Дипломная работа|Информационная безопасность

Инструменты политики информационной безопасности России и НАТО

Работа на английском языке
Уточняйте оригинальность работы ДО покупки, пишите нам на topwork2424@gmail.com

Авторство: bugalter

Год: 2018 | Страниц: 60

Цена: 2 000
Купить работу

Introduction                                                                                                     

Chapter 1: Theoretical Aspects of the Concept of Information Security in World Politics

1.1 Information security of the state as an object of information warfare                  

1.1.1 The concept and essence of information security of the state                          

1.1.2 Information security in information warfare                                                 

1.2 Conceptual frameworks and approaches to ensure information security of the state   

1.2.1 Features of the Strategy for Information Security of the State                         

1.2.2 Choice of information security strategy for the state                                      

1.2.3 Ideological foundations of information security                                            

Chapter 2: An Analysis of Information Security Policy Instruments in Russia and NATO       

2.1 The Institutional System of Information Security in the Russian Federation        

2.1.1 Russian Federation Information Security Doctrine                                        

2.1.2 Organization of the Information Security System of the Russian Federation     

2.1.3 Information Policy in the Information Security System of the Russian Federation  

2.1.4 Role of the RF special services in the information security system                  

2.2 Specifics of the Information Security Policy of the Russian Federation               

2.2.1 Legislative regulatory framework for the information security policy of the Russian Federation

2.2.2 Conceptual aspects of implementing Russia's information security policy        

Chapter 3: Analyzing NATO’s Information Security Policy Toolkit                        

3.1 The information security system in the NATO bloc. The cyber aspect                

3.2 The complex nature of information security in the NATO bloc                          

3.3 Features of information security policies of some NATO countries                    

3.4 Socio-psychological Aspects of Implementing NATO Information Policy          

Chapter 4. Comparative analysis of information security policy of Russia and NATO

Conclusion                                                                                                      

List of References                                                                                             

The dialectical approach, enhanced by modern inductive and deductive means, can be useful for investigating factual legal material by inductively proposing certain hypotheses (in particular forming definitions of concepts, making certain theoretical generalisations) and verifying their truth by deductive reasoning and proof. Such inductively derived and deductively substantiated theoretical statements (permanent relations, relations and properties of legal phenomena) can be used to explain and predict new facts, as a new basis for further theoretical generalisation, and already then its substantiation and proof.

This method is actively used in the study presented in Chapter 1: the origin of the main concepts forming the system concept of the state mechanism for ensuring information security is considered precisely from the perspective of the dialectical approach.

The methodological basis for the analysis of information security mechanism can be taken from such categories of dialectics as possibility and reality, form and content, essence and phenomenon, space and time, whole and part, etc.

It is also possible to use the laws of dialectics: about the unity and struggle of contradictions; about the transition of quantitative changes into qualitative ones, etc. In this paper, the national system of information security and its supporting mechanism are considered in the structural aspect, as a single system.

It is worth paying attention to the historical-legal method of knowledge. The main problem, which the historical-legal comparative method is aimed at solving, is to obtain new knowledge by making comparisons of historical-legal sources. As we can see, this requires three components:

Since the issue of information security mechanism was topical back in the Soviet times, although today their research has intensified, taking into account historical aspects is crucial to determine the directions of further development and optimization of information security mechanisms.

Equally important is the comparative legal method. Comparativism involves the study of state-legal objects which are compared and existed in the past or are operating in the present time. For comparison, commensurate norms and provisions, complex components at the level of legal phenomena, institutions and processes can be chosen,

Comparisons are made between entities within a state, between countries belonging to homogeneous legal families and between legal systems of different legal families. Using this method will make it possible not only to compare individual aspects of information provision within a country (e.g. in different areas) but also to compare information provision mechanisms in our country and in other countries. In this context the evaluation of information assurance mechanisms in European countries is of special importance.

Thus, the comparative method in the study of information support mechanisms is understood as a process of reflecting and fixing relations of identity and opposites in issues of legal regulation of information support, in particular at the level of different countries.

