuring state security in information sphere is becoming significantly relevant in connection with the increased number of cyber attacks, cyber espionage, theft of information, disclosure of information constituting state secrets, interference with privacy, etc

  • The implementation of the research tasks was achieved through the study of official documents, including Doctrine of Information Security of the Russian Federation (2016), Cybersecurity Strategy of the USA (2015), UNGA Resolution No 55/63 of 4 December 2000 “Combating the Criminal Use of Information Technologies”, Convention Council of Europe on Cybercrime (2001)

Read more

Summary

Introduction

The issue of ensuring state security, including security in the information sphere, is critical in the current conditions for the development of global information space, which is determined by the country’s long-term national interests in protecting interests of society, individuals and state from external and internal information threats. Управление: проблемы и перспективы анализ американского подхода к обеспечению кибербезопасности и системы обеспечения информационной безопасности России; рассмотрены угрозы информационной безопасности РФ и кибербезопасности США. Это требует разработки правовой основы и международной системы контроля за обеспечением мировой информационной безопасности.

Objectives
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call