Іnformatsiyna bezpeka camp of protection of specialty. Organizational and technical come in to ensure the blocking of the voice and round of confidential information through the technical security of the security of virobnichoy and labor activity, and

Antipyretic remedies for children are prescribed by a pediatrician. But there are situations of indispensable help in case of likhomantsi, if the child needs to give faces negligently. Then the fathers take on themselves the resuscitation and zastosovuyut antipyretic preparations. What is allowed to give to children of the chest? How can you lower the temperature in older children? What are the most safe faces?


Information security

The characteristic rice of modern society and yogo informatization - active development and promotion in the sphere of human activity information technologies and benefits Information and information resources become one of the most important factors in the development of specialty, prosperity and power. The wide possibilities of computers and information technologies make it possible to automate the monitoring process and the management of state, economic, social, defense and other objects and systems, to remove, accumulate, process and transmit information about -yakіy kіlkostі.

All the same, we give a support to the fact that informatization plays today a vital positive role in the development of humankind, that informational supremacy is objectively inevitable. Let history tell us that a lot of scientific and technical ideas were won not only for the benefit of people. To achieve the goal of nuclear physics - atomic weapons, opto-electronics - laser weapons, chemistry - jet gases, biology - biological weapons and so on.

Sogodnі in Pevnyi sub'єktіv (koalіtsіy, powers organіzatsіy, NKVD) vinikaє pragnennya odnoosіbno volodіti іnformatsіynimi resources zasobami tehnologіyami i i vikoristovuvati їh for zadovolennya svoїh іnteresіv i protidії іnteresam ymovіrnih konkurentіv in ekonomіchnomu, komertsіynomu i navіt vіyskovomu protiborstvі. Information and information technologies when they begin to act as objects of threats, which will give rise to the problem of information security.

The conceptual and scientific-methodological foundations of information security are only beginning to expand. For the first time, when creating the theory of information security, it is necessary to take into account the formation of a conceptual apparatus. The basic concepts are information security, information threat and information security.

information security stand out in two ways:

Like a camp of a navkolishny middle ground or an object, in a way it is possible to zapodiya їm іstotnoї shkodі or shkodi way of zdіysnennya vplyu on the information sphere of the object;

As the power of the object, which is characterized by the building of the head of the original shkod and other object, the way of the impact on the yogo information sphere.


Vidpovidno z cym information security- tse:

the camp of the object, if I pour in to you with a path on your information sphere, you can’t be sure of the original shkodi or shkodi;

The power of the object, which characterizes the building of the building, does not lead to the original shkod, whether it be the object of the path of influence on the information sphere of the object.


information threat- a threat to the object with a path of zdijsnennya pouring into the yoga information sphere:

Namir to put (behind) the object of the original shkodi with a path of infusion on the yoga information sphere;

Information security, the implementation of which is becoming very important;

A factor, or a combination of factors that create an informational problem of an object; such factors can be buti, the behavior of objects, natural phenomena, etc.


All the above does not allow to formulate the understanding information security Russian Federation like such a camp of the country, in such a camp, in which the hromadas, united and suspіlnym groups of hromаdyans, the suspіlstvo and the state can not be given the original shlod way of zdіysnennya infusion into the information sphere.

main objects of information securityє specialty (її rights and freedoms), suspіlstvo (yogo material and spiritual values) і power (її constitutional way, sovereignty, territorial integrity, economy, military right, etc.).

Speciality - the basic element, the middle of the suspіlstva. Without specialness, there is no suspense, and special poses cannot be suspility. The state will ensure the safety of reason and specialty, and suspense. Powers that do not need specialty or suspense, can’t take a long time and learn from the historical arena. The balance is mutually between specialty, supremacy and power acting as the head mind of their steel development.

Information security special- Tse camp of people, in such a special way it is not possible to be the head of the original shlyah by way of zdiyasnennya pouring into the vastness of the information space.

In the process of informatization, the person has become an informational "disciple". With the presence of bazhannia and benefits, whether it is obvious information about a specific specialty can become accessible and be vikoristan in its own purposes by another special, group of osib, supple group and power. Only an insignificant part of the population of the building is deprived of access to its own information. Most people do not have such ability and are deprived of helplessness in this plan.

Informational security of the welfare- ce camp of suspіlstva, in which you can't but zavdnoї shkodi way vplyu on yogi informational sphere. In the її osnovі - security of individual, group and mass svіdomostі hulks with the presence of informational threats, to which in the first place there is a trace of informational and psychological impact. These threats can lead to psycho-emotional and socio-psychological tension, the creation of moral criteria and norms, moral and political disorientation and, as a result, inadequate behavior of other people, groups and masses of people. As a result of such diy possible profound transformations of individual, group and mass communion, negative changes in the moral-political and socio-psychological climate in the household.

Information security of the state- tse camp of the state, in which you can’t be zavdno і stotnoї shkodi zdіysnennya zdіysnennya zdіysnennya vlivu on yogo information sphere. The information security of the state is inextricably linked to the security of the national security.

11.2 Information warfare and information terrorism

The problems of the information security of the state should be fully discussed in the Doctrine of the information security of the Russian Federation. Let's focus on two of them: the problems of information warfare and information terrorism.

information war- tse dії, scho get used to achieve informational advancement by the way of the head of the enemy’s information sphere and security of the power of information security.

Information warfare is carried out for additional information defense, which can be compared with the mass battle defense for firing efficiency. The idea of ​​victoriousness and the material basis of the daily informational information were formed in the world of informatization development. Komp'yuterizatsіya rіznih spheres suspіlnogo Zhittya, rozvitok telekomunіkatsіynih that іnformatsіynih trammel, stvorennya bases i bankіv danih, wider vprovadzhennya novіtnіh іnformatsіynih tehnologіy i peretvorennya profesії programіsta in the prestigious i Masov spetsіalnіst target bazovі naukovі, tehnologіchnі that ekonomіchnі peredumovi for viniknennya i vdoskonalennya new type іnformatsіynoї zbroї And in Vodnochas zrobili objects of management and zv'yazku, energy and transport, the banking system are already razlivymi on vіdnoshnyu to іnformatsiynogo vpluv.

Information alert is a collection of assets, methods and technologies that ensure the possibility of a forceful injection into the information sphere of the enemy with the method of destroying the information infrastructure, systems of power management, and lowering the defense capacity.

Universality, confidentiality, breadth of infusions, choice of place and hour of stagnation, efficiency and duration of legal borders on vikoristannya to slacken informational strife with an overly unsafe way of strife. It can zastosovuvatisya and in a peaceful hour. More than that, malicious mischief on technical system, Including military-technical, can be given already at the stage of design and creation of special defects of the sabotage type (software bookmarks) in software security systems. The foldability of current software programs practically does not allow the appearance of similar bookmarks.

