The modern concept of information security, goals and conceptual framework for information protection. The main objectives, Information security concept. priority development of modern telecommunication technologies The concept of information security of the organization. and possibilities of organizational and technical methods and modern device. Information security state, the State of preservation of the information resources of the State and protection of the legitimate rights of the individual and society in the field of information. In modern society the information An important aspect of information security, The modern concept of information warfare in the United States. legal regulation of information security in the United States. Modern concept of security and the characteristic means of ensuring information security. View of corporate security in recent years. The modern concept of information security management. The concept of information safety of children as a threat. the role of psychologists in shaping perceptions of modern humans.
Security mechanism of the crucial role belongs to the State and its organs. State, as a single political organization of society, which extended its authority throughout the country and its population, has the highest social purpose is to guarantee a normal, safe life of society. The modern theory of the State treats the entity state as "provision of using the apparatus of political power, cohesion and its proper functioning in a situation where society exists as a sovereign, independent mechanism and when it argues democracy.
National security-is a systematic activity of State bodies, public institutions and individual citizens aimed at reliable protection of the national interests from external and internal threats and effective opposition to them. Ensuring the security of individuals, society and the State is achieved by the State Office of the national security system. The main areas of State activity in the field of information security are: the restriction of access to information as an exception to the general principle of openness of information, and is carried out only on the basis of legislation; the responsibility for safety, classification and declassification of information, to access any information, as well as access restrictions are specified by law rules.
Accordingly, under the information security system shall be understood as the totality of subordinate the common goal of national informational interests and interconnected public authorities, State, public and other organizations and associations of citizens participating in ensuring information security in accordance with the law, as well as conceptual and normative legal acts, regulating relations in the sphere of security.
The main areas of State activity in the field of information security are: the restriction of access to information as an exception to the general principle of openness of information, and is carried out only on the basis of legislation; the responsibility for safety, classification and declassification of information, to access any information, as well as access restrictions are specified by law rules.
International information security is interpreted primarily depending on the nature of the threats. Traditionally distinguished "triad threats to international information security is the use of ICT for terrorist, criminal and military-political purposes (under the military and political objectives refers to the use of ICT in inter-State conflict). In particular, such an approach to the definition of threats was enshrined in a number of resolutions of the UN GENERAL ASSEMBLY, dealing with information security.
Each region is characterized by its mechanisms. Key business processes are related to administration, authentication, access control, etc. can be centralized administration model or distributed, can use the "external" or vice versa. Organization chart users, information architecture, including document flows, the location of the data stores, channels, which broadcast information technology architecture, physical topology, logical Active Directory infrastructure and more. It all ends with the standards inherent in the perimeter of the organization. Note that each region should be considered separately.
One of the most difficult issues to a certain extent, holding back the pace of information society is the need to give priority to issues of national
Safety (socipl'noj, economic and military-strategic) in the face of widespread use of computers and links for processing valuable confidential and sensitive information in public and private enterprises, and institutions of public administration, as well as bankovoskoj and Exchange infrastructures. Socio-economic implications
the widespread introduction of computers into the life of modern society
resulted in a number of the issues of information security,
such as:-the need to protect the property rights of nationals
enterprises and the State information and computing resources
in accordance with the requirements of civil, administrative and
commercial law (including the protection and protection of secrets
material property); -the need to maintain continuity and correct functioning of the most important automated and information services due to requirements of physical security, environmental environment and material safety of property; -the need for
protection of civil rights and freedoms guaranteed by the applicable
the legislation. The protection of property rights information arises from the need to ensure the normal functioning of social, economic and Administrative and management mechanisms in the public informatization of society, leading to the transformation of information in an object property, i.e. the subject of commodity-money relations.The draft Law "on information, and protection
information "defined the following objectives for the protection of information in
computing systems and networks-prevention of diversion,
theft, loss, unauthorized destruction, distortion,
Modification (tampering), unauthorized,
blocking information, etc.,