{"title":"信息安全管理:美国经验","authors":"V. Sarancha, V. Shabunina, O. Tur","doi":"10.32461/2409-9805.3.2023.290991","DOIUrl":null,"url":null,"abstract":"The purpose of the article is a comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The methodological basis of the study is general scientific and special methods of cognition, in particular, systemic approach, analysis, synthesis, and logical method. Methods of content analysis, comparative and analytical monitoring of Internet resources of US government bodies responsible for information security are also used. The scientific novelty of the study consists in the expansion of ideas about theoretical aspects in the field of information security and the systematic analysis of instrumental, conceptual foundations and practical aspects of information security in the United States. Conclusions. The globalisation of information systems has created a completely new situation in the security field. In cyberspace the main threat to the US national security comes from states and intermediaries acting in their interests. They have the necessary skills and technologies to carry out destructive cyberattacks for military and political purposes, and also effectively use cyberespionage methods, which not only entails economic losses, but also causes great damage to strategically important industries for the US. The American concept covers such three key levels of cyber security as the state, private business and individual users. There are such defence priorities for the United States as ensuring the protection of critical infrastructure, information networks and systems; quality control of used IT equipment; formation of effective mechanisms of interlevel communication and raising awareness at all levels. An important component of the US National Cyber Strategy is international cooperation on information security issues. In this regard, at the international level the United States seeks to implement such opportunities as to encourage countries to increase responsibility for ensuring the security of information systems and networks at the national and global level; to create the legal regime necessary to ensure cross-border access to information; to form a regime of collective cyber defence within the framework of NATO and other bilateral and multilateral agreements with strategic partners; to preserve the maximum possible freedom of action in cyberspace in order to conduct all types of information operations both during military conflicts and in peacetime. Keywords: cyberspace, information threat, information war, information security, information management, informatisation, ICT.","PeriodicalId":318806,"journal":{"name":"Scientific journal “Library Science. Record Studies. Informology”","volume":"77 9-10","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Information Security Management: American Experience\",\"authors\":\"V. Sarancha, V. Shabunina, O. Tur\",\"doi\":\"10.32461/2409-9805.3.2023.290991\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The purpose of the article is a comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The methodological basis of the study is general scientific and special methods of cognition, in particular, systemic approach, analysis, synthesis, and logical method. Methods of content analysis, comparative and analytical monitoring of Internet resources of US government bodies responsible for information security are also used. The scientific novelty of the study consists in the expansion of ideas about theoretical aspects in the field of information security and the systematic analysis of instrumental, conceptual foundations and practical aspects of information security in the United States. Conclusions. The globalisation of information systems has created a completely new situation in the security field. In cyberspace the main threat to the US national security comes from states and intermediaries acting in their interests. They have the necessary skills and technologies to carry out destructive cyberattacks for military and political purposes, and also effectively use cyberespionage methods, which not only entails economic losses, but also causes great damage to strategically important industries for the US. The American concept covers such three key levels of cyber security as the state, private business and individual users. There are such defence priorities for the United States as ensuring the protection of critical infrastructure, information networks and systems; quality control of used IT equipment; formation of effective mechanisms of interlevel communication and raising awareness at all levels. An important component of the US National Cyber Strategy is international cooperation on information security issues. In this regard, at the international level the United States seeks to implement such opportunities as to encourage countries to increase responsibility for ensuring the security of information systems and networks at the national and global level; to create the legal regime necessary to ensure cross-border access to information; to form a regime of collective cyber defence within the framework of NATO and other bilateral and multilateral agreements with strategic partners; to preserve the maximum possible freedom of action in cyberspace in order to conduct all types of information operations both during military conflicts and in peacetime. Keywords: cyberspace, information threat, information war, information security, information management, informatisation, ICT.\",\"PeriodicalId\":318806,\"journal\":{\"name\":\"Scientific journal “Library Science. Record Studies. Informology”\",\"volume\":\"77 9-10\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-11-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Scientific journal “Library Science. Record Studies. Informology”\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.32461/2409-9805.3.2023.290991\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Scientific journal “Library Science. Record Studies. Informology”","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32461/2409-9805.3.2023.290991","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
本文旨在全面分析美国的信息安全威胁概念,并确定美国在创建安全的国家网络空间方面的优先活动领域。研究的方法论基础是一般科学方法和特殊认知方法,特别是系统方法、分析方法、综合方法和逻辑方法。此外,还采用了内容分析、比较和分析监测美国负责信息安全的政府机构的互联网资源的方法。本研究的科学新颖性在于拓展了信息安全领域理论方面的思路,并对美国信息安全的工具、概念基础和实践方面进行了系统分析。结论。信息系统的全球化为安全领域带来了全新的局面。在网络空间,对美国国家安全的主要威胁来自国家和为其利益行事的中介机构。他们拥有必要的技能和技术,可以出于军事和政治目的实施破坏性网络攻击,还可以有效利用网络间谍手段,这不仅会造成经济损失,还会对美国具有重要战略意义的产业造成巨大破坏。美国的网络安全理念涵盖了国家、私营企业和个人用户等三个关键层面。美国的防御重点包括:确保关键基础设施、信息网络和系统得到保护;对使用过的 IT 设备进行质量控制;建立有效的层级间沟通机制并提高各层级的意识。美国国家网络战略的一个重要组成部分是在信息安全问题上开展国际合作。在这方面,美国寻求在国际层面落实以下机会:鼓励各国在国家和全球层面加强确保信息系统和网络安全的责任;建立必要的法律制度,确保跨境获取信息;在北约框架内以及与战略伙伴签订的其他双边和多边协定中形成集体网络防御制度;在网络空间保持尽可能大的行动自由,以便在军事冲突期间及和平时期开展各种信息行动。 关键词:网络空间、信息威胁、信息战、信息安全、信息管理、信息化、信息和通信技术。
Information Security Management: American Experience
The purpose of the article is a comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The methodological basis of the study is general scientific and special methods of cognition, in particular, systemic approach, analysis, synthesis, and logical method. Methods of content analysis, comparative and analytical monitoring of Internet resources of US government bodies responsible for information security are also used. The scientific novelty of the study consists in the expansion of ideas about theoretical aspects in the field of information security and the systematic analysis of instrumental, conceptual foundations and practical aspects of information security in the United States. Conclusions. The globalisation of information systems has created a completely new situation in the security field. In cyberspace the main threat to the US national security comes from states and intermediaries acting in their interests. They have the necessary skills and technologies to carry out destructive cyberattacks for military and political purposes, and also effectively use cyberespionage methods, which not only entails economic losses, but also causes great damage to strategically important industries for the US. The American concept covers such three key levels of cyber security as the state, private business and individual users. There are such defence priorities for the United States as ensuring the protection of critical infrastructure, information networks and systems; quality control of used IT equipment; formation of effective mechanisms of interlevel communication and raising awareness at all levels. An important component of the US National Cyber Strategy is international cooperation on information security issues. In this regard, at the international level the United States seeks to implement such opportunities as to encourage countries to increase responsibility for ensuring the security of information systems and networks at the national and global level; to create the legal regime necessary to ensure cross-border access to information; to form a regime of collective cyber defence within the framework of NATO and other bilateral and multilateral agreements with strategic partners; to preserve the maximum possible freedom of action in cyberspace in order to conduct all types of information operations both during military conflicts and in peacetime. Keywords: cyberspace, information threat, information war, information security, information management, informatisation, ICT.