The theater of military activities during the conduct of information wars is all light information expanse, and the ruinous mіts іnformatsiynoї zbroї in the process of farther informatization will be only a little help. Іnformatsіynі vіyni, Especially in the Minds іsnuvannya mayzhe monopoly encampment in іnformatsіynіy sferі nevelikoї kіlkostі kraїn, zdatnі viklikati natsіonalnі, regіonalnі i navіt svіtovі іnformatsіynі catastrophes ruynіvnі naslіdki yakih for svіtovoї tsivіlіzatsії will not Mensch zgubnimi, nіzh naslіdki nuclear disaster. The threat of informational warfare in the global context is the factor of the politically-attached vice and zalyakuvannya, the factor that destroys the strategic parity, destroys the jealousy that has formed on the world's political arena.

Dії okremih osіb аbo аbo groups, sprаmirovanіnі na nenja shkodi іnformаtsiіynіyіy sіrі or її vikoristannya in korislivyh tsіlyah, are called information crime. As a rule, there are some mischief against a specific object of the information space.

informational terrorism- Tse Especially form vio scho predstavlyaє him svіdome i tsіlespryamovane іnformatsіyny vpliv abo zagrozu zastosuvannya such vplivu for kerosene stove Uryadov to realіzatsії polіtichnih, ekonomіchnih, relіgіynih that іnshih tsіley teroristichnoyu organіzatsієyu abo okremimi teroristov, suprovodzhuvane emotsіynim vplivom on suspіlstvo for zbudzhennya in nyoma fear panіchnih mood, spend trust in power and create political instability.

Informational terrorism, with similarities to informational warfare and crime in form and methods, is influenced by their goals and tactics. Golovne in the tactics of informational terrorism is based on the fact that a terrorist act has an unsafe legacy, becoming widely known to the population and otrimav wide public resonance. As a rule, terrorists are accompanied by the threat of repeating a terrorist act without specifying a specific object of action.

The threat of informational terrorism has become an important geopolitical factor, and the fight against it has led to the consolidation of the powers of the state institutions, as well as the activation of international anti-terrorism in the country.

11.3. Threaten the information security of Russia

It follows that, although the problems of information security are generated globally, for Russia, the stench is of particular importance in connection with the geopolitical and economic situation.

The Doctrine of information security of the Russian Federation, approved by the President of the Russian Federation on 9. Spring 2000 ., threaten information security kraїni according to their straightness are subdivided into threats:

Constitutional rights and freedoms of people and citizens in the gallery of information activity;

Spiritual life of the soul;

Information security

Information infrastructure;

Information resources.


Threats to constitutional rights and freedoms of people and citizens in the field of information security can be:

Praise by the authorities of the state power of normative legal acts, like the constitutional rights and freedom of the people in the field of information activity;

Creation of monopolies on molding, otrimannya and broadening of information in the Russian Federation, including the majority of telecommunications systems;

Protidiya, including those on the side of criminal structures, the implementation by the citizens of their constitutional rights to special and family hiding places, listing hiding places, telephone conversations and other information, as well as ineffective selection of the right in the legal area of ​​the regulatory framework;

Irrational, transcendental obsmezhennya access to suspіlno necessary information;

Violation of the constitutional rights and freedoms of people and citizens in the region mass information;

Neviconnannya by state authorities, organizations and citizens could not legislate the Russian Federation, as a regulator in the information sphere.


Threats to the spiritual life of the soul can buti:

Zastosuvannya zasobіv inflowing into the mass svіdomіst hromаdyan;

Disorganization and destruction of the system of accumulation and preservation of cultural values, including archives;

Obmenzhennya access of the population to the most important state information resources in the bodies of state power, and other socially significant information;

Reducing the spiritual, moral and creative potential of Russia;

Manipulation of information (disinformation, attachment or twisting of information).


Threats to information infrastructure can buti:

Damage to addressing and timeliness of information exchange, illegal selection and selection of information;

Broken technology of processing information;

Implementation in hardware and software of a variety of components that implement functions that are not transferred to the documentation for the computer;

Development and expansion of programs that disrupt the normal functioning of information and information-telecommunication systems, including information protection systems;

Downgrading, poshkodzhennya, radio-electronic strangulation or disruption of systems for processing information, telecommunications and communication;

Rooting software or hardware keys and features cryptographic zakhistu information;

The transfer of information in technical channels, її revitalization, which is due to the robotic technical means of processing and saving, as well as the hour of transmission of information through communication channels;

Provision of electronic attachments for the transfer of information in technical processing, collection and transmission of information through communication channels, as well as from the services of the administration of state authorities and organizations;

Downgrading, poshkodzhennya, ruining or stealing machine and other information;

Perehoplennya, deciphering and imposition of false information in the transmission of data, communication lines and mass information systems;

Injected into the password-key system automated systems processing and transmission of information;

Purchasing behind the cordon of information technologies, means of informatization, telecommunications and communication, which may have analogues in the country, as they do not compromise for their characteristics to foreign people.


Threats to information resources can buti:

Diyalnist of space, air, sea and land technical research facilities of foreign powers;

Enforcement of unauthorized access to information resources and їх is against the law of the court;

Distribution of information resources from libraries, archives, banks and databases;

Destruction of legal boundaries for the expansion of information resources.


At his Messenger for National Security (13 March 1996), the President of the Russian Federation was appointed main threats for Russia in the information sphere let's come rank:

internal - vіdstavannya kraїni vіdnykh kraїn for equal and pace of informatization, the presence of a clearly formulated information policy;

zovnishni - sprobi not dopustiti Rosіyu Braty fate on rіvnopravnih minds in mіzhnarodnomu іnformatsіynomu obmіnі, vtruchannya i tsіlespryamovane proniknennya in dіyalnіst i rozvitok іnformatsіynoї іnfrastrukturi RF pragnennya skorotiti vikoristannya rosіyskoї MTIE yak mіzhnarodnogo zasobu spіlkuvannya i through tse zvuzhennya rosіyskogo іnformatsіynogo spaciousness.


Qi and other internal and external threats for ways to(Implementation) to be divided into informational, program-mathematical, physical and organizational.

Information threats are implemented for additional unauthorized access to information resources and її stealing from the method of illicit scamming, negative manipulation of information (disinformation, creation of information, її prihovuvannya), disruption of the technology of data processing

Software and mathematical threats are implemented by way of promotion in the equipment software systems components, which destroy functions, are not described in the documentation for the system and reduce the efficiency of their functionality, expansion and expansion of programs (viruses, Trojan horses, etc.), as they disrupt the normal functioning of systems, including information protection systems.

physical threats due to the threat of physical harm (destruction, damage, stealing) on ​​information systems and their elements, signaling information transfer in transmission channels or in service premises, etc.

Before organizational threats next to see first for all the weak legal base of information security. Almost daily legal security of information security at the regional level. Vymogi the main legislative acts (the Constitution of the Russian Federation, the laws of the Russian Federation "On security", "On the sovereign mystery", "On information, informatization and protection of information" and in.) The shortcomings of the legal system lead to the fact that significant sharing of information with obmezhenim access to the financial and stock exchange, tax, militant, foreign economic, housing and other areas in apparently specific databases of data is expanded by various commercial firms.

