The Concept of Monitoring Threats to Information Security in Organizations of the Fuel and Energy Complex
( Pp. 139-144)
Abstract:
The article substantiates the need and formulates the basic principles of an information security monitoring system that allows analyzing threats to information security in organizations of the fuel and energy complex (FEC) in order to quickly identify violations in the information sphere, assess, predict and issue recommendations for preventing threats at an early stage. their occurrence. The development and implementation of the system will make it possible to monitor: the overall economic situation in terms of financial stability and competitiveness of technological potential, security of the organization's personnel, its property and capital, legal protection of rights and legitimate interests; the emergence of external and internal threats to organizations of the fuel and energy complex in connection with the use of protected information in economic activities; the aspirations of foreign intelligence agencies and competitors to identify the distinctive features of the projects being developed and promote the product to the market using competitive intelligence methods and illegal methods of industrial espionage; the state of the legal regime of information protection established in the organization and the effectiveness of the measures taken to ensure it.
How to Cite:
Severin V.A., (2022), THE CONCEPT OF MONITORING THREATS TO INFORMATION SECURITY IN ORGANIZATIONS OF THE FUEL AND ENERGY COMPLEX. Gaps in Russian Legislation, 3 => 139-144.
Reference list:
Anton Semeikin:. “It is possible to ensure the proper level of information security only in a dialogue between regulatory authorities, industry regulators and business” | Ministry of Energy https://minenergo.gov.ru/node/22433.
Information security in the energy industry: expert opinions, SecureNews editors, https://securenews.ru/energy_facilities/.
Sakhabetdinov I.U. Tasks of complex monitoring in automated systems of dispatching control of power facilities // Bulletin of BSU. Mathematics, computer science. 2012. No. 9. URL: https://cyberleninka.ru/article/n/zadachi-kompleksnogo-monitoringa-v-avtomatizirovannyh-sistemah-dispetcherskogo-upravleniya-energeticheskimi-obektami.
Severin, Vitaly Andreevich. Legal regulation and ensuring the protection of commercial secrets in Russia: Abstract of the thesis. ... Doctor of Law: 12.00.03 / Severin Vitaly Andreevich; [Place of protection: Mosk. state un-t im. M.V. Lomonosov]. - Moscow, 2007. - 42 p. https://search.rsl.ru/ru/record/01003060305; https://new-disser.ru/_avtoreferats/01003398119.pdf.
Teksler A.L. DIGITALIZATION OF ENERGY: FROM PROCESS AUTOMATION TO DIGITAL TRANSFORMATION OF THE INDUSTRY // EP. 2018. No. 5. URL: https://cyberleninka.ru/article/n/tsifrovizatsiya-energetiki-ot-avtomatizatsii-protsessov-k-tsifrovoy-transformatsii-otrasli.
Information security in the energy industry: expert opinions, SecureNews editors, https://securenews.ru/energy_facilities/.
Sakhabetdinov I.U. Tasks of complex monitoring in automated systems of dispatching control of power facilities // Bulletin of BSU. Mathematics, computer science. 2012. No. 9. URL: https://cyberleninka.ru/article/n/zadachi-kompleksnogo-monitoringa-v-avtomatizirovannyh-sistemah-dispetcherskogo-upravleniya-energeticheskimi-obektami.
Severin, Vitaly Andreevich. Legal regulation and ensuring the protection of commercial secrets in Russia: Abstract of the thesis. ... Doctor of Law: 12.00.03 / Severin Vitaly Andreevich; [Place of protection: Mosk. state un-t im. M.V. Lomonosov]. - Moscow, 2007. - 42 p. https://search.rsl.ru/ru/record/01003060305; https://new-disser.ru/_avtoreferats/01003398119.pdf.
Teksler A.L. DIGITALIZATION OF ENERGY: FROM PROCESS AUTOMATION TO DIGITAL TRANSFORMATION OF THE INDUSTRY // EP. 2018. No. 5. URL: https://cyberleninka.ru/article/n/tsifrovizatsiya-energetiki-ot-avtomatizatsii-protsessov-k-tsifrovoy-transformatsii-otrasli.
Keywords:
fuel and energy complex, Ministry of Energy of Russia, protected information, possible channels of information leakage, threat monitoring system, information security.
Related Articles
Multiscale Modeling for Information Control and Processing Pages: 11-20 DOI: 10.33693/2313-223X-2022-9-1-11-20 Issue №20643
A Refined Method for Analytical Modeling of the Processes of Spreading Virus Software to Assess the Security of Informatization Objects
virus software
Information system
Information Security
security threat modeling
information security risk assessment
Show more
7. Criminal law, Criminal enforcement law, Criminology Pages: 159-162 Issue №4088
THE USE OF TECHNICAL DEVICES AND INFORMATION TECHNOLOGIES FOR CRIMINAL PURPOSES AS A CIRCUMSTANCE AGGRAVATING THE CRIMINAL LIABILITY
information security
crimes
cynicism
social danger
computer
Show more
GENERAL THEORETICAL, CRIMINAL-LEGAL AND OTHER PROBLEMS OF COUNTERING EXTREMISM AND TERRORISM. PROBLEMS OF PREVENTING EXTREMISM AND TERRORISM Pages: 156-160 Issue №23752
Ensuring the Security of the Digital Space from Cyberterrorist Threats
cybercrime
cyberterrorism
malicious computer programs
telecommunication technologies
information security
Show more
9. Administrative law; Administrative process, Information Law Pages: 116-120 Issue №5518
THE MODEL OF LEGAL REGULATION OF THE ACTIVITY OF MASS MEDIA IN THE СONTEXT OF INFORMATIONAL SECURITY
Legal model
the mechanism of legal regulation
subsystem
system communication
Media
Show more
4. CRIMINAL - LEGAL, CRIMINOLOGICAL, ADMINISTRATIVE AND OTHER MEASURES FOR COUNTERING CRIME IN CONTEMPORARY CONDITIONS Pages: 166-170 Issue №19590
Information Support of Services and Units of the MIA of Russia as an Aspect of Effectiveness of Countering Crime
information resource
data banks
crime prevention
operational environment
categorized machine-readable medium
Show more
2. SCIENTIFIC SCHOOL OF DOCTOR OF SCIENCE, PROFESSOR ShHAGAPSOEV Z.L. Pages: 139-141 Issue №7907
INFORMATIONAL TERRORISM AS THE RUSSIAN FEDERATION NATIONAL SECURITY THREAT
information terrorism
the threat of information
national security
information security
the global information space
Show more
12. CRIME IN THE FIELD OF INFORMATION TECHNOLOGY AND CYBER CRIME Pages: 146-148 Issue №10327
ABOUT SOME METHODS OF INFORMATION SECURITY IN THE WORLD WIDE WEB
information security
the threat of information
national security
the global information space
the Internet
Show more
8. INFORMATION LAW (12.00.13) Pages: 197-201 Issue №17728
Information terrorism is a threat to national security in the context of digitalization
information terrorism
national security
information security
cybercrime
government regulation
Show more
11. Criminal law and criminology; Criminal enforcement law Pages: 187-189 Issue №14823
CHILD CONSERVATION AND INFORMATION SECURITY OF CHILDREN
child saving
threats
information security
child
legal basis
Show more
11. CRIMINAL LAW AND CRIMINOLOGY Pages: 146-149 Issue №9525
THE SOCIALLY DANGEROUS CONSEQUENCES OF ENCROACHMENTS ON THE OBJECTS OF THE FUEL AND ENERGY COMPLEX (FEC)
fuel and energy complex
TEK
public-dangerous consequences
the seizure of the oil
cutting the pipes
Show more