The synergetic approach is also gaining in importance. Synergetics is an interdisciplinary field that emerged in the 1970s with the aim of discovering the general laws and principles that underlie self-organization in nature and its various components: in physics, chemistry, biology, engineering, and society. Synergetics offers a qualitatively different picture of the world than the one based on classical science and associated with the names of Newton and Einstein, i.e. science based not only on Newton's classical theory of mechanics and the quantum-relativistic concept of Bohr, Einstein, which is also called non-classical. There is a rejection of the view of the world based on elementary particles - the bricks of matter - in favour of a picture of the world as a set of non-linear processes. There are fundamental principles inherent in synergetics:

1) two structural principles of being: homeostatic; hierarchical;

2) five principles of becoming: non-linearity; instability; openness; dynamic hierarchy; observability. Applying these approaches to the consideration of the information support mechanism will allow us to look at it from the perspective of self-organisation.

 

Chapter 1: Theoretical Aspects of the Concept of Information Security in World Politics

1.1 Information security of the state as an object of information warfare

1.1.1 The concept and essence of information security of the state

In today's information environment of the XXI century. information security is playing an increasingly important role, and the issue of ensuring it is becoming more and more acute. The rapid introduction of information and computer technology in all spheres of society and the development of the economy actualizes the issue of determining reasonable and effective ways to ensure information security.

To date, there are many approaches to the definition of the term "information". For example:

- Information is documented or public information about events and phenomena occurring in society, the state and the environment (Keating & Schmitt, 2020);

- Information is the result of the reflection and processing in the human mind of the diversity of the surrounding world, information about the objects surrounding humans, natural phenomena, the activities of others, etc. (Mohajan,, 2018).

Comprehensive processes of informatization of the society of the states of the world and wide implementation of information technologies (as characteristic features of the current century), their influence on all spheres of development of these states, bring to the forefront the issues of ensuring information security. The stability of the socio-economic situation of a state, preservation of law and order and ensuring the rights of its citizens depend on a well-balanced information security policy and on the degree of protection and reliability of information in the modern world.

Let's analyze information security terminology. The basic definitions of the essence of information security, as a rule, are enshrined in the regulatory legal framework. In Russia, information security is considered both from an engineering point of view (Federal Law No. 149-FZ "On Information, Information Technologies and Information Protection" dated 27 July 2006; Federal Law No. 187-FZ dated 26 July 2017 "On Security of Critical Information Infrastructure of the Russian Federation"; Presidential Decree No. 170 dated 20 January 1994 "On the Basis of State Policy in the Field of Information"; Presidential Decree No. 620 dated 22.12.2017 "On Improving the State System of Detection, Prevention and Elimination The latter document is the most comprehensive and comprehensive approach to information security as a component of the system for ensuring the vital interests of the Russian Federation). In the first case, information security is a completely technical concept; in the second case, it is a systemic one that aims to preserve the inviolability of the foundations of statehood as well as morality and self-consciousness in society.

In general, information security can be considered as a state of protection of the vital interests of the individual, society and the state, in which harm is prevented through purposeful or unintentional information influence, information technology, violation of the integrity of stored information and introduction of distorted and manipulative information.

Thus, the main object is information (own, which is protected and external, which is malicious). This is visualised in Figure 1.1. In our view, the two-way vector of information security presented is a unified system because the technical (engineering) and socio-political understanding of information security are now closely interlinked: in the digital age, borders and distances are erasing and such capabilities not only offer certain advantages, but also carry explicit and implicit risks.