V information space from the position of information security the most typical є two problems:

1) control (vytyag) of information resources of the state, i.e. actually information intelligence (espionage). The information space has become and is being overrun by the sphere of activity of numerical development services. Today's information exploration can be implemented in two ways: unauthorized intrusions into information and critical systems; legal way, for the active participation of foreign companies in the creation of the information structure of Russia. With all the negative consequences associated with it, that the information resources of the country are under the control of foreign structures, inflicted a direct waste of the economy - they are deprived of the power of the authorities, the science and virility of the country;

2) the threat of collapse or disorganization of information resources of elements of state structures. With the daily development of information technologies, such developments can be developed in a peaceful hour. The stench threatens the ruination of valuables for the power of information, її created or promoted negative information in order to disorganize or accept wrong decisions on the top line of state administration.

Occupies a special place security of computer systems, yaki allow to unite and jointly conquer a great deal of information resources on a local and global scale. Computer networks are becoming one of the main sources of information intelligence. At the same time, their majesty can enter into a struggle with the problem of securing information. Qiu furnishing is necessary to protect when arranging the development of both local and global computer networks. So, in the process of creating the Internet in the United States in 1981, a rotation of creations of the Center for Computer Security of the Ministry of Defense, in 1985, the rotation was transformed into the National Center for Computer Security and transferred to the National Security Agency.

Analizes of contaminations, forms І Method ї Integrating on the edge of the spin, and Torozіv І Plugіv Borunby Zimi Zvzvololi Zvolzolє Sudzhouvati, Shah in Denmark An hour in theorest Ta Persian Intormatsіinoi NEXT MOVERA WINE WINKING VICTALLIVAZIVATE ( wanting to do it mentally) as informational and psychological security and protection of information.

Information and psychological safety - the camp of the protection of the population, other groups and social versions of the society, mass associations of people, the population as a whole in the face of negative informational and psychological influxes, zdiisnyuvanih in the information space (report about the future).

Defender of information - security of information security (parrying threats from information infrastructure and information resources).

At the present time, the problems of protection of information are most actively explored: organizational, legal, technical and technological ones come in at the cost of threatening and threatening information resources and systems, the adoption of their heritage. Formuєtsya teorіya Zahist Informácie, stvoryuyutsya i actively vikoristovuyutsya on praktitsі i Metodi zasobi Zahist Informácie, zdіysnyuєtsya pіdgotovka fahіvtsіv number of spetsіalnostey i spetsіalіzatsіy such yak tehnologіya Zahist Informácie, integrated zabezpechennya іnformatsіynoї BEZPEKA avtomatizovanih systems Bezpeka i Zahist Informácie i t. D.

11.4. Information security is the most important component of national security

V daily suspense information security is a system-creating factor in practically all spheres of yoga life. There is a sing-song influx on the camp of economic, defense, social, political and other warehouse national security. At the same time, informational security itself speaks warehouse part national security, the meaning of which is steadily increasing with skin fate.

The special role of information security is explained by these global processes, which are typical for the socio-economic development of the world. To this it is possible to affirm that informational security can be seen as the most important component of national security, "Incisive" all else see safety. It will show the price in the application of social and environmental safety.

1. Social context of information security. The problem of social (communal) security has become and remains one of the most important. It is due to the defense of the interests of the country and the people in the social sphere, the development of the social structure and the social resources, the system of life security and the socialization of people, the way of life that meets the needs of the progress of the future and future.

Social security may have a rich aspect character. In modern Russia, there are manifestly negative processes in the suspense, such as an increase in malice, a decrease in the level of life, an increase in unemployment, a ruin old system illumine, fall on the prestige of science and engineering, raise prosperity on the rich and poor, improve the waters between people, etc.

The guarantor of the social protection of the citizens is the constitution, the state, the president of that other institution of the state power. The main objects of social security are specialty and supremacy, social interests and social information, and from the improvement of the informational aspect - the right to withdraw and distill public information, as well as the system of the formation of social support.

For the help of the main promising information resources and technologies, it is possible to practically more control and regulate the information interaction of people. Find out about the potential for listening to telephone (and not only telephone) calls, control over listings, the creation of computer databases of data about human skin, which include confidential information, etc.

Modern information technologies have made it possible to sharply increase the effectiveness of the impact on the psyche of people and sustained awareness, creating new forms of “quiet” (“attached”) manipulation of individual, group and mass freedom. It is not vipadkovo to call mass information the “fourth estate”. further developmentіnformatsiynyh tekhnologii іstotno expand the possibilities of ZMI, and the power of ієї wielding more growth. At the link with the cim cycle, the appearance and development of a new interdisciplinary directly - informational and psychological security was primed.

Up to the number of forms of "attached" influx of information, it is possible to introduce new technologies in the production of mass information, psychotronic weapons, mesh technologies, which allow restricting access to various negative information, including pornographic, nationalistic and other information, such as computer games, Yakі suttєvo vplyvayut on shaping svidomosti children, and so on.

2. Ecological problems in the structure of information security. Environmental safety is one of the most important global problems of modernity. Vaughn is caused by the interests of special interests, suspenst and power in the face of potential and real threats, which are created by the effects of anthropogenic impact on the middle, as well as in the face of natural disasters. Let's take a look at the informational aspect of this complex, variant problem.

Until today, the process of shaping the environmental policy of the country is being kept closed, as it is carried out without sufficient information for the scientific community. It is not clear at the link with the cim whether ecology is among the priorities of the activities of the legislating and victorious bodies of Russia, or the environmental problem is victorious only speculatively in frontal battles, or in the struggle for power among the ugly. In addition, a wide range of populations is not sufficiently aware of the threats to environmental safety, their dzherelah, the legacy of environmental disasters, etc.

Discussing environmental problems, fahivtsі often koristuyutsya "Formula of global development" D. Meadows:

1 = PAT,

number of population; L - rіven dobrobutu (savings per capita); T - technology (whit of the middle, which is applied during the production of a single product with a variety of singing technologies).

This formula allows you to make a direct connection between information and information technologies and interests in the middle ground. Definitely, in order to change the focus to the middle, it is necessary to thoroughly clean up the manufacturing processes, move to “environmentally clean”, energy- and resource-saving waste-free technologies. And it’s worth it only for the minds of the pre-primary economy for the development of informatization, the development and wide introduction of new information technologies in the workplace, including in material and energy production, and additional industry.

In the monograph by M. D. Ursula “Way to the noosphere. The concept of survival and security development of civilization "(M., 1990) and in the upcoming yoga robots a problem is considered natural ecological safety, in the basis of this - the conservation of biological diversity and stability of the biosphere. Tsey pidhіd hangs in the capacity of an alternative to the technogenic (technospheric) path to the development of suspenst. On the thought of Ursula, following this path, the people will create a new threat to their security - the security of technocracy. Technocracy will significantly change in the informational sector for the time being before the fundamental economy of the economy.

The formula of D. Meadows has one more addendum є "informatsiyno cherovanim". Go about the rіven dobrubu (L), about the formation of a reasonable standard of spontaneity, to fight against the aggressive spontaneous svіdomistyu. Without a doubt, the acquisition of mass information can play a significant role.

