Introduction
Chapter 1: Theoretical Aspects of the Concept of Information Security in World Politics
1.1 Information security of the state as an object of information warfare
1.1.1 The concept and essence of information security of the state
1.1.2 Information security in information warfare
1.2 Conceptual frameworks and approaches to ensure information security of the state
1.2.1 Features of the Strategy for Information Security of the State
1.2.2 Choice of information security strategy for the state
1.2.3 Ideological foundations of information security
Chapter 2: An Analysis of Information Security Policy Instruments in Russia and NATO
2.1 The Institutional System of Information Security in the Russian Federation
2.1.1 Russian Federation Information Security Doctrine
2.1.2 Organization of the Information Security System of the Russian Federation
2.1.3 Information Policy in the Information Security System of the Russian Federation
2.1.4 Role of the RF special services in the information security system
2.2 Specifics of the Information Security Policy of the Russian Federation
2.2.1 Legislative regulatory framework for the information security policy of the Russian Federation
2.2.2 Conceptual aspects of implementing Russia's information security policy
Chapter 3: Analyzing NATO’s Information Security Policy Toolkit
3.1 The information security system in the NATO bloc. The cyber aspect
3.2 The complex nature of information security in the NATO bloc
3.3 Features of information security policies of some NATO countries
3.4 Socio-psychological Aspects of Implementing NATO Information Policy
Chapter 4. Comparative analysis of information security policy of Russia and NATO
Conclusion
List of References
The dialectical approach, enhanced by modern inductive and deductive means, can be useful for investigating factual legal material by inductively proposing certain hypotheses (in particular forming definitions of concepts, making certain theoretical generalisations) and verifying their truth by deductive reasoning and proof. Such inductively derived and deductively substantiated theoretical statements (permanent relations, relations and properties of legal phenomena) can be used to explain and predict new facts, as a new basis for further theoretical generalisation, and already then its substantiation and proof.
This method is actively used in the study presented in Chapter 1: the origin of the main concepts forming the system concept of the state mechanism for ensuring information security is considered precisely from the perspective of the dialectical approach.
The methodological basis for the analysis of information security mechanism can be taken from such categories of dialectics as possibility and reality, form and content, essence and phenomenon, space and time, whole and part, etc.
It is also possible to use the laws of dialectics: about the unity and struggle of contradictions; about the transition of quantitative changes into qualitative ones, etc. In this paper, the national system of information security and its supporting mechanism are considered in the structural aspect, as a single system.
It is worth paying attention to the historical-legal method of knowledge. The main problem, which the historical-legal comparative method is aimed at solving, is to obtain new knowledge by making comparisons of historical-legal sources. As we can see, this requires three components:
Since the issue of information security mechanism was topical back in the Soviet times, although today their research has intensified, taking into account historical aspects is crucial to determine the directions of further development and optimization of information security mechanisms.
Equally important is the comparative legal method. Comparativism involves the study of state-legal objects which are compared and existed in the past or are operating in the present time. For comparison, commensurate norms and provisions, complex components at the level of legal phenomena, institutions and processes can be chosen,
Comparisons are made between entities within a state, between countries belonging to homogeneous legal families and between legal systems of different legal families. Using this method will make it possible not only to compare individual aspects of information provision within a country (e.g. in different areas) but also to compare information provision mechanisms in our country and in other countries. In this context the evaluation of information assurance mechanisms in European countries is of special importance.
Thus, the comparative method in the study of information support mechanisms is understood as a process of reflecting and fixing relations of identity and opposites in issues of legal regulation of information support, in particular at the level of different countries.
The synergetic approach is also gaining in importance. Synergetics is an interdisciplinary field that emerged in the 1970s with the aim of discovering the general laws and principles that underlie self-organization in nature and its various components: in physics, chemistry, biology, engineering, and society. Synergetics offers a qualitatively different picture of the world than the one based on classical science and associated with the names of Newton and Einstein, i.e. science based not only on Newton's classical theory of mechanics and the quantum-relativistic concept of Bohr, Einstein, which is also called non-classical. There is a rejection of the view of the world based on elementary particles - the bricks of matter - in favour of a picture of the world as a set of non-linear processes. There are fundamental principles inherent in synergetics:
1) two structural principles of being: homeostatic; hierarchical;
2) five principles of becoming: non-linearity; instability; openness; dynamic hierarchy; observability. Applying these approaches to the consideration of the information support mechanism will allow us to look at it from the perspective of self-organisation.
Chapter 1: Theoretical Aspects of the Concept of Information Security in World Politics
1.1 Information security of the state as an object of information warfare
1.1.1 The concept and essence of information security of the state
In today's information environment of the XXI century. information security is playing an increasingly important role, and the issue of ensuring it is becoming more and more acute. The rapid introduction of information and computer technology in all spheres of society and the development of the economy actualizes the issue of determining reasonable and effective ways to ensure information security.
To date, there are many approaches to the definition of the term "information". For example:
- Information is documented or public information about events and phenomena occurring in society, the state and the environment (Keating & Schmitt, 2020);
- Information is the result of the reflection and processing in the human mind of the diversity of the surrounding world, information about the objects surrounding humans, natural phenomena, the activities of others, etc. (Mohajan,, 2018).
Comprehensive processes of informatization of the society of the states of the world and wide implementation of information technologies (as characteristic features of the current century), their influence on all spheres of development of these states, bring to the forefront the issues of ensuring information security. The stability of the socio-economic situation of a state, preservation of law and order and ensuring the rights of its citizens depend on a well-balanced information security policy and on the degree of protection and reliability of information in the modern world.
Let's analyze information security terminology. The basic definitions of the essence of information security, as a rule, are enshrined in the regulatory legal framework. In Russia, information security is considered both from an engineering point of view (Federal Law No. 149-FZ "On Information, Information Technologies and Information Protection" dated 27 July 2006; Federal Law No. 187-FZ dated 26 July 2017 "On Security of Critical Information Infrastructure of the Russian Federation"; Presidential Decree No. 170 dated 20 January 1994 "On the Basis of State Policy in the Field of Information"; Presidential Decree No. 620 dated 22.12.2017 "On Improving the State System of Detection, Prevention and Elimination The latter document is the most comprehensive and comprehensive approach to information security as a component of the system for ensuring the vital interests of the Russian Federation). In the first case, information security is a completely technical concept; in the second case, it is a systemic one that aims to preserve the inviolability of the foundations of statehood as well as morality and self-consciousness in society.
In general, information security can be considered as a state of protection of the vital interests of the individual, society and the state, in which harm is prevented through purposeful or unintentional information influence, information technology, violation of the integrity of stored information and introduction of distorted and manipulative information.
Thus, the main object is information (own, which is protected and external, which is malicious). This is visualised in Figure 1.1. In our view, the two-way vector of information security presented is a unified system because the technical (engineering) and socio-political understanding of information security are now closely interlinked: in the digital age, borders and distances are erasing and such capabilities not only offer certain advantages, but also carry explicit and implicit risks.