Primary Sources/Policy Documents

  1. "Fundamentals of the state policy of the Russian Federation in the field of international information security for the period up to 2020". (approved by the President of the Russian Federation on 24.07.2013 N Pr-1753)
  2. "The Constitution of the Russian Federation. (adopted by popular vote on 12.12.1993) (as amended by the RF Laws on Amendments to the RF Constitution dated 30.12.2008 N 6-FKZ, dated 30.12.2008 N 7-FKZ, dated 05.02.2014 N 2-FKZ, dated 21.07.2014 N 11-FKZ)
  3. Civil Code of the Russian Federation (Part One), 30.11.1994 N 51-FZ
  4. Decree of the Government of the Russian Federation from 13.08.1997 N 1009 (ed. from 31.10.2018) "On approval of the Rules of preparation of normative legal acts of federal executive authorities and their state registration"
  5. Decree of the Government of the Russian Federation from 16.03.2009 N 228 (ed. from 25.09.2018) "On the Federal Service for Supervision of Communications, Information Technology and Mass Communications" (together with "Regulations on the Federal Service for Supervision of Communications, Information Technology and Mass Communications")
  6. Decree of the Government of the Russian Federation of 02.06.2008 N 418 (revised on 25.09.2018) "On the Ministry of Digital Development, Communications and Mass Media of the Russian Federation"
  7. Decree of the Government of the Russian Federation of 03.06.2019 N 1189-r <On approval of the Concept of creation and functioning of the national data management system and action plan ("road map") on creation of the national data management system for 2019 - 2021>
  8. Decree of the President of the Russian Federation from 23.05.1996 N 763 (ed. from 29.05.2017) "On the procedure for publication and entry into force of acts of the President of the Russian Federation, the Government of the Russian Federation and normative legal acts of federal executive bodies"
  9. Decree of the President of the Russian Federation of 05.12.2016 N 646 "On Approval of the Doctrine of Information Security of the Russian Federation".
  10. Decree of the President of the Russian Federation of 05.12.2016 N 646 "On Approval of the Information Security Doctrine of the Russian Federation"
  11. Decree of the President of the Russian Federation of 09.05.2017 N 203 "On the Strategy for Development of Information Society in the Russian Federation for 2017 - 2030"
  12. Decree of the President of the Russian Federation of 31.12.2015 N 683 "On the National Security Strategy of the Russian Federation"
  13. Doctrine of Information Security of the Russian Federation: Approved by the President of the Russian Federation of 9.09.2000 // Rossiyskaya Gazeta. - 2000.
  14. Extract from the Main directions of scientific research in the field of ensuring information security of the Russian Federation (approved by the Secretary of the Security Council of the Russian Federation N.P. Patrushev on 31 August 2017)
  15. Federal Law dated 03.04.1995 N 40-FZ (ed. dated 07.03.2018) "On the Federal Security Service
  16. Federal law of 14.06.1994 N 5-FZ (ed. from 01.07.2017) "On the procedure for publication and entry into force of federal constitutional laws, federal laws, acts of the chambers of the Federal Assembly"
  17. Federal Law of 27.07.2006 N 149-FZ (as amended on 19.07.2018) On Information, Information Technology and Information Protection
  18. MC 0402/2 (Final), NATO Military Policy on Psychological Operations, 3 Oct.
  19. MC 0411/2 (Final), NATO Military Policy on Civil-Military Cooperation (CIMIC) and Civil-Military Interaction (CMI), 12 May 14.
  20. MC 0457/2 (Final), NATO Military Policy on Public Affairs, 8 Feb. 11.
  21. MC 0628 (Final), NATO Military Policy on Strategic Communications, 26 Jul 17.

Всего 61 источник литературы

Эта работа не подходит?

Если данная работа вам не подошла, вы можете заказать помощь у наших экспертов.
Оформите заказ и узнайте стоимость помощи по вашей работе в ближайшее время! Это бесплатно!


Заказать помощь

Похожие работы

Дипломная работа Информационная безопасность
2012 год 79 стр.
Диплом Обеспечение информационной безопасности и защиты информации предприятия
diplomstud
Дипломная работа Информационная безопасность
2014 год 89 стр.
Диплом Стеганографические алгоритмы защиты информации
diplomstud
Дипломная работа Информационная безопасность
2016 год 24 стр.
Дипломная Иерархия сетей в Интернет. Протоколы, адресация и маршрутизация
Alcofribas
Дипломная работа Информационная безопасность
2016 год 24 стр.
Дипломная Проблемы обеспечения информационной безопасности
Alcofribas
Дипломная работа Информационная безопасность
2013 год 102 стр.
Диплом Информационная безопасность в финансовых системах
antiplagiatpro

Дипломная работа

от 2900 руб. / от 3 дней

Курсовая работа

от 690 руб. / от 2 дней

Контрольная работа

от 200 руб. / от 3 часов

Оформите заказ, и эксперты начнут откликаться уже через 10 минут!

Узнай стоимость помощи по твоей работе! Бесплатно!

Укажите дату, когда нужно получить выполненный заказ, время московское