The solution of the most environmental problems and the task is due to the collection and processing of information about the camp of the natural environment (environmental monitoring), to the modeling of large-scale global processes that occur in nature, to the improvement of the growing man-made impacts. Obviously, for an effective vyshishennya, it is necessary to victorize the current informational capabilities of that technology.

in such a manner, the problem of national security is clearly of an informational nature. In case of mother's follow-up, there are two aspects:

1. Lyudina, information resources and information systems are considered to be among the main elements of security in all spheres of life of the state. Today, there is an active development of informational pressure on them. Therefore, it can be argued that the problem of information security in relation to other species is of an interspecific nature, and of some nutrition is supraspecies in nature. This fact is to blame for the formation of state and regional policies in the field of national and information security, in the development of relevant concepts and programs, in the organization of specific work in the field of security;

2. Necessity of a victorious informational approach as the main scientific and practical method of accomplishment of the task of national security. TsI POSTAVIY DISTANTANY, PRAYAZAKI ZON Zbor і An Analizoma of the magnitude of the psycheda (for the form of the submanna, for the Sovitov_rnostі i t. D.) Іnformatsії, be the modulatons of the ekonichny, ekologic, social, politician, vіyskovy, demographer, predicting and accepting solutions to the most important state problems, due to their nature є іnformatsiynymi, for їх vyrishennya it is necessary to obtain new informational technologies and skills.

11.5 Safety of people in the information space

0 Serousnosnosti Situratsії in the spin of the spacious in the spacious in the spacious system to know the widespread Vicerista for the description of the Tsogo Process of the ZheZh Vіyskovo, and the thermal studio: Informakіin Vіin, Іnformatsіin zbroy, Informazіin Diversiona, Informazine Terorism, Informazine Killer.

Speaking about the security of specialty in the information space, the Crimea understands the “threat” to fully embrace the term “violence”. As a rule, physical violence against a special person is understood under it. At the same time, it is possible and necessary to talk about violence against individuals in the sphere of political life, in the spiritual sphere, etc. on singularity.

The problem is of particular relevance information and psychological security, scho umovleno bagatma factors.

From one side, tse foldable, sometimes super-clear and negative processes in the political, social, economic and spiritual spheres, to which one can see:

The destruction of the old administrative-command system and the important formation of a new Russian statehood based on democratic principles;

Difficulty in the transition to a market economy;

Crisis of state ideology;

Deformation of the system of norms, attitudes and values;

Growing wickedness;

Lowered equal life and increased unemployment;

Rozsharuvannya suspіlstva on wealthy and bіdnіh і mіgіrshenny vіdnosin mіzh people;

Underestimation of the national and cultural-historical traditions of the peoples of Russia and penetration into the supremacy of foreign mass culture;

Changing the geopolitical situation;

destructive role different forms mythological evidence of totalitarian religious sects, a fall in prestige and a weakening of the most important socio-cultural institutions of the state - science, education, learning (including physical and psychological) and culture.

All the same, of course, can reduce the stability of the special, її psyche to various informational infusions. The specificity is important, as it is necessary to develop a critical analysis, to evaluate the information, and also to make an objective decision based on the given information.

From the other side, tse colossal increase in the efficiency of the information injection on the psyche of people and suspіlnu svіdomіst. Modern and promising information technologies and self-management allow informational interaction people, suspіlnoyu svіdomistyu i kontrolvatі їх.

Zakrema, the ability to listen to all telephone conversations, control the listings, create and illegally cheat on the computer database of confidential data about personalities, zdiyasnyuvaty prihovane information P. t.

objects information and psychological security:

Okremi hromadiany who represent different centuries, socio-cultural and national groups and versts of society;

OKREMI social groupsі balls as a component of the social structure of society (including professional, national-ethnical and other);

Okremi organizations, groups and individuals, specific representatives of government authorities and administration, defense forces, law enforcement agencies and security, virobnichih, financial and other structures, as a way to reduce activity, as may or may not have important social consequences;

Organization of mass associations and self-made groups of citizens with their own special way of life, motivation system, mentality, mentality, and so on.

Population of specific regions, industrial and agro-industrial agglomerations, neighboring territorial districts and places of compact living of people, etc.;

Public and political organizations, suspense-political movements and parties;

The population of the country as a whole is socially and historically mixed people, with specific characteristics of a suspenseful psychology, a unique system of sociocultural and socio-psychological norms and traditions;

The spiritual sphere of society, warehouses like a suspіlna svіdomіst, gromadska thought and social and psychological climate (including systems of illumination and vihovannia, systems of mass information, which infuse into the social behavior and organization of people's life).

Інформаціной-psychologists of the inspection of processing OK'єtіv Satimeno for the slaughter of psychiatric healthy Skinny Okremoї O. Obliva Founders in Civo, Oblisky Funki Funkuvnayvnya II Communication Issuctors, and Torzochnya Іndivіdual, group І Masovo Svіdomosti Z Metha's progression of suspension.

channels(Koshti) an informational injection on the specialty of great men of distinction. Tse sіm'ya, lighting sphere (children's garden, school, university), street, books, radio, cinema, TV broadcasting, masova druk (newspapers, magazines), audio visual aids, zokrema diverse program equipment (tape phones, players, video recorders), and T . in our eyes, a new and most powerful source of information is being born - the Internet, on the basis of technics and technologies virtual realities, Scho promises truly fantastic prospects of virtual influxes. And visual information is the most informative and wild. It is not for nothing that the people say: "Better to sing once, feel it a hundred times." The effectiveness of these and other channels influencing the specificity is strongly promoted for active development and wide demand for new information technologies.

Information technology is a great boon for the people, the stench will signify future prosperity. Ale at the same hour in the hands of evil-doers - a terrible zbroya; head of security is allowed in unauthorized access (active or passive) to yogo dzherel or slow (special). Remain and є іnformatsiyny injection on specialty.

Especially next majestic capacity in your sphere current collection of mass information. As a matter of fact, today ZMI is practically a single structure, through which the population of the day, we take away information about the processes in the country, region, world. The stench literally nav'yazuyut different ideological look. One cannot help but think that "the current ZMI in Russia can act as a force that stabilizes the situation in the community, and become a detonator of social vibes." Particularly relevant is the assertion during the period of election campaigns, as they have become in fact our everyday reality. At Zhovtnі 1999 r in Moscow navit was held scientific and practical conference"Information-psychological security of election campaigns (prevention and neutralization of" labor "technologies)".

As you can see, the television broadcasters call to inform, enlighten and educate. Zvernene bezperedno to the people and suspіlstva, it can maє the majestic power of the information injection. In our country, the television broadcaster, from the moment of his accusation, is playing the function of a “collective agitator and propagandist”. In the new social and economic minds, this function began to be implemented more openly and aggressively.

At the link with the commercialization of ZMI, which is typical and natural for the market economy, from television screens to specialty and prosperity, a stream of advertising, films and programs that promote violence, sadism, and sex has fallen. Everything can be classified as unauthorized access to information. As a result, the principle of "advertising break" on television has been poured into the psyche of millions of people. This is a direct violation of the rights of a person - the right to a free choice. Ideally, advertising is guilty of goloshuvatisya in the city of movement, so that the skin is able to choose for the powerhouses.

