Protection of Big Data as an Element of the National Security Structure of the State
( Pp. 206-210)

More about authors
Aripshev Ahmed Mukhamedovich Police Colonel, Cand.Sci.(Econ.), Deputy Head of the Department of Fire Training
North Caucasus Institute for Advanced Studies (branch) of the Krasnodar University of the Ministry of Internal Affairs of Russia
Nalchik, Russia
Abstract:
Abstract: The purpose of this study is to study the sources of threats to the national security of the state from computer criminals. The objects of their encroachment are big data, which stores users' personal information, corporate and government information. In addition, there may always be situations within economic relations, political and social processes that attract criminals and force them to be active.
The objectives of the study are to develop proposals to reduce threats to the national security of the state and to ensure the protection of big data. The encroachment of criminals on big data is carried out to destabilize the work of state authorities, to disorganize the work of information systems. These actions can pose a physical threat to people's lives, create a threat of death, financial losses. Criminals can use the technique to violate public safety, put pressure on public authorities, create a stir and panic among the population.
It has been established that the main methods of combating criminals include the development of an appropriate legislative framework and the creation of authorized bodies that will investigate such crimes. The legislator has already adopted several documents setting priorities, goals and objectives of combating crimes in the field of big data. Despite the work done, the laws governing relations in the virtual space are still at the initial level of development. It is necessary to adapt to the reality in which the growth of technology generates new types of crime.
It is concluded that it will be necessary to solve a number of problems, only then it will be possible to stop the actions of criminals effectively. Today, the problems lie in the fact that many areas, even within the country, are in poor contact with each other. For example, banking and other financial organizations, mobile operators cooperate extremely poorly with law enforcement agencies. There is no common information exchange system. Due to this, criminals can hide the traces of crimes and hide themselves.
How to Cite:
Aripshev A.M. Protection of Big Data as an Element of the National Security Structure of the State // Gaps in Russian Legislation. 2023. Vol. 16. №5. Pp.206-210. (in Russ.). EDN: NGISGB
Reference list:
Anikieva E.N., Degtereva A.A. Internet and cybercrime // Science and Education. 2020. Vol. 3. No. 2. p. 14.
Beskhmelnov M.I., Simakova D.E., Akhonin A.S. Problems of cybercrime development in modern realities // Law and Power. 2019. No. 4. pp. 60-62.
Burkhavetsky I.A., Dolgachev N.O., Reshaev M.A. Protection of personal information in the era of big data // Financial Economics. 2023. No. 1. pp. 11-13.
Polyanskaya D.A. Information security in the national security system of the Russian Federation // In the collection: Actual problems of modern management. Collection of scientific papers based on the materials of the All-Russian Scientific and Practical Conference. Saratov, 2020. pp. 39-43.
Ukraintsev V.B., Lepetikova I.Yu., Vasneva E.V. Information security as an integral part of the national security of the Russian Federation // Science and education: economy and economics; entrepreneurship; law and management. 2020. No. 2 (117). pp. 50-53.
Shcherbakova E.V. Big data: issues of legitimate use // Economy and law. 2019. No. 9 (512). pp. 90-96.
Yakhyaeva M.I. Information security as an integral part of the national security of the Russian Federation // State Service and personnel. 2020. No. 2. pp. 42-44.
Keywords:
national security, digital security, big data, cyberspace, cybercrime, malicious software..


Related Articles

Pages: 10-14 DOI: 10.33693/2782-7372-2023-2-1-10-14 Issue №22977
Features of Russia’s Criminal Policy in the Context of Digitalization of Modern Society
criminal law criminal offenses scientific and technological progress cybercrime
Show more
5. Constitutional law; Constitutional judicial process; Municipal law Pages: 138-140 Issue №11287
INTERNATIONAL CYBERTERRORISM AS A POLITICAL PHENOMENON
cyberterrorism international terrorism cybercrime political tensions cyber attack
Show more
9. CRIMINAL LAW AND CRIMINOLOGY; CRIMINAL ENFORCEMENT LAW 12.00.08 Pages: 198-201 Issue №18348
Trends in cybercrime in the global information space
global network digitalization cybercrime information technology security
Show more
7. Criminal procedure Pages: 147-149 Issue №16219
FEATURES OF USING COMPUTER INFORMATION FROM THE INTERNET NETWORK IN THE INVESTIGATION OF CRIMES IN THE RUSSIAN FEDERATION
cybercrime computer information the Internet crime investigation criminal process
Show more
CRIMINAL LAW (5.1.4.) Pages: 193-197 Issue №24238
Analysis of the Experience of Foreign Countries in the Fight Against International Terrorism
international terrorism global threat acts of terrorism ideology of violence subversion
Show more
8. INFORMATION LAW (12.00.13) Pages: 197-201 Issue №17728
Information terrorism is a threat to national security in the context of digitalization
information terrorism national security information security cybercrime government regulation
Show more
5. Constitutional law; Constitutional judicial process; Municipal law Pages: 135-137 Issue №11287
CYBER CRIMES: CONCEPT, CONTENTS AND COUNTERMEASURES
cybercrime cybercrime innovative technologies
Show more
5. Philosophical sciences, Social science Political science Pages: 124-133 Issue №2418
LOOK AT THE DEVELOPMENT OF CIVILISATION FROM PRISMA OF CONSPIROLOGY: DOCTRINE AND REALITY
geopolitics globalization degeneration conspiracy the Institute elected
Show more
CRIMINAL LAW (5.1.4.) Pages: 198-202 Issue №24238
Comparative Analysis of Russian and International Legislative Regulation of Cyberterrorist Crimes
information space information technologies cyberspace cyberterrorism cybercrime
Show more
CRIMINAL LAW (5.1.4.) Pages: 203-207 Issue №24238
Modern Technologies of Youth Involvement in Extremist Activity: Problems and Ways of Counteraction
extremist groups destructive ideology cyberspace youth involvement cyber extremism
Show more