Tershukov D.A. Analysis of Modern Information Security Threats
ANALYSIS OF MODERN INFORMATION SECURITY THREATS
Dmitry A. Tershukov
Head of Department of Special Documentary Communication and Information Protection,
Volgograd Region Governor’s Office
This email address is being protected from spambots. You need JavaScript enabled to view it., This email address is being protected from spambots. You need JavaScript enabled to view it.
Prosp. Lenina, 9, 400098 Volgograd, Russian Federation
Abstract. In the modern world, knowledge and awareness have become the most important products, services have taken the lead, the global information space is rapidly developing, while modern information technologies represent not only new opportunities in solving various problems, but also create fundamentally new challenges and threats. The emergence of new information technologies and systems, the development and expansion of the functions of social networks, the introduction of a variety of services in social networks and their algorithmization have created tools for turning the historical process of human development from uncontrollable to manageable and even projected, there are opportunities to create a reality that does not correspond to reality, to influence the mass consciousness of millions of people around the world.
Currently, specialists in the field of information security require knowledge and skills that are at the intersection of various fields of knowledge: information technology, psychology, political science, law, criminology.
Meanwhile, graduates of technical universities do not always have sufficient knowledge and skills to properly assess the actions of the violator of information security, to understand the political component of the problems of information security. Graduates of humanities universities are not sufficiently versed in the specifics of threats to information security, the physical nature of the channels of information leakage. The way out of this situation can be the use of a system of retraining and advanced training of specialists in information protection.
Key words: information security, information environment, IT-infrastructure, threats, information systems.
This work is licensed under a Creative Commons Attribution 4.0 International License.