The article considers the issues of stability of critical information infrastructures (CII), based on the analysis of current domestic legislation in the field of national security in general and cybersecurity – in particular, highlights the basic principles of administrative and legal support for the stability of critical information infrastructures. It is determined that the principles are enshrined in legal norms to establish a coordinate system in a particular area for its proper functioning. The analysis of the legal literature showed that most of the authors who studied the principles of administrative and legal support of a particular area, the main characteristics of these principles include: principles; defined in regulations; whic...
The author of the article has conducted a comprehensive theoretical and legal research of the princi...
The article pays special attention to the structural and functional characteristics and elements of ...
The article is devoted to the analyze of the features of information security in martial law. Resear...
Today in Russia the active work is going on the implementation of a relatively new mechanism of stat...
The article examines the stability and resilience of the information infrastructure under the influe...
The article is devoted to a comprehensive analysis of the problem of ensuring information security o...
The aim of the article is to study the issue of achieving a balance between information protection ...
In the provisions of the scientific article the author defines main elements of ensuring security sy...
The world trends in increasing of threats of natural and man-made nature, a level of terrorist threa...
The paper discusses the modeling of various aspects of the security of critical information infrastr...
In the article the terminology and requirements for safe, reliable operation of critical IT infrastr...
The article analyzes the modern challenges of the time, which shape the information security policy ...
One of the most important tasks of national security in modern conditions is to ensure the security ...
On the basis of present knowledge, the critical infrastructure is a set of physical (technical and m...
Relevance of the article - security has always been one of the priority issues of state policy. Cons...
The author of the article has conducted a comprehensive theoretical and legal research of the princi...
The article pays special attention to the structural and functional characteristics and elements of ...
The article is devoted to the analyze of the features of information security in martial law. Resear...
Today in Russia the active work is going on the implementation of a relatively new mechanism of stat...
The article examines the stability and resilience of the information infrastructure under the influe...
The article is devoted to a comprehensive analysis of the problem of ensuring information security o...
The aim of the article is to study the issue of achieving a balance between information protection ...
In the provisions of the scientific article the author defines main elements of ensuring security sy...
The world trends in increasing of threats of natural and man-made nature, a level of terrorist threa...
The paper discusses the modeling of various aspects of the security of critical information infrastr...
In the article the terminology and requirements for safe, reliable operation of critical IT infrastr...
The article analyzes the modern challenges of the time, which shape the information security policy ...
One of the most important tasks of national security in modern conditions is to ensure the security ...
On the basis of present knowledge, the critical infrastructure is a set of physical (technical and m...
Relevance of the article - security has always been one of the priority issues of state policy. Cons...
The author of the article has conducted a comprehensive theoretical and legal research of the princi...
The article pays special attention to the structural and functional characteristics and elements of ...
The article is devoted to the analyze of the features of information security in martial law. Resear...