Tershukov D.A. Analysis of Modern Information Security Threats


Dmitry A. Tershukov

Head of Department of Special Documentary Communication and Information Protection,

Volgograd Region Governor’s Office

This email address is being protected from spambots. You need JavaScript enabled to view it., This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosp. Lenina, 9, 400098 Volgograd, Russian Federation

Abstract. In the modern world, knowledge and awareness have become the most important products, services have taken the lead, the global information space is rapidly developing, while modern information technologies represent not only new opportunities in solving various problems, but also create fundamentally new challenges and threats. The emergence of new information technologies and systems, the development and expansion of the functions of social networks, the introduction of a variety of services in social networks and their algorithmization have created tools for turning the historical process of human development from uncontrollable to manageable and even projected, there are opportunities to create a reality that does not correspond to reality, to influence the mass consciousness of millions of people around the world.

Currently, specialists in the field of information security require knowledge and skills that are at the intersection of various fields of knowledge: information technology, psychology, political science, law, criminology.

Meanwhile, graduates of technical universities do not always have sufficient knowledge and skills to properly assess the actions of the violator of information security, to understand the political component of the problems of information security. Graduates of humanities universities are not sufficiently versed in the specifics of threats to information security, the physical nature of the channels of information leakage. The way out of this situation can be the use of a system of retraining and advanced training of specialists in information protection.

Key words: information security, information environment, IT-infrastructure, threats, information systems.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Download this file (1_Tershukov.pmd.pdf) 1_Tershukov.pmd.pdf
URL: https://ti.jvolsu.com/index.php/en/component/attachments/download/599
616 DownloadsUpdate this file (1_Tershukov.pmd.pdf)