Threats to the national security of the Russian Federation. Exam questions on the academic discipline "Mobilization training of healthcare

Satisfaction of national interests takes place within the framework of the processes of interaction between states in the international arena, as well as various social forces within them. These processes are in the nature of confrontation and cooperation, which in general allows us to consider them as a kind of struggle for existence. The latter causes direct and indirect competition between states and forces them to take into account each other's interests in one way or another. In the economic sphere, this competition is in the nature of competition, and in non-economic spheres, it is in the nature of a military-political and cultural-informational confrontation. The forms and direction of such confrontation and cooperation are determined by national interests. Since the resources allocated for development differ only partially for states, the clash of their interests is permanent.

It is these clashes in the course of satisfying national interests that give rise to threats to national security. Threat to national security is a danger determined by activities that impede the satisfaction of national interests.

On the one hand, the threat to national security is inextricably linked with this or that. If there is no national interest, there is no threat. Outside the system of national interests, a threat is just a danger. The threat to national security is considered in the context of various dangers, the ability to cause any harm, misfortune, accompanying human activity in general. Hazards, unlike threats, can be generated not only by social forces, but also by natural phenomena, natural disasters and man-made disasters.

On the other hand, a threat as an encroachment on the national interest and the intention to cause harm is always associated with the purposeful activity of some opposing social force - specific subjects pursuing their own interests, which act as a source of threat.

  • affected national interests of the country, which reflects its importance;
  • circumstances (own vulnerability - the degree of protection of the given threat), which determines the potential damage when the threat is realized;
  • place and time of manifestation of negative factors and conditions;
  • capabilities, intentions and will of the subject of the threat (potential adversary or competitor).

The last two points determine the likelihood of a threat being realized.

In this way, national security threat— direct or indirect possibility of damage to constitutional rights, freedoms, decent quality and standard of living of citizens, sovereignty and territorial integrity, sustainable development Russian Federation, defense and security of the state.

The nature of the threat determined by the nature of the interest that the threat counteracts. Therefore, they distinguish threats of an economic, military, informational, environmental and other nature(Fig. 1).

By type distinguish:

Direct threat. This is a threat posed by the targeted, deliberate activity of an entity that is viewed as a competitor, adversary, or enemy.

indirect threat. This is a threat caused by destructive changes in market conditions, or unpredictable political events that destroy the existing systems of economic and political interaction, or their inability to respond to a crisis.

Depending on where the threat comes from. those. where in relation to state border there is a source of threat, they also distinguish external, internal and transnational(not country-specific) threats.

From the point of view of the "broad" interpretation of security, threats are divided into the following types: actor-centric and trend-centric. What these threats have in common is that the former are often, and the latter almost always, transnational in nature.

In the strategic planning systems of states, threats are usually divided into potential and immediate. The first ones are usually considered those that have the following features:

  • pose an immediate danger to the national interest within the relevant planning period;
  • expressed as a certain trend in the development of the situation (for example, the proliferation of weapons of mass destruction (WMD) in the world or the deterioration of the economic situation);
  • do not require immediate response.

Signs of immediate threats are as follows:

  • represent a clear danger to national interests at the current moment;
  • are expressed as a specific event (for example, an attack on an ally country, hostage-taking, etc.);
  • require immediate protective action.

Rice. 1. Classification of national security threats

Potential threats are usually taken into account when developing various plans and programs. Immediate threats require the immediate activation of the operational planning system in crisis situations for specific response measures. As a rule, sources of immediate threats are potential.

The manifestation of threat sources can be cumulative in nature both in various areas of achieving national goals and in geographical areas (regions), this involves considering threats not only by their sources, both external and internal, but also by the forms and likelihood of implementation, as well as the expected damage. This makes it possible to identify risks for the tasks of national development to be solved in order to take proactive measures to neutralize threats. In this case, the spectrum of threats is formed by the following forms.

Traditional forms of threat implementation associated mainly with the use of the armed forces of states in well-studied forms of hostilities or conflicts. In addition, these threats are also associated with the use of various kinds of economic instruments. At the same time, the economic opportunities of the threat source are realized not so much to increase their own economic situation in the global economy, how much to harm their competitors by economic means. The manifestation of such threats is expressed in the violation of the existing balances of power in various areas activities or geographic (strategic) directions. which constrains the freedom of action of the state in a particular region of the world, increasing the risks of achieving national goals.

