ABOUT SOME METHODS OF INFORMATION SECURITY IN THE WORLD WIDE WEB
( Pp. 146-148)

More about authors
Burayeva Lyudmila A. kandidat fiziko-matematicheskih nauk, podpolkovnik policii, docent kafedry deyatelnosti OVD v osobyh usloviyah
North Caucasus Institute for Advanced Studies (branch) Krasnodar University of the Ministry of Internal Affairs
Nalchik, Russian Federation
Abstract:
The article describes modern methods of information security in the Internet which are relevant today not only for private and corporate interests, but in General to address issues of national security. The author presents the most important trends in the development of information threats in the Internet, the main directions and methods of creation of effective system of information security of computer systems.
How to Cite:
Burayeva L.A., (2017), ABOUT SOME METHODS OF INFORMATION SECURITY IN THE WORLD WIDE WEB. Sociopolitical Sciences, 4 => 146-148.
Reference list:
Akkaeva, KH. A. Nekotorye voprosy sozdaniya sovremennykh informatsionno-poiskovykh sistem registratsii grazhdan // Kriminalistika i sudebno-ekspertnaya deyatel nost v usloviyakh sovremennosti: mat. II Vseros. nauchno-prakt.konferentsii, 2014. - S. 227-232.
Buraeva, L. A. Aktual nye problemy zashchity vychislitel nykh sistem ot poteri informatsii // Novye zadachi tekhnicheskikh nauk i puti ikh resheniya. Sbornik statey mezhdunarodnoy nauchno - prakticheskoy konferentsii, 2016.- S. 33-35.
Buraeva, L. A. O nekotorykh voprosakh obespecheniya kiberbezopasnosti v sovremennykh usloviyakh / L. A. Buraeva // Teoriya i praktika obshchestvennogo razvitiya, 2015. - № 13. - S. 96-99.
Virus za khalatnost : global naya khakerskaya ataka vskryla nedorabotki postradavshikh ot nee. Elektronnyy resurs . URL: https://www.1tv.ru/news/2017-05-13/325221-virus za halatnost globalnaya hakerskaya ataka vskryla nedorabotki postradavshih ot nee (data obrashcheniya: 29.06.2017g.).
Gauzhaeva, V. A. Priznaki terrorizma, formiruyushchie ego ponyatie v normativnykh i nauchnykh istochnikakh // Aktual nye voprosy yuridicheskikh nauk v sovremennykh usloviyakh. Sbornik nauchnykh trudov po itogam mezhdunarodnoy nauchno-prakticheskoy konferentsii. g. Sankt-Peterburg, 2015. - Innovatsionnyy tsentr razvitiya obrazovaniya i nauki - S.69-72.
Kardanov, R. R. Rol sudebno-kriminalisticheskikh ekspertiz v antiterroristicheskoy deyatel nosti // Doklady Adygskoy (CHerkesskoy) Mezhdunarodnoy akademii nauk. 2014. -. № 1. -T. 16. - S. 92-96.
O merakh po obespecheniyu informatsionnoy bezopasnosti Rossiyskoy Federatsii pri ispol zovanii informatsionno-telekommunikatsionnykh setey mezhdunarodnogo informatsionnogo obmena: ukaz Prezidenta RF ot 17 marta 2008g. № 351 (red. ot 22.05.2015) // Sobr. zakonod. RF. - 2008. - № 12.- St. 1110.
O Strategii natsional noy bezopasnosti Rossiyskoy Federatsii: ukaz Prezidenta RF ot 31 dek. 2015g. № 683 // Sobr. zakonod. RF. - 2016. - № 1.- St. 212.
Ob informatsii, informatsionnykh tekhnologiyakh i o zashchite informatsii: feder.zakon ot 27 iyulya 2006g. № 149-FZ // Sobr.zakonod. RF. - 2006.- № 31. - St. 3448.
Ob utverzhdenii Doktriny informatsionnoy bezopasnosti Rossiyskoy Federatsii: ukaz Prezidenta RF ot 05 dek. 2016g. № 646 // Sobr. zakonod. RF. - 2016. - № 50.- St. 7074.
Osnovy gosudarstvennoy politiki Rossiyskoy Federatsii v oblasti mezhdunarodnoy informatsionnoy bezopasnosti na period do 2020 goda: utv. Prezidentom RF 24 iyulya 2013g. № Pr-1753// Pravovaya baza Konsul tantPlyus .
SHogenov, T. M. O nekotorykh voprosakh rasprostraneniya ekstremistskikh materialov s ispol zovaniem seti Internet // Obshchestvo: politika, ekonomika, pravo, 2016.- № 5.- S. 160-162.
SHkhagapsoev, Z. L. Sovremennye kontury sistemy protivodeystviya razlichnym proyavleniyam terrorizma: ucheb.posobie /Z. L. SHkhagapsoev, B. A. Tarchokov.- Nal chik: SKI (f) KrU MVD Rossii, 2012. - 136 s.
Keywords:
information security, the threat of information, national security, the global information space, the Internet, kiberbezopasnosti.


