Special theory of administrative and legal regulation of information security


  • S. Lysenko Interregional Academy of Personnel Management
Keywords: special theory, information security, modeling, administrative-legal regulation, safety of social systems

Abstract

The article deals with the principles of creating a special theory of administrative and legal regulation of information security, analyzing the process of its analogy with physical laws, analyzing the threats and dangers to interests and the whole informational  safety, affecting the simulation process, define the principles of constructing and researching the models of information security of social systems  em.  Administrative-legal regulation of information security is due to the need for public administration processes of the formation and use of information resources, the creation and application of information systems and information security of social systems.  To a large extent, information security is due to the need for administrative regulation of information relations in various areas that form the system itself and maintain its integrity.  The administrative and legal principles of information security of social systems should ensure the ideal state of activity of the subjects, the system and its models.  Selected concrete administrative and legal principles of information security, such as physical formulas, create its model.  Of course, for each social system, the model of information security is individual.  Creation and construction of the model should take place on the basis of simple and optimal, as a stream of light, administrative and legal principles. Our theory takes into account the fact that the advanced modeling and forecasting of the chosen model, as well as the creation of an ideal (final) goal, has a positive and a negative side.  Focusing on providing basic features, sometimes insignificant and secondary, from the point of view of tasks, one can skip those features that are objectively significant.  For example, during a reconstruction that is like physical research, it is a source of experimental data in analysis and cognition, the link between objects can be misconceived and their dependence on consequences, resulting in wrong conclusions.  Reconstruction, in the case of a test and study of the model, is used instead of experimental tests with the original, tests which are impossible or inexpedient.

References

Kormich, B.A. (2004). Information security: organizational and legal basis. Kiev, Condor. [in Ukrainian]
Кормич, Б. А. (2004). Інформаційна безпека: організаційно-правові основи. Київ, Кондор.
Tsimbalyuk, V. (2004). Information security of entrepreneurial activity: definition of the essence and content of the concept in the conditions of Ukraine's entry into the information society (global cybercivilisation). Entrepreneurship, economy, law, 3, 88-95. [in Ukrainian]
Цимбалюк, В. (2004). Інформаційна безпека підприємницької діяльності: визначення сутності та змісту поняття за умов входження України до інформаційного суспільства (глобальної кіберцивілізації). Підприємництво, господарство, право, 3, 88–95.
Lipkan, V.A., Baskakov, V. Yu. (2013). Administrative-legal regime of restricted access information in Ukraine. Kyiv, FOP Lipkan. [in Ukrainian]
Ліпкан, В. А., Баскаков, В. Ю. (2013). Адміністративно-правовий режим інформації з обмеженим доступом в Україні. Київ, ФОП Ліпкан.
Nesteruk, G. F., Fahruddinov, R. S., Nesteruk, F. G. (2005). On the issue of developing tools for monitoring the security of the corporate network. Collection of reports VIII International conf. SCM. St. Petersburg, PGETU. [in Russian]
Нестерук, Г. Ф., Фахрутдинов, Р. Ш., Нестерук, Ф. Г. (2005). К вопросу о разработе инструментальных способов для мониторинга защищенности корпоративной сети. Сборник докладов VIII Междунар. конф. SCM. Санкт-Петербург, СПГЕТУ.
Maruschak, A.I. (2007). Information law: Access to information: a tutorial. Kiev, CST. [in Ukrainian]
Марущак, А. І. (2007). Інформаційне право: Доступ до інформації : навчальний посібник. Київ, КНТ.
Nesteruk, G. F., Osovetsky, LG, Nesteruk, FG (2003). Adaptive model of neural network information security systems. Perspective Information Technologies and Intelligent Systems, No. 3, 45-56. [in Ukrainian]
Нестерук, Г. Ф., Осовецкого, Л. Г., Нестерук, Ф. Г. (2003). Адаптивна модель нейромережевих систем інформаційної безпеки. Перспективні інформаційні технології та інтелектуальні системи, № 3, 45-56.
Mitio Kaku, (2017). Physics of the Future, 5th edition. Moscow. [in Ukrainian]
Мітіо Каку, (2017). Фізика майбутнього, 5-е видання. Москва.
Ademoglu, D., Robinson, D. (2017). Why do nations collapse, 2nd form. Kiev, Our format. [in Ukrainian]
Аджемоглу, Д., Робінсон, Д. (2017). Чому нації занепадають, 2-ге вид. Київ, Наш формат.
Kissinger, G. (2015). World order Moscow, AST. [in Ukrainian]
Кісінджер, Г. (2015). Світовий порядок. Москва, АСТ.
Goking S. (2017). The shortest history of time. Kharkiv, KSD. [in Ukrainian]
Гокінг, С. (2017). Найкоротша історія часу. Харків, КСД.

Abstract views: 89
PDF Downloads: 66
Published
2017-12-07
How to Cite
Lysenko, S. (2017). Special theory of administrative and legal regulation of information security. Fundamental and Applied Researches in Practice of Leading Scientific Schools, 24(6), 60-64. Retrieved from https://farplss.org/index.php/journal/article/view/261