Romanov R.M. The Basic Principles of Information Protection in the Russian Federation in the Transition to a Digital Economy


Rashit M. Romanov

Deputy Head of the Federal Service for Technical and Export Control of the Southern and North Caucasus Federal Districts

This email address is being protected from spambots. You need JavaScript enabled to view it.

Raboche-Krestyanskaya St., 1, 400074 Volgograd, Russian Federation

Abstract. The modern stage of development of society is characterized by the increasing role of the information sphere. The information sphere is a set of information, information infrastructure, entities engaged in the collection, formation, distribution and use of information, as well as a system of regulation of public relations arising in this process.

The expansion of the areas of application of information technologies, as a factor of economic development and improvement of the functioning of public and state institutions, at the same time generates new information threats. The situation is significantly complicated by the confrontation between the Russian Federation and the West, which directly affects the sphere of national interests of the Russian Federation and poses a direct threat to the national security of the country, the key element of which is information security.

There is a constant growth of computer attacks on Russian information resources, the number of attacks has increased significantly in recent years. At the same time, the methods, means and tactics of such attacks are being improved, and their intensity directly depends on the current international situation.

Terrorist and extremist materials are openly distributed in the global network. The number of crimes committed with the use of information technologies, for example, illegal penetrations into the corporate networks of state and credit and financial institutions, has increased. The article analyzes the requirements for the security of important objects of critical information infrastructure of the Russian Federation. It is shown that they should be performed at all stages of the life cycle during the creation (modernization), operation and decommissioning of a significant object.

Key words: information security, information infrastructure, information technology, state security, digital economy.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Download this file (2_Romanov.pmd.pdf) 2_Romanov.pmd.pdf
507 DownloadsUpdate this file (2_Romanov.pmd.pdf)