Cyber-attacks as a threat to information security
( Pp. 186-188)

More about authors
Juliet M. Berova Dr.Sci.(Law), Associate professor, professor of the department of special technical training
North Caucasus Institute for Advanced Studies (branch) of the Krasnodar University of the Ministry of Internal Affairs of Russia
Nalchik, Russia
Abstract:
Objective: a new phenomenon for informational security sector of Russia "cyber-attacks" is considered in the article. At present these cyber threats are most common and socially dangerous which necessitates their comprehensive study. Groups of domestic and international experts are engaged in their detailed analysis. Bekhmetiev AE, specialists of Group-IB, EY, etc. should be especially mentioned. In the course of analysis of the available data on modern cyberattacks it is planned to expand the range of forensic knowledge on this issue and develop some recommendations aimed at their harmful consequences prevention and minimization. Model: to write this paper such theoretical methods have been used: analysis, synthesis, study and generalization, induction and deduction, comparison as a method of empirical research, as well as the basic provisions of universal dialectical method. Conclusions: As a result of the research a range of criminalistically significant data on cyberattacks has been formulated and some recommendations aimed at harmful consequences prevention and minimization have been developed. Practical significance: obtained knowledge and conclusions can be used for further research on the indicated theme. The formulated recommendations are practically significant and scientifically grounded which is confirmed by the existing practice and can be used in cyberattacks prevention, as well as for harmful consequences minimization. Originality / value: this article can be useful both for employees of law enforcement agencies subdivisions, fighting against crimes in the sphere of computer information, and for any computer users.
How to Cite:
Juliet M.B., (2018), CYBER-ATTACKS AS A THREAT TO INFORMATION SECURITY. Gaps in Russian Legislation, 2 => 186-188.
Reference list:
Kiberataka - URL: http://www.securitylab.ru/news/ tags/ EA E8 E1 E5 F0 E0 F2 E0 EA E0/ (Data obrashcheniya 5 maya 2017 g.).
Ob utverzhdenii Doktriny informatsionnoy bezopasnosti Rossiyskoy Federatsii: ukaz Prezidenta RF ot 5 dek. 2016 g. №646. - Dostup iz sprav. pravovoy sistemy Konsul tant Plyus .
FSB otsenila ushcherb ot kiberatak v mire.. - URL: http://www.rbc.ru/technology and media/02/02/2017/5892f53b9a7947133199f41 (Data obrashcheniya 1 iyunya 2017 g).
Rossiya zanyala vtoroe mesto po kolichestvu kiberatak. - URL: http://www.itsec.ru/newstext.php news id 117006 (Data obrashcheniya 2 iyunya 2017 g.).
Li Irina. Kogo b yut khakery // RBK. - №100 (2597). - 13 iyunya 2017 g. - URL: http://www.rbc.ru/news-paper/2017/06/13/593a9a749a794766d6b11c54.
Virus atakoval komp yuternye seti po vsemu miru. - URL: https://www.1tv.ru/news/2017/0513/325215 virus atakoval kompyuternye seti po vsemu miru (Data obrashcheniya 3 iyunya 2017 g.).
Dremlyuga R.I. Internet-prestupnost : monogr. - Vladivostok: Izd-vo Dal nevost. un-ta, 2008. - 240 s.
Vvedenskaya O.YU. Provedenie predvaritel noy proverki soobshcheniy ob internet-prestupleniyakh i organizatsiya pervonachal nogo etapa rassledovaniya. - Krasnodar: KrU MVD Rossii, 2016. - 51 s.
Ukaz Prezidenta RF ot 15 yanvarya 2015 goda № 31s O sozdanii gosudarstvennoy sistemy obnaruzheniya, preduprezhdeniya i likvidatsii posledstviy komp yuternykh atak na informatsionnye resursy Rossiyskoy Federatsii - Dostup iz sprav. pravovoy sistemy Konsul tant Plyus .
Vypiska iz Kontseptsii gosudarstvennoy sistemy obnaruzheniya, preduprezhdeniya i likvidatsii posledstviy komp yuternykh atak na informatsionnye resursy Rossiyskoy Federatsii (Kontseptsiya utverzhdena Prezidentom Rossiyskoy Federatsii 12 dekabrya 2014 g. № K 1274) // ofitsial nyy sayt Soveta Bezopasnosti Rossiyskoy Federatsii. - URL: http://www.scrf.gov. ru/documents/6/131.html.
Bekhmet ev A.E. Kiberataki //Administrativnoe pravo. - №1. - 2017. - S. 17.
Keywords:
cyber attacks, information security, cyber threats, viruses.


Related Articles

Computer Science Pages: 11-16 DOI: 10.33693/2313-223X-2025-12-1-11-16 Issue №188734
Implementation of Secure Traffic Light Management Using a Neuromorphic Computing Base Based on Fuzzy Graphs
information security neuromorphic computing neuromorphic controller intelligent controller fuzzy graphs
Show more
11. Criminal law and criminology; Criminal enforcement law Pages: 187-189 Issue №14823
CHILD CONSERVATION AND INFORMATION SECURITY OF CHILDREN
child saving threats information security child legal basis
Show more
CYBERSPACE Pages: 139-142 DOI: 10.33693/2223-0092-2020-10-2-139-142 Issue №16644
Implementation of the law on “sovereign Runet”: Legal and technical aspects
sovereign runet cybersecurity domain Internet services cryptographic protection
Show more
3. CRIMINALISTIC, PROCEDURAL AND OPERATIVE-SEARCH MEASURES TO COUNTER CRIME IN THE GLOBALIZATION CONDITIONS Pages: 123-128 Issue №19590
Improving Tools for Countering Cyber Terrorism in Modern Conditions
cyber terrorism attacks national security information space Internet
Show more
5. CIVIL LAW, BUSINESS LAW, FAMILY LAW; PRIVATE INTERNATIONAL LAW 12.00.03 Pages: 165-171 Issue №17852
Features and prospects of the reform of the Russian legislation in the sphere of digitalization
digitalization information and analytical systems legal regulation personal data protection information security
Show more
6. PUBLIC LAW (STATE LAW) (5.1.2.) Pages: 139-144 Issue №20974
The Concept of Monitoring Threats to Information Security in Organizations of the Fuel and Energy Complex
fuel and energy complex Ministry of Energy of Russia protected information possible channels of information leakage threat monitoring system
Show more
GENERAL THEORETICAL, CRIMINAL-LEGAL AND OTHER PROBLEMS OF COUNTERING EXTREMISM AND TERRORISM. PROBLEMS OF PREVENTING EXTREMISM AND TERRORISM Pages: 156-160 Issue №23752
Ensuring the Security of the Digital Space from Cyberterrorist Threats
cybercrime cyberterrorism malicious computer programs telecommunication technologies information security
Show more
9. Administrative law; Administrative process, Information Law Pages: 116-120 Issue №5518
THE MODEL OF LEGAL REGULATION OF THE ACTIVITY OF MASS MEDIA IN THE СONTEXT OF INFORMATIONAL SECURITY
Legal model the mechanism of legal regulation subsystem system communication Media
Show more
4. CRIMINAL - LEGAL, CRIMINOLOGICAL, ADMINISTRATIVE AND OTHER MEASURES FOR COUNTERING CRIME IN CONTEMPORARY CONDITIONS Pages: 166-170 Issue №19590
Information Support of Services and Units of the MIA of Russia as an Aspect of Effectiveness of Countering Crime
information resource data banks crime prevention operational environment categorized machine-readable medium
Show more
2. SCIENTIFIC SCHOOL OF DOCTOR OF SCIENCE, PROFESSOR ShHAGAPSOEV Z.L. Pages: 139-141 Issue №7907
INFORMATIONAL TERRORISM AS THE RUSSIAN FEDERATION NATIONAL SECURITY THREAT
information terrorism the threat of information national security information security the global information space
Show more