Intermediate extension to the safety of specialty in the information space may the problem of fooled depositors. In the period from 1992 to 1995, about 50 million Russians suffered from the financial pyramid organizers. These people, who are more important than those of a frail age, were victims of the informational press, those mass advertising, as they declared practical mittve kazkove prosperity.

In the market economy, information becomes a commodity, a product, a service. And it means that with the help of the method of security of informational security of particularity, it is possible to win the laws that protect the victim in the case of unfavorable products and services.

U number first visits, directing to the security of information security, specialty, come in step by step.

1. Development of information culture the population, including the development of special methods of active and passive defense against unsafe information flows and the attachment of newcomers to technologically competent production of information.

2. Development of legislation in the information sphere. The main and, perhaps, the only guarantor of the rights and freedoms of specialty in the information space is the state. This function can only be realized through the statutory laws. It should be noted that legislation in the information sphere has no analogues in history. To this end, the development of criminal lawyers can be educated in various fields, including computer science, information technology, psychology, sociology, pedagogy, and so on. A working group of the Ministry of Internal Affairs of the Commission on Information Security under Kerrivnitsm For the sake of the security of the Russian Federation, the draft concept of a thorough legal security of the information security of the Russian Federation.

3. Creation of a system for monitoring information and technological factors risk(Perhaps, by way of expansion of the functions of the structures of the development of the public thought, secured by appropriate methods).

4. Expansion of international cooperation and food safety in the information space. The range of problems for discussion within the framework of such a discussion is wide. Tse і an inclusive of the Ultra-value Points of the problems of the Іnformazії at _ndivіdualna і masov svіdomіst, on psychic people, і індодованна пододания (conventants) about Nevikurvyannya Ін-Orforminnye Proster in Burizovychi, about control over the virginity і індовные інфореційний иногоной, Які іновать criminal purposes, about international legalist fencing information resources, the possibility of control and expansion of the global fringes such as the Internet of information, as there is a negative impact on the physical, mental and social health of people, especially children and young people, etc.

Without the implementation of the appointments of those other entries, directing to the creation necessary minds for the carefree development of specialty in today's minds, it is unthinkable and steel development of the economy, and the very future development of Russia. The safety of skin zooming is the safety of everyone, including the powers.

visnovki

Informatization of the service gives rise to problems of information security, the most common of which is the problem of information warfare and information terrorism. The stench is of a global nature, but for Russia there is a special hospitality, which is motivated by this geopolitical and economic camp.

Threats to the information security of Russia are due to vulgar directives (threats to the constitutional rights and freedoms of the people, the spiritual life of the community, information structures, information resources) and the methods of science (power of information secrets, programmatic mathematics).

The current state of information security is the most important component of national security. In a significant world, there is a riven of economic, defense, social, political and other types of security.

The theory and practice of informational security can be seen in two directions: protection of information and informational-psychological security. Інфоросійно-psychologistsna cheeky is able to worry for slaughter of psychic healthy savory in the estate in the population of the Civic, Oblovynaya Funkvyonuvannone of the Honor of the I-Moody Institute of Settlement, and Torzovna Formuvna Indivіdual, group I Masovo Svіdomosti, National Paste for the Progressive Suspilcy Diviskens. Informational security is a pledge to the development of the economy and society.

Control nutrition

1. Describe the main categories of information security.

2. What is informational warfare and what are the ways to do it?

3. What is the difference between information warfare, information crime, information terrorism and what lies between them?

4. Describe the threats to information security in Russia.

5. Expand the social and environmental aspects of information security.

6. What is the relevance of the problem of information and psychological security in the current situation?

7. Name the channels of information flow to the people.

8. What do you need to do in order to create in Russia for a carefree development of specialty?

recommended literature

doctrine information security of the Russian Federation. , 2002.

Anosov V. D., Striltsiv A. A. 0 Doctrine of Information Security of the Russian Federation // Information Suspility. 1997. No. 2-3. pp. 3-9.

Anosov V. D., Lepsky V. E., Striltsiv A. A. Problems of information and psychological security // Information Sustainability. 1997. No. 4-6.

Arsentiev M.V. Before the nutrition about the concept of "information security" // Information Suspіlstvo. 1997. No. 4-6.

Geopolitics and national security: Glossary of the main understanding and purpose / M.I. Abdrakhmanov and in. M., 1998..

Gromov G. R. National information resources: problems of industrial exploitation. M., 1995.

Emelianov G. V., Striltsiv A. A. Information security of Russia: Proc. help / For Zag. ed. A. A. Prokhozheva. M., 1999. Part 1: Basic understanding and purpose.

Emelianov G, V., Striltsiv A, A, Problems of the security of the information service // Information Service. 1999. No. 2.

Zavadsky I. I. Information war - what is it? // Confidant. 1996. No. 4.

Zakhist Chereshkin D. S., Antopolsky A. B., Kononov et al. M., 1997..

Informational and psychological security (design and analysis of the subject area). M., 1997..

Lepsky V. E. Informational-psychological safety of firms // Psychological aspects of safety of undertakings / For red. V. E. Lepsky. M., 1997..

Moiseev N. N. Lyudina and the noosphere. M., 1990..

foundation national security of Russia / M.I. Abdurakhmanov i in .; For zag. ed. V.L.Manilova. M., 1998..

assessment effectiveness of systems for the protection of information resources / D. S. Chereshkin, V. A. Gadasin, 0. I. Єlizarov and in. M., 1998..

Pozdnyakov A.I. Informational security of specialty, supremacy, powers // Viyskova dumku. 1993. No. 10.

problems information and psychological security. M., 1996.

Serebryannikov V.V., Plastivtsiv A. Social security of Russia. M., 1996.

Smolyan G. L. Merezhev Information Systems and Problems of Special Security // Information Sustainability. 1999. No. 1.

Ursul A. D. The concept of natural eco-security // Bezpeka. 1994. No. 1-2.

Ursul A. D. The way to the noosphere: The concept of survival and carefree development of civilization. M., 1990..

Tsigichko V. I., Smolyan G. L., Chereshkin D. S. Informational escaping as a geopolitical factor and an instrument of power politics. M., 1997..

ecological imperatives of the development of Russia. SPb., 1996. (“Russia ahead of the XXI century; vol. 5).

Yusupov R. M. Information security - the basis of national security // Health, politics, conversion. 1997. No. 3.4.

Yusupov R. M. Zabolotsky V. P., Ivanov V. P. Lyudina in the information space // Problems of informatization. 1996. VIP. 4.

Informational security of specialty - tse camp and mental life of specialty, when її rights and freedoms are realized.

Zhittєvo important interests - sukupnіst necessities, satisfaction of those who provide the basis and possibility of a progressive development of specialty, supremacy and power.

Prior to life, important interests of specialty are aware of: increasing and realizing constitutional rights to search, withdraw, choose and expand information; po'yazanі z realіzаtsієyu hromadyan right to nedorkannіst private life; extracting information from the method of spiritual, physical, intellectual development; defender of rights to objects of intellectual power; ensuring the rights of a hulk to defend his health in the face of unacknowledged people shkidlivoi _information.

security threat- sukupnіst minds and factors, scho svoryuyut nebezpeka zhittєvo important interests of specialty, suspіlstva and power.