Non-traditional forms of implementation of threats associated with the use by states and non-state actors non-traditional methods relating to opponents who are superior in their capabilities. These include terrorism, insurgency, civil wars. These approaches can be combined with information campaigns and actions, as well as attempts to deliberately disrupt the financial and credit sphere of the country through speculative attacks. Sometimes non-traditional forms of threat implementation are called asymmetric.

Forms of implementation of catastrophic threats associated with the use of weapons of mass destruction. This category of threats should also include activities to destroy key national infrastructure facilities that can cause catastrophic environmental and/or social consequences. The sources of such threats can be both individual states, seeking in this way to ensure their security or raise their international status, and various kinds of non-state actors seeking to acquire weapons of mass destruction and even use them (by analogy with the use of chemical weapons by the Aum-Shinrikyo sect in the Tokyo subway in 1995) to gain international attention or achieve other goals.

Disruptive forms of implementation of threats come from opponents who develop, possess and use breakthrough technologies that make it possible to neutralize the advantages of the enemy in the relevant areas. Of key importance in this context are information methods of disrupting the activities of state and military control systems and correcting the political activity of the masses in the necessary direction.

It should be noted that, just like interests, threats are recognized and "felt" by specific carriers of interests. There is always a difference between reality and awareness. That's why threats can also be overestimated, underestimated and even imaginary, i.e. far-fetched.

Internal and external threats to national economic security

In the process of creation and maintenance, key causes arise that can violate it, threats. The main threats are defined in the National Security Concept of the Russian Federation, approved by Decree of the President of the Russian Federation of December 17, 1997 No. 1300 (as amended by Decree of the President of the Russian Federation of January 10, 2000 No. 24). In accordance with it, threats are divided into internal and external in relation to the location of the causes of their occurrence - outside the national economy and inside it.

Internal threats to Russia's national security

The main internal threats to national economic security are:

Strengthening the degree of differentiation of living standards and incomes of the population. The formation of a small group of the wealthy population (oligarchs) and a large part of the poor population creates a situation of social tension in society, which can ultimately lead to serious socio-economic shocks. This creates a number of problems in society - the total uncertainty of the population, its psychological discomfort, the formation of large criminal structures, drug addiction, alcoholism, organized crime, prostitution;

Deformation. The orientation of the economy towards the extraction of minerals creates serious structural shifts. The decline in competitiveness and the total curtailment of production stimulates an increase in unemployment and reduces the quality of life of the population. The resource orientation of the national economy makes it possible to receive high income, but in no way ensures sustainable economic growth;

Increasing unevenness economic development regions. This kind of situation lays the problem of breaking the single economic space. A sharp difference in the level of socio-economic development of the regions destroys the existing ties between them and hinders inter-regional integration;

Criminalization of Russian society. In society, the tendencies to receive unearned income through direct robbery and seizure of property have sharply increased, which negatively affects the overall stability and stability of the national economy. Great importance has a total penetration of criminal structures into the state apparatus and industry and the emerging trend of merging between them. Many entrepreneurs refuse legal methods of resolving disputes among themselves, avoiding free competition, and increasingly resorting to the help of criminal structures. All this has a negative impact on the general economic situation and prevents the national economy from recovering from the crisis;

A sharp decline in the scientific and technical potential of Russia. The basis of economic growth - the scientific and technological potential - has been practically lost over the past decade, due to a reduction in investment in priority scientific and technical research and development, the mass exodus of leading scientists from the country, the destruction of science-intensive industries, and the strengthening of scientific and technical dependence. The future development of the economy belongs to science-intensive industries, for the creation of which Russia today does not have sufficient scientific potential. Accordingly, it is questioned whether Russia's place in the world economy;

Strengthening isolation and striving for independence of the subjects of the Federation. Russia has significant territories that function within the framework of a federal structure. The manifestation of separatist aspirations by the subjects of the Federation is a real threat to the territorial integrity of Russia and the existence of a single legal, political and economic space;

Strengthening interethnic and interethnic tensions, which creates real conditions for the emergence of internal conflicts on ethnic grounds. It is broadcast by a number of public associations whose interests do not include the preservation of the cultural and national integrity of Russia;

Widespread violation of the single legal space, leading to legal nihilism and non-compliance with the law;

decline physical health population, leading to degradation due to the crisis of the health care system. As a result, there is a steady trend towards a reduction in the birth rate and life expectancy of the population. The decline in human potential makes economic growth and industrial development impossible;

demographic crisis, associated with a steady trend of the predominance of the general mortality of the population over the birth rate. The catastrophic decline in the number of population poses the problem of the population of the territory of Russia and the retention of its existing borders.