Related Articles

Multiscale Modeling for Information Control and Processing Pages: 11-20 DOI: 10.33693/2313-223X-2022-9-1-11-20 Issue №20643
A Refined Method for Analytical Modeling of the Processes of Spreading Virus Software to Assess the Security of Informatization Objects
virus software Information system Information Security security threat modeling information security risk assessment
Show more
5. Philosophical sciences, Social science Political science Pages: 124-133 Issue №2418
LOOK AT THE DEVELOPMENT OF CIVILISATION FROM PRISMA OF CONSPIROLOGY: DOCTRINE AND REALITY
geopolitics globalization degeneration conspiracy the Institute elected
Show more
7. Criminal procedure Pages: 147-149 Issue №16219
FEATURES OF USING COMPUTER INFORMATION FROM THE INTERNET NETWORK IN THE INVESTIGATION OF CRIMES IN THE RUSSIAN FEDERATION
cybercrime computer information the Internet crime investigation criminal process
Show more
12. CRIME IN THE FIELD OF INFORMATION TECHNOLOGY AND CYBER CRIME Pages: 149-151 Issue №10327
RADICALISM AND ONLINE RECRUITING ON THE INTERNET
radicalism extremism terrorism extremist and terrorist organizations recruitment
Show more
10. Human and civil rights and freedoms, guarantees of their provision Pages: 157-160 Issue №9089
CIVIL-LAW REGULATION OF GOODS AND SERVICES ON THE INTERNET
the Internet right regulation of goods and services on the Internet
Show more
CRIMINAL LAW (5.1.4.) Pages: 193-197 Issue №24238
Analysis of the Experience of Foreign Countries in the Fight Against International Terrorism
international terrorism global threat acts of terrorism ideology of violence subversion
Show more
CRIMINAL - LEGAL, CRIMINOLOGICAL, ADMINISTRATIVE AND OTHER MEASURES FOR COUNTERING CRIME IN CONTEMPORARY CONDITIONS Pages: 206-210 Issue №23752
Protection of Big Data as an Element of the National Security Structure of the State
national security digital security big data cyberspace cybercrime
Show more
8. INFORMATION LAW (12.00.13) Pages: 197-201 Issue №17728
Information terrorism is a threat to national security in the context of digitalization
information terrorism national security information security cybercrime government regulation
Show more
11. Criminal law and criminology; Criminal enforcement law Pages: 187-189 Issue №14823
CHILD CONSERVATION AND INFORMATION SECURITY OF CHILDREN
child saving threats information security child legal basis
Show more
6. Judicial, prosecutorial, human rights and law enforcement activities Pages: 168-171 Issue №13807
ANALYSIS OF INTERACTION BETWEEN DEPARTMENTS OF ROSGUARD AND OTHER LAW ENFORCEMENT BODIES IN THE IMPLEMENTATION OF THE LAW ENFORCEMENT FUNCTION OF THE STATE
law enforcement function of the state interaction departments national security public order protection
Show more