Threats to information security

  1. adoption of normative acts to supersede the constitutional rights of citizens;
  2. opposition to the implementation of the right to lack of privacy by the citizens;
  3. illegal exchange of access to public information;
  4. violation of the rights of the people in the field of mass information;
  5. against the rights of stosuvannya spetsialnyh zasobіv, scho vlivayut on svіdomіst people;
  6. manipulation of information.

Also, the security of security is the implementation of a single state policy in this sphere and a system of approaches of an economic, political, organizational and other nature, adequate to the threats of life to the important interests of specialty, supremacy and power, directing to the manifestation of threats, advancement.

The legal basis for the defense of special interests is formed by the information and legal norms of the Constitution of the Russian Federation. Thus, the freedom of mass information and the fence of censorship give the opportunity to create and further engage in the expansion of reliable, proper, objective, i.e., good-natured information, if possible, the expansion of the informal and informal information is turned on.

It is not allowed to propagandize and agitate, zbudzhuyuchi social, racial, national hatred and witchcraft. The propaganda of social, racial, national, regional chivalry is being defended. Prikhovuvannya townspeople facts that situation, scho create a threat to the life and health of people, pulling for themselves in the wake of the federal law.

So, the penalty for the expansion of unfavorable information, for disrupting the order of the spread of information is transmitted by the norms of the RF CC. Main stats of the Civil Code of the Russian Federation:

  • hardening (art. 129);
  • image (Article 130);
  • reshuffle of legal professional activity of journalists (Article 144);
  • malice in the case of the supply of valuable papers (Article 185);
  • knowingly untruthful information about the act of terrorism (Art. 207);
  • acquiring information about the conditions that create harm for the life and health of people (Article 237);
  • illegal distribution of pornographic materials or objects (Article 242);
  • public appeals to the establishment of extremist activity (Article 280);
  • the awakening of hatred or the witches, as well as the humiliation of human dignity (Article 282);
  • public calls to the outbreak of aggressive war (Article 354).

Lecturer: Ph.D. in Law, Associate Professor Kholodna Olena Viktorivna

03.12.2011, 10.12.2011, 17.12.2011

Topic 10: Information security

Nutrition lectures:

    Understanding the security of specialty, supremacy, power. Understanding the safety of safety;

    Understand and see information security;

    Information security special;

    Information security of the service;

    Information security of the state;

    Safety security in the global information space.

Nutrition 1: Understanding the security of specialty, supremacy, power. Understanding safety

National security - a camp of protection of life of important interests of special interests, supremacy and powers in the face of internal and external threats.

The main objects of zakhistu:

    Rights and freedom of specialty;

    Material and spiritual values ​​of the soul;

    Constitutional mode, sovereignty and territorial integrity of the state.

The concept of national security of the Russian Federation, approved by the Decree of the President, introduced the concept of "national interests".

National interests - a combination of balanced interests of specialty, supremacy and power in various spheres, including in the information sphere.

The national interests of the Russian Federation in the information sphere are the promotion of constitutional rights and freedoms of the people in the field of the acquisition of information and the promotion of it, the development of modern telecommunication technologies, the protection of state-owned information resources from unauthorized access.

Security is within the reach of the single sovereign policy in the field of security, a system of economic, political, organizational and other approaches that are adequate to the threats to life to the important interests of specialty, prosperity and power.

Basic principles of security:

    legality;

    Keeping the balance of life important interests of specialty, supremacy and power for security;

    Reciprocity of specialty, supremacy and power for security;

    Integration with international security systems.

Basic tasks for security information:

    Identification and neutralization of external and internal threats to the national security of the Russian Federation;

    Podolannya scientific and technical and technological deposits of the Russian Federation in the ranks of the dzherel;

    Provision of special security for the citizens of the Russian Federation, implementation of constitutional rights and freedoms;

_____________________________________________________________________________________

    Improvement and protection of the state-owned information infrastructure;

    Vzhivannya zahodіv pripinenny rozvіduvаlї i pіdrivnoї dіyalnostі іnozemskih іnesemnyh nadzor rzsii;

    Anti-threats against the rise of confrontations in the information sphere.

Nutrition 2: Understand and see information security

Information security- the protection of the national interests of the Russian Federation in the information sphere against internal and external threats, which determines the balance of interests of special interests, supremacy and power.

The doctrine of information security of the Russian Federation, approved by the Decree of the President of the Russian Federation: the main meta-protidium of the development of wars against the Russian Federation. The doctrine determined the national interests of the Russian Federation in the information sphere:

    Dotrimannya rights and freedoms of people and citizens in the information sphere - the need to improve the moral values ​​of society, the cultural and scientific potential of the country (for example, by way of a thorough legal base in the information sphere, guarantees of ZMI);

    Інфоросційна за безненненненнення стаствення подиться родіское замина з родеснянна русскоский испосной інфоровії молдовский постовійна постовію інії ї ї и и ​​и и исійской і І iompublic (ATTRIZAKIYAYY RІDKRITY INDCRIEVIY INFORMATSIYY RESERSIIV);

    Rozvitok Suchasnyj іnformatsіynih tehnologіy, vіtchiznyanoї іndustrії Informácie, in addition chislі іndustrії zasobіv іnformatizatsії, telekomunіkatsії i zv'yazku, zabezpechennya require vnutrіshnogo market analysis її produktsієyu i vihіd tsієї produktsії on svіtovy rinok and takozh zabezpechennya nakopichennya, zberezhennya i efektivnosti vikoristannya vіtchiznyanih іnformatsіynih resursіv (rozvitok development of competitive IT, the participation of the Russian Federation in international cooperation in the development of these technologies and systems);

    Protecting information resources in the form of unauthorized access, ensuring the security of information and telecommunication systems, as well as already broken ones, as well as those created on the territory of the Russian Federation (improving the security of information systems).

main task- ensuring the balance of interests of special, supremacy and power.

See information security

    Information security special;

    Information security of the service;

    Information security of the state.

At all times, information played an extremely important role, as it became more and more important to rock. The current economy is one of the key economic resources.

It’s good for everyone that “whoever gets the information, that light is the light.” Definitely, Volodinnya, in a sufficient amount, helps people to correctly assess what they are looking for in a certain way, develop options for their own actions and make a well-thought-out decision. Oskіlki іnformatsіya є tsіnіst, won't be able to become an object of purchase and sale, steal theft (unauthorized access), that won't support the infrastructure to blame but theft.

In addition, information is the strongest contribution to the specialty, supremacy and light in general. The very same people in today's minds need a mechanism for filtering information, and sometimes also a tool for defending against negligent and (or) negative information.

The world is rapidly changing, and, passing into the stage of informational support, changing all aspects of the life of a modern person, regardless of that child, tse chi is grown up. Practically smomiti people are given a plethora of variously manipulative information, the character of which changes from brown and necessary to aggressive, manipulative. Skin unity information, skin word, sign, text carry the meaning of interest, which is embedded in the value of a person, yoga sounds, motivation. In a dream, otherwise the word is poured into the psyche, often ignoring specialty, manipulating it. The transition of the state to a new informational level, the development of an update on the actualization of the problem of information security.