Taken together, internal threats to national security are closely intertwined and interrelated. Their elimination is necessary not only to create the proper level of national security, but also to preserve Russian statehood. Together with internal, there are also external threats national security.

External Threats to Russia's National Security

Main external threats to national security are:

  • a decrease in the role of Russia in the world economy due to the targeted actions of individual states and interstate associations, such as the UN, the OSCE;
  • reduction of economic and political influence on the processes taking place in the world economy;
  • strengthening the scope and influence of international military and political associations, including NATO;
  • emerging trends towards the deployment of military forces of foreign states near the borders of Russia;
  • the worldwide proliferation of weapons of mass destruction;
  • the weakening of the processes of integration and the establishment of economic ties between Russia and the CIS countries;
  • creation of conditions for the formation and emergence of military armed conflicts near the state borders of Russia and the CIS countries;
  • territorial expansion in relation to Russia, for example, from Japan and China;
  • international terrorism;
  • weakening of Russia's position in the field of information and telecommunications. This is manifested in the reduction of Russia's influence on international information flows and the development by a number of states of information expansion technologies that can be applied to Russia;
  • revitalization of activities in Russia foreign organizations engaged in intelligence and collection of strategic information;
  • a sharp decrease in the military and defense potential of the country, which does not allow it, if necessary, to repel a military attack, which is associated with a systemic crisis in the country's defense complex.

Ensuring national security at a sufficient level makes it necessary to constantly monitor external and internal threats, and therefore their list is constantly changing depending on specific political, social, legal and economic conditions.

Adopted in 1997 and amended in 2000, the National Security Concept of the Russian Federation is not a simple declaration. It is an effective legal document that regulates the priority area of ​​the state's activity - national security. Only starting from 2003, it began to be implemented after the necessary potential had been accumulated. The introduction of a system for appointing senior officials of the constituent entities of the Russian Federation minimized the threat to the territorial integrity of Russia. The recent ban on the activities of foundations with foreign capital in Russia has reduced the degree of its political and economic dependence. Now we are witnessing the process when the accumulated potential state power embarked on the implementation of the National Security Concept adopted in 1997, albeit not in all areas effective and efficient.

Stages of national security threat

Threats to national security in the public mind and, in particular, in the minds of the political leadership of the country, go through several stages: awareness of the threat - reaction to a perceived threat - response to the threat.

Threat Awareness

Firstly, the property of an object or phenomenon "to pose a threat", obviously, does not have its inherent character, but is very conditional. What, from the point of view of one scale of values, is considered a “threat”, from the standpoint of a different assessment, may turn out to be, on the contrary, an “opportunity”. It is difficult to talk about “threats” without reference to a certain system of values. Secondly, a threat is perceived as such only as long as it looks sufficiently probable. In general, any threat is perceived by the human consciousness "integrally" - as a certain sum of the subjectively assessed probability of the threat and the degree of possible damage. Moreover, the perception of the threat is purely individual and is reflected in the concept of “degree of threat”. The degree of threat is the integral perception of the threat in the individual or public consciousness. Even a deadly but unlikely threat can be perceived as "low" and of little concern to those who should be concerned. At the same time, a threat that is quite probable, but not serious in nature, can completely divert attention to itself. Therefore, the response to threats to national interests may differ significantly from what a person's subconscious suggests. However, even if the threats are almost improbable, in practice the political leadership has to proceed from their possibility in order to ensure that what should not happen does not really happen.

In this regard, the main problem of preventing and countering any threat is the gap between the principles of rational perception and combating threats and the "innate", often irrational, reaction of society to threats (or lack thereof). Influencing the sphere of politics, "general human" and purely national features of the perception of threats lead to the deviation of politicians' actions from the model of "rational behavior". In these cases, the effectiveness of the national security system is reduced.

