Implementation of the law on “sovereign Runet”: Legal and technical aspects
( Pp. 139-142)
More about authors
Zhukov Azamat Zaurbekovich
Cand.Sci.(Tech.), Senior Lecturer of the Department of Activities of Internal Affairs Bodies in Special Conditions, North Caucasian Institute for Advanced Studies (branch) of the Federal State Educational Institution of Higher Education "Krasnodar University of the Ministry of Internal Affairs of the Russian Federation", Russia, Kabardino-Balkarian Republic, Nalchik
North Caucasus Institute for Advanced Studies (branch) of the Krasnodar University of the Ministry of Internal Affairs of Russia
Nalchik, Russia Shugunov Timur L. kandidat fiziko-matematicheskih nauk, starshiy prepodavatel, kafedra informacionnoy bezopasnosti
Kabardino-Balkarian State University named after H.M.Berbekov
North Caucasus Institute for Advanced Studies (branch) of the Krasnodar University of the Ministry of Internal Affairs of Russia
Nalchik, Russia Shugunov Timur L. kandidat fiziko-matematicheskih nauk, starshiy prepodavatel, kafedra informacionnoy bezopasnosti
Kabardino-Balkarian State University named after H.M.Berbekov
Abstract:
The article discusses the problems of the practical implementation of the law on “sovereign runet”. This bill is an integral element in the formation of a digital economy system. Many countries are actively developing a sustainable and highly effective cyber- security system. The implementation of aggressive policies in a number of countries is one of the reasons for the adoption of this bill andthe creation of a domestic system. However, this bill caused a number of disputes, both in professional and political circles. The relevance of the topic of theoretical research is obvious, since the formation of a digital economy and the creation of a sustainable cybersecurity system is impossible without the creation of domestic information resources.
How to Cite:
Zhukov A.Z., Shugunov T.L., (2020), IMPLEMENTATION OF THE LAW ON “SOVEREIGN RUNET”: LEGAL AND TECHNICAL ASPECTS. Sociopolitical Sciences, 2 => 139-142.
Reference list:
Federal nyy zakon O svyazi ot 07.07.2003 № 126-FZ (poslednyaya redaktsiya).
Federal nyy zakon Ob informatsii, informatsionnykh tekhnologiyakh i o zashchite informatsii ot 27.07.2006 № 149-FZ (poslednyaya redaktsiya).
Federal nyy zakon O bezopasnosti kriticheskoy informatsionnoy infrastruktury Rossiyskoy Federatsii ot 26.07.2017 № 187-FZ.
Obzor: Gosduma prinyala zakon o suverennom Runete: k chemu gotovit sya operatoram svyazi (Konsul tantPlyus, 2019).
Ukaz Prezidenta RF ot 31.12.2015 № 683 O Strategii natsional noy bezopasnosti Rossiyskoy Federatsii .
Strategiya natsional noy kiberbezopasnosti Soedinennykh SHtatov Ameriki. Sentyabr 2018 g.
Federal nyy zakon Ob informatsii, informatsionnykh tekhnologiyakh i o zashchite informatsii ot 27.07.2006 № 149-FZ (poslednyaya redaktsiya).
Federal nyy zakon O bezopasnosti kriticheskoy informatsionnoy infrastruktury Rossiyskoy Federatsii ot 26.07.2017 № 187-FZ.
Obzor: Gosduma prinyala zakon o suverennom Runete: k chemu gotovit sya operatoram svyazi (Konsul tantPlyus, 2019).
Ukaz Prezidenta RF ot 31.12.2015 № 683 O Strategii natsional noy bezopasnosti Rossiyskoy Federatsii .
Strategiya natsional noy kiberbezopasnosti Soedinennykh SHtatov Ameriki. Sentyabr 2018 g.
Keywords:
sovereign runet, cybersecurity, domain, Internet services, cryptographic protection, information security, bill.
Related Articles
Multiscale Modeling for Information Control and Processing Pages: 11-20 DOI: 10.33693/2313-223X-2022-9-1-11-20 Issue №20643
A Refined Method for Analytical Modeling of the Processes of Spreading Virus Software to Assess the Security of Informatization Objects
virus software
Information system
Information Security
security threat modeling
information security risk assessment
Show more
12. OTHER Pages: 197-200 Issue №10472
Due diligence: problems of optimization and application of the legal framework
linguistic security
information security
a multiethnic region
comprehensive examination
extremist texts
Show more
9. Administrative law; Administrative process, Information Law Pages: 116-120 Issue №5518
THE MODEL OF LEGAL REGULATION OF THE ACTIVITY OF MASS MEDIA IN THE СONTEXT OF INFORMATIONAL SECURITY
Legal model
the mechanism of legal regulation
subsystem
system communication
Media
Show more
4. CRIMINAL - LEGAL, CRIMINOLOGICAL, ADMINISTRATIVE AND OTHER MEASURES FOR COUNTERING CRIME IN CONTEMPORARY CONDITIONS Pages: 166-170 Issue №19590
Information Support of Services and Units of the MIA of Russia as an Aspect of Effectiveness of Countering Crime
information resource
data banks
crime prevention
operational environment
categorized machine-readable medium
Show more
2. SCIENTIFIC SCHOOL OF DOCTOR OF SCIENCE, PROFESSOR ShHAGAPSOEV Z.L. Pages: 139-141 Issue №7907
INFORMATIONAL TERRORISM AS THE RUSSIAN FEDERATION NATIONAL SECURITY THREAT
information terrorism
the threat of information
national security
information security
the global information space
Show more
12. CRIME IN THE FIELD OF INFORMATION TECHNOLOGY AND CYBER CRIME Pages: 146-148 Issue №10327
ABOUT SOME METHODS OF INFORMATION SECURITY IN THE WORLD WIDE WEB
information security
the threat of information
national security
the global information space
the Internet
Show more
8. INFORMATION LAW (12.00.13) Pages: 197-201 Issue №17728
Information terrorism is a threat to national security in the context of digitalization
information terrorism
national security
information security
cybercrime
government regulation
Show more
11. Criminal law and criminology; Criminal enforcement law Pages: 187-189 Issue №14823
CHILD CONSERVATION AND INFORMATION SECURITY OF CHILDREN
child saving
threats
information security
child
legal basis
Show more
8. Judicial, prosecutorial, human rights and law enforcement activities Pages: 158-162 Issue №6252
INFORMATION SECURITY OF ADVOCATE’S ACTIVITY: THE MAIN NOTIONS
lawyer
advocacy
information
information security
information security activities of a lawyer
Show more
7. Criminal law, Criminal enforcement law, Criminology Pages: 159-162 Issue №4088
THE USE OF TECHNICAL DEVICES AND INFORMATION TECHNOLOGIES FOR CRIMINAL PURPOSES AS A CIRCUMSTANCE AGGRAVATING THE CRIMINAL LIABILITY
information security
crimes
cynicism
social danger
computer
Show more