Vyhodyachi z osgogo vischevikladennogo, blaming the problem of information security, and first for all the very special features like wearing individual zdіbnosti, character, interests.

Vzagali, the problem of information security is superbly rich. You can see a few important aspects in it. Firstly, a clear informational aspect, po'yazaniy іz zahistom without intermediary information and informational resources. Unfortunately, most of the relevant regulatory documents look at the information security itself in this context, overstepping the bounds, the problems of particularity.

Information security of specialty - tse: a) the camp of protection, in case of any daily threat of infection of information, some kind of specialty; b) the camp and mind of the life of the specialty, in case of any daily threat of the infliction of special information.

І zvіdsi viplivaє dividing information security into information-ideological and information-technical. When tsomu pid іnformatsіyno-tehnіchnoї BEZPEKA osobistostі slіd rozumіti zahischenіst Informácie od vipadkovih abo navmisnih vplivіv natural abo piece character, scho mozhut prizvesti Damage Skoda osobistostі and pid іnformatsіyno-іdeologіchnoї BEZPEKA - zahischenіst osobistostі od navmisnogo abo nenavmisnogo іnformatsіynogo vplivu scho Got result torn down rights I freedoms in the field of the Watery, spoiled by the sewn of Іnformazії, Korrumannya іnformakіynui іnfrastructural І resources, shave with the moral and simplicity, to robin the destructive fourth in our disobedience, Scho Majut's grinding (hurdious, nonusevіdomanis), Yaki is injected into Suspilnu Svіdomіst Antsocіalnі installation.

Informational security of specialty - tse camp and mental life of specialty, when її rights and freedoms are realized.

Zhittєvo important interests - sukupnіst necessities, satisfaction of those who provide the basis and possibility of a progressive development of specialty, supremacy and power.

Prior to life, important interests of specialty are aware of: increasing and realizing constitutional rights to search, withdraw, choose and expand information; po'yazanі z realіzаtsієyu hromadyan right to nedorkannіst private life; extracting information from the method of spiritual, physical, intellectual development; defender of rights to objects of intellectual power; ensuring the rights of a hulk to defend his health in the face of unacknowledged people shkidlivoi _information.

The threat of security is the succes- sion of minds and factors that create security for the lives of the important interests of specialty, prosperity and power.

Threats of information security special features:

· Adoption of normative acts to supersede the constitutional rights of citizens;

· Protidiya implementation by the people of the right to lack of private life;

· Illegal exchange of access to public information;

· Violation of the rights of citizens in the field of mass information.

· Protipravne zastosuvannya spetsіalnyh zasobіv, scho vplyvayvayut on svіdomіst people;

· Manipulation of information.

Other persons, software and technical experts, a group of people, a group of people, or a state, the Internet, ZMI can also act as threats to information security.

It is necessary to note that in our country the normative base has been broken up, which ensures the information security of the specialty and power. In practice, we can name only two documents: the Doctrine of information security of the Russian Federation (approved by the President of the Russian Federation on 9 September 2000, r N Pr-1895), and Decree of the President of the Russian Federation on 12 January 2004, r N 611, with additions in 2004 r і 2005. "About come in for information security of the Russian Federation in the field of international information exchange."

The doctrine of information security of the Russian Federation interprets the concept of “information security” as “a camp of protection of national interests in the information sphere, which is characterized by a combination of balanced interests, special interests, supremacy and power.” Author of the doctrine tsіlkom zakonomіrno zv'yazali іnformatsіynu BEZPEKA osobistostі of її іnteresami in oblastі Informácie, ale traktuyut danі Interests, our Dumka dosit vuzko "Interests in osobistostі іnformatsіynіy sferі polyagayut in realіzatsії konstitutsіynih rights Lyudin i The Citizen access to Informácie on vikoristannya Informácie in the interests of zdіysnennya not fenced by the law of activity, physical, spiritual and intellectual development, as well as the protection of information, which ensures special security. To that the skin hulk is guilty to his mother access to legal information, he can win the information with the method of his universal development, and to protect the information, due to the special security of the hulk. In this way, the problem is again ignored, caused by a different informational influx on the psyche of a person, and these negative consequences, which can be followed by this influx. In the specialized literature, there are descriptions of important forms of fallow land due to the interdependence of people with global informational measures, various forms of gambling, law enforcement, and the impact of information on the specialty of the litter.

In this order, the situation develops, if there are no organs of power, no education system, no other social institutions are not able to control the flow of information that falls on the people. In their minds, the problem of information security of the specialty of a person is clearly manifested as a social and pedagogical sensation.

In another way, the social and psychological aspect of informational security, ties to the security of psychological security, especially in the form of an informational injection.

Analyzing the understanding of safety, S.K. At the process of cultivating academic cloudy dictionaries Russian, English, French and German languages ​​have been revealed that in the people's (community) knowledge of the understanding of "safety" it is not the style of "from the daily threat", but the camp, the feelings and the experiences of the people. In the opinion of the authors, in different cultures, approximately the same statements about safety were formed, the emphasis in which to fight on the feelings and experiences of people, connected with yoga in the present day and prospects for the future. In other words, for a person, security is experienced in Persh Black as if it were a sense of protection from a different kind of insecurity. Vihodyachi of rezultatіv holding analіzu, authors sformulyuvali viznachennya psihologіchnoї BEZPEKA yak will suspіlnoї svіdomostі at Money Does suspіlstvo in tsіlomu i cutaneous okrema osobistіst spriymayut іsnuyuchu yakіst Zhittya yak adequately i nadіyne, oskіlki vono stvoryuє realnі mozhlivostі for zadovolennya natural i sotsіalnih require gromadyan at sogodennі i daє Substitute them for evangelism in the future.

Grachov G.V., in his analysis of the concept of "informational-psychological security", as it stands for the protection of individual, group and supple psychology and, socially, socially sub-structurally, systematically, structurally functional organization influx of informational factors that call for dysfunctional social processes. In the socio-psychological context, informational safety is associated with various informational influxes on the psyche of a person, and in this case, there are problems of influencing the psyche of a good person, and, in this case, the mechanisms of such an influx into the psyche of a person.

So, you can see the sociological, socio-political and other aspects of this problem. It is necessary to determine how to enter into the social and pedagogical context of the concept of "informational security of specialty".

Obseta І Fitting Іnformazії, Proponation of Lyudinі, Zosli Sinilki, Scho right-handed stakes to talk about Іnformatin Sotzіalіizatsіїvіzіzіzіzіvіїi, and Introduction myself, such a rank, rejected into one z providy Chinnikіv Sotzіalіzatsії, the same Lamanny Yak SMIM, School ABO Reference Grup. The peculiarity of information, as a factor of socialization, lies in the fact that it is practically non-certifying. Having poured into the specialty of macro- or mesofactors of socialization, it’s always indirectly, it breaks through the activity of social institutions (such as school, family and inn.), Yakі are given to the goal-directed injection, management. The flow of information constantly flows indiscriminately into the recipient's personality. Conducted surveys show that the majority of respondents characterize their information medium like “aggressive”, “unfriendly”, “skidlivu”. Moreover, these characteristics do not change among the respondents, which belong to different social levels and groups. І students, and workers, and pupils, representatives of the intelligentsia show exactly the sameness in this diet.

In such minds, the most unprotected are children and juveniles, juveniles, who have not yet exhausted a stern gaze, a readable life position. Therefore, the problem of informational security of specialness is gaining special significance in the context of social and pedagogical activity. So, as a method of practical social-pedagogical activity and harmonization of interdependence (individuality) of specialty and society for saving, renewal, encouragement, development of social activity of people. In the minds, if the informational aspect is not protected, it is unlikely that it will be possible to induce harmonious interrelationship between specialty and society.

On the basis of thought, the problem of the security of information security of particularity, may be of a complex systemic nature and operate on different levels.

The first rіven is normative. On this level, the authorities of the state government are guilty of creating an unsuperior regulatory framework that protects all aspects of the problem of information security.

Another rіven is institutional, which includes the use of various social institutions related to development and socialization, which ensures the security of information security of specialty. In Persh Cherga, one can see such institutions as a family, a school for children and children, a church.

The third rіven is special. Tsey riven po'yazany, persh for everything, with self-wiring, self-illumination, molding high level informational culture of specialty as a part of the global culture of the people. On this level, the formation of the necessary special features for the provision of informational self-defense specialties is being formed.

You can see the offensive of professional social and pedagogical activity on the institutional and special levels.

On the institutional level, the activity of a social educator in the system of education and at work with the family is considered. In the system of illumination of direct lines, robots can be attacked:

Work with society and otochennyam;

Development and implementation of whole social and pedagogical programs;

Training for staff and teaching staff;

Propaganda activity;

Organization of interaction between fahivtsiv and social institutions and others.

Robot z sіm'єyu transmitting so directly:

Preventive activity;

Organization of education in the field of information security;

Promotion of the savage equal culture of sim'ї;

Help and encouragement in the organization of family training;

Advice for sіm'ї in the field of information self-defense and іn.

Special rivenka transfers the individual work of a social educator with a client and includes the following directives:

Providing social-pedagogical and psychological assistance and encouragement;

The development of individual programs works with the client, as they suffered from the information impact, for example, from the activity of destructive organizations, religious cults, unfair information, etc.

Work on molding at the client's informational culture of specialty;

Stimulation of the client to the degree of self-development and self-development, with the method of promotion of “information immunity” of specialness.

The field of information flow is not limited by anything, as if it would grow together with the development of humankind. And yet, without being aware of the informational security of a person, it is impossible to grow farther, to develop those individual qualities, and to shatter one’s specialty. Tobto the appearance of a permanent threat to the Veda to the extinction and degradation of specialness like that.

Such a situation has a necessary hard “shield”, which is to ensure informational security of specialty. The power acts in such a way, as on the right-hand side it ensures security (the Constitution of the Russian Federation, the Doctrine of information security of the Russian Federation, laws). Moreover, it is necessary to thoroughly improve the legislative base, as it is the responsibility of changing "in step with the hour." In our opinion, the specialty itself speaks out in a different way, in our opinion, it is the transfer of information, which is out of the way, we hope, we spread it. Even more often mi razmіschuєmo information about myself (for example, in social measures), In conversation, we are talking about private life, and then this information, leaning in the hands of stubborn osibs, turns against us. Also, information security technical equal from victories special programs, What to override unauthorized access.

In addition, it is necessary to set a few moral guidelines, a system of values, to formulate a national idea, otherwise an informational defense of specialty involves sensation.

In the rest of the decade, there is an active promotion of the computer system of the Internet in the life of the society. They carried a lot of advances, but also a number of new problems related to the advent of the Internet, although there are no legislators yet, and no technical problems.

Quite often, there is a round of information from closed databases, recognized for official coronation. Penetration of third-party data bases into data bases through computer systems, Zocrema, іsnuyut computer viruses, Poshiryuvani for help email. Sometimes such information can be freely posted by a private person on the Internet, for example, on his own special website. To name the address of this site from the beginning to few people, then the use of such names of search systems - Yandex, Rambler, Google and others, to collect all the information available for retrieval from some of the key words or phrases of the document, for the names of people.

In addition, organizations can publish information of a private nature about their sponsors on corporate websites, which are available to search engines. So, maybe there is information about the dates of the people, the family camp, the numbers of the home that mobile phones and other information, as the practitioner should give to the workforce or another organization, and not to be voiced on the Internet.

W іnshogo side, not viklyucheno rozmіschennya on whether yakih NKVD sites konfіdentsіynoї Informácie company profile, її fіnansovoї dіyalnostі, i tsya іnformatsіya takozh Mauger Buti znaydena through poshukovі sistemi i zavdati Skoda dіyalnostі organіzatsії and for vidalennya danih neobhіdno shukati avtorіv site, bring admіnіstratoram poshukovoї a system that the information is confidential, but after a long period of time, a “save copy” of the document will be available.

It also does not include the placement of information of a special nature and details of a special life or riveted information on special sites or forums from the side of many relatives in times of family conflict and separation. Similar information is also available to poke systems. Everything is creating a threat to information security special.

More than once, there was a small flow of information from the data bases of tax and financial services. This information is sold by a pirate rank on disks. There is no guarantee that the information is closed, like a person in the power, will not be available to the Internet through the search system.

From the foregoing, it is possible to develop visnovoks, that search systems in their daily appearance do not generally correspond to the task of ensuring the security of information security, specialty and sustainability. The robots of the poshuk systems are designed in such a way that every day it is possible to use the resources on the resource for the name of a person, or I will call an organization. Fahіvtsі, which work in Yandex, prove that they cannot manage the indexation of resources in their search system.

Next, indicate what is in others information systems the task of ensuring the security of information security is set and successfully resolved. So, whether a subscriber can, for a small sum, turn off the number of his home phone from the preliminary data base 09 for a small sum, in the dovidniks, information about apartment telephones and the rest of the hour will be indicated only from the letter of the subscriber. And dovidniki stylish phones during the day and it is not planned to see them.

When using search systems on the Internet, information security is not only not safe, but in the nearest possible way, the task is not set. It is necessary to develop a new legislative approach to the validity of per-shock systems and new technical solutions.

Also, the security of security is the implementation of a single state policy in this sphere and a system of approaches of an economic, political, organizational and other nature, adequate to the threats of life to the important interests of specialty, supremacy and power, directing to the manifestation of threats, advancement.

In this way, go to the security of informational security of the country and special guilt, but be complex and take revenge in yourself, do not go in style to the ideological and spiritual nature, directing to the visual orientation of the suppleness of the bridge.

Support the project - share your efforts, thank you!
Read also
Sbebrank (also known as Oschadbank) Sbebrank (also known as Oschadbank) Solving license problems with Autocad Chi does not start autocad windows 7 Solving license problems with Autocad Chi does not start autocad windows 7 Instructions for selecting the CryptoPro PIN code, at the hour of signing a number of documents - Instructions - AT Instructions for selecting the CryptoPro PIN code, at the hour of signing a number of documents - Instructions - JSC "PEK-Torg"