In practice, a threat can be recognized by society only if it is “real” in the eyes of society, i.e. society estimates the probability of its implementation quite high. As the degree of probability of a threat decreases, the task of preventing it falls off the public agenda. A low degree of expectation of a threat, weakening the natural defenses of society, obviously contributes to the realization of the threat. The society that least expects a threat is the one most exposed to it. So, for example, a war for which the country is “well prepared” usually does not happen. But others happen.

Response to a perceived threat

In the political sphere, it is generally impossible to assess the likelihood of a particular threat “objectively” (here the events are extremely heterogeneous). Therefore, any assessment of the likelihood of a threat can have an exclusively practical, pragmatic meaning. In fact, even when they talk about probability, they mean the integral assessment of the “degree of threat”. In the realm of politics, a “high degree” of threat means a high possible harm, given the practical means and the possibility of allocating funds to prevent it. Deviation from this principle of assessment will lead to a decrease in the effectiveness of the fight against threats, either due to an incorrect assessment of damage, or due to an incorrect assessment of one's capabilities. At the same time, the assessment of "damage" from the threat directly depends on the system of values ​​(national traditions, strategic culture). The latter is able to answer the questions: “What is good and what is bad?”, “What is “acquisition” and what is “loss?”. Without a specific value system effective fight it is not correct to speak with threats.

Response to the threat

It is mediated by national and cultural characteristics. Thus, a close assessment of the degree of threat in different countries does not yet mean the same response to it and in general any active action. Different nations have a completely different degree of "tolerance" of threats (threshold of perception). The higher the degree of tolerance, the higher the danger must be in order for the society/state to react to it. For example, there is a strong opinion that Russians are distinguished by a high degree of tolerance for dangers and threats. Compared to Russians, Americans, on the contrary, are distinguished by an unusually low tolerance for threats: even a small threat to their well-being can cause a hysterical, often disproportionate reaction to the degree of threat.

Thus, the threat to national security limits the freedom of choice for each individual, and for the country - the freedom of action in one area or another. This is manifested in the fact that when achieving national goals, the threat violates the chosen ratio of means (resources) and methods, exerts negative, primarily psychological, pressure on the decision-making system, the system of public administration. This increases the risks of achieving national goals. That is, a threat is what requires the activation of the national security system.

Natural and artificial threats

The development of new information technologies and general computerization have led to the fact that information security is not only becoming mandatory, it is also one of the characteristics of IS. There is a rather extensive class of information processing systems in the development of which the security factor plays a primary role (for example, banking information systems).

Under IP security refers to the protection of the system from accidental or intentional interference in the normal process of its functioning, from attempts to steal (unauthorized receipt) of information, modification or physical destruction of its components. In other words, this is the ability to counteract various disturbing influences on the IS.

Under the threat of information security refers to events or actions that can lead to corruption, unauthorized use, or even destruction of the information resources of the managed system, as well as software and hardware.

Threats information security are divided into two main types - these are natural and artificial threats. Let's dwell on natural threats and try to identify the main ones. . To natural threats include fires, floods, hurricanes, lightning strikes and other natural disasters and phenomena that are beyond human control. The most common among these threats are fires. To ensure the security of information, a prerequisite is the equipment of the premises in which the elements of the system (digital data carriers, servers, archives, etc.) are located, with fire sensors, the appointment of those responsible for fire safety and the availability of fire extinguishing equipment. Compliance with all these rules will minimize the risk of loss of information from a fire.

If premises with valuable information carriers are located in close proximity to water bodies, then they are subject to the threat of information loss due to flooding. The only thing that can be done in this situation is to exclude the storage of information media on the first floors of the building, which are prone to flooding.

Lightning is another natural threat. Very often during lightning strikes, network cards, electrical substations and other devices fail. Especially significant losses, when network equipment fails, are borne by large organizations and enterprises, such as banks. To avoid such problems, it is necessary that the connecting network cables be shielded (shielded network cable immune to electromagnetic interference) and the cable screen must be grounded. To prevent lightning from entering electrical substations, a grounded lightning rod should be installed, and computers and servers should be equipped with uninterruptible power supplies.

The next type of threat is artificial threats, which in turn divided into unintentional and deliberate threats. Unintentional Threats- these are actions that people commit through negligence, ignorance, inattention or out of curiosity. This type of threat includes the installation of software products that are not included in the list of necessary for work, and subsequently can cause system instability and loss of information. This also includes other "experiments" that were not malicious intent, and the people who performed them were not aware of the consequences. Unfortunately, this type of threat is very difficult to control, not only is the staff qualified, it is necessary that each person is aware of the risk that arises from his unauthorized actions.

Deliberate Threats- Threats associated with malicious intent of intentional physical destruction, subsequently failure of the system. Deliberate threats include internal and external attacks. Contrary to popular belief, large companies suffer multimillion-dollar losses often not from hacker attacks, but through the fault of their own employees. Modern history knows a lot of examples of deliberate internal threats to information - these are the tricks of competing organizations that introduce or recruit agents for the subsequent disorganization of a competitor, the revenge of employees who are dissatisfied salary or status in the company and so on. In order to minimize the risk of such cases, it is necessary that each employee of the organization corresponds to the so-called "trustworthiness status".

To external intentional threats include threats of hacker attacks. If the information system is connected to the global Internet, then to prevent hacker attacks, it is necessary to use a firewall (the so-called firewall), which can be either built into the equipment or implemented in software.

Man trying to disrupt work information system or gain unauthorized access to information, commonly referred to as a cracker, and sometimes a "software pirate" (hacker).

In their illegal actions aimed at mastering other people's secrets, crackers seek to find such sources of confidential information that would give them the most reliable information in the maximum volume with minimal cost to obtain it. With the help of various tricks and a variety of techniques and means, ways and approaches to such sources are selected. In this case, the source of information means a material object that has certain information that is of particular interest to attackers or competitors.

The main threats to the security of information and the normal functioning of the IS include:

Leakage of confidential information;

Information compromise;

Unauthorized use of information resources;

Erroneous use of information resources;

Unauthorized exchange of information between subscribers;

Refusal of information;

Violation of information service;

Illegal use of privileges.

Leakage of confidential information- this is an uncontrolled release of confidential information outside the IP or the circle of persons to whom it was entrusted in the service or became known in the course of work. This leak may be due to:

Disclosure of confidential information;

Leaving information through various, mainly technical, channels;

Unauthorized access to confidential information in various ways.

Disclosure of information by its owner or possessor is the intentional or careless actions of officials and users to whom the relevant information was duly entrusted in the service or work, which led to familiarization with it by persons who were not admitted to this information.



Uncontrolled care of confidential information via visual-optical, acoustic, electromagnetic and other channels is possible.

Unauthorized access- this is an unlawful deliberate possession of confidential information by a person who does not have the right to access protected information.

The most common ways of unauthorized access to information are:

Interception of electronic radiation;

The use of listening devices (bookmarks);

Remote photography;

Interception of acoustic emissions and restoration of the text of the printer;

Copying media overcoming protection measures

Disguise as a registered user;

Disguise under system requests;

Using software traps;

Exploiting shortcomings of programming languages ​​and operating systems;

Illegal connection to equipment and communication lines of specially designed hardware that provides access to information;

Malicious disabling of protection mechanisms;

Decryption by special programs encrypted: information;

information infections.

The listed ways of unauthorized access require quite a lot of technical knowledge and appropriate hardware or software developments on the part of the cracker. For example, technical leak channels are used - these are physical paths from the source of confidential information to the attacker, through which it is possible to obtain protected information. The reason for the occurrence of leakage channels is the design and technological imperfections of circuit solutions or the operational wear of the elements. All this allows hackers to create converters operating on certain physical principles, forming an information transmission channel inherent in these principles - a leakage channel.

However, there are quite primitive ways of unauthorized access:

Theft of information carriers and documentary waste;

Proactive collaboration;

Declining to cooperate on the part of the burglar;

probing;

Eavesdropping;

Observation and other ways.

Any methods of leaking confidential information can lead to significant material and moral damage both for the organization where the IS operates and for its users.

There is and is constantly being developed a huge variety of malicious programs, the purpose of which is to corrupt information in the database and computer software. A large number of varieties of these programs does not allow the development of permanent and reliable remedies against them.

Information security is the protection of information from accidental or intentional effects of a natural or artificial nature that can harm its owner or user.

Basic principles of information security

1. Data integrity- such a property, according to which information retains its content and structure in the process of its transmission and storage. Only a user with access rights can create, destroy or modify data.

2. Confidentiality- a property that indicates the need to restrict access to specific information for a designated circle of people. Thus, confidentiality ensures that during the transmission of data, they can be known only to authorized users.

3. Availability of information- this property characterizes the ability to provide timely and unhindered access of full users to the required information.

4. Reliability- this principle is expressed in the strict belonging of information to the subject, which is its source or from which it is received.

The task of ensuring information security implies the implementation of multifaceted and comprehensive measures to prevent and track unauthorized access by unauthorized persons, as well as actions that prevent misuse, damage, distortion, copying, blocking of information.

Information security issues become a priority in cases where a failure or an error in a particular computer system can lead to serious consequences.

Types of information security threats

Under the threat of information security it is customary to understand potentially possible actions, phenomena or processes that can have an undesirable effect on the system or on the information stored in it.

Such threats, affecting resources, can lead to data corruption, copying, unauthorized distribution, restriction or blocking of access to them. Currently, a sufficiently large number of threats are known, which are classified according to various criteria.

According to the nature of occurrence, they distinguish natural and artificial threats. The first group includes those that are caused by the impact on the computer system of objective physical processes or natural disasters. The second group is those threats that are caused by human activity.

According to the degree of intentionality of manifestation , threats are divided into random and deliberate.

There is also a division in depending on their immediate source, which can be the natural environment (for example, natural disasters), a person (disclosure of confidential data), software and hardware: authorized (an error in the operation operating system) and unauthorized (infection of the system with viruses).

The source of threats can have a different position. Depending on this factor, there are also three groups:

— Threats, the source of which is outside the controlled group of the computer system (for example, the interception of data transmitted over communication channels)

— Threats, the source of which is within the controlled zone of the system (this may be the theft of information media)

- Threats that are directly in the system itself (for example, incorrect use of resources).

Threats can affect a computer system in different ways. It can be passive influences, the implementation of which does not entail a change in the data structure (for example, copying). Active Threats- these are those that, on the contrary, change the structure and content of a computer system (the introduction of special programs).

According to the division of threats by stages of user or program access to system resources there are such dangers that appear at the stage of access to the computer and are detectable after access is allowed (unauthorized use of resources).

Classification by location in the system implies a division into three groups: threats of access to information located on external storage devices, in RAM and to the one that circulates in communication lines.

Threats can use a direct, standard path to resources through illegally obtained passwords or through the misuse of legitimate users' terminals, or they can "bypass" existing protections in another way.

Actions such as information theft are classified as threats that manifest themselves regardless of system activity. And, for example, the spread of viruses can only be detected during data processing.

random, or unintentional threats that are not related to the actions of intruders are called. The mechanism of their implementation has been studied quite well, so there are developed methods of counteraction.

Accidents and natural disasters pose a particular danger to computer systems, as they entail the most negative consequences. Due to the physical destruction of systems, information becomes inaccessible or is lost. In addition, it is impossible to completely avoid or prevent failures and failures in complex systems, as a result of which, as a rule, the information stored on them is distorted or destroyed, the algorithm of the operation of technical devices is violated.

Mistakes that may be made during the development of a computer system, including incorrect operation algorithms and incorrect software, can lead to consequences that are similar to those that occur when hardware fails and fails. Moreover, such errors can be used by attackers to influence system resources.

User errors lead to a weakening of information security in 65% of cases. Incompetent, negligent or inattentive performance of functional duties by employees at enterprises leads to the destruction, violation of the integrity and confidentiality of information.

Allocate also deliberate threats, which are associated with the purposeful actions of the offender. The study of this class is difficult, since it is very dynamic and constantly updated with new types of threats.

To penetrate a computer system for the purpose of further theft or destruction of information, such methods and means of espionage are used as eavesdropping, theft of programs, protection attributes, documents and information carriers, visual surveillance, and others.

In case of unauthorized access to data, standard hardware and software of computer systems are usually used, as a result of which the established rules for restricting user or process access to information resources are violated. The most common violations are the interception of passwords (performed using specially designed programs), the performance of any actions under the name of another person, and the use by an attacker of the privileges of legitimate users.

Specific malware

"computer viruses"- these are small programs that can independently spread after being introduced into a computer by creating copies of themselves. Under certain conditions, viruses negative impact to the system;

"worms"- Utilities that are activated every time you boot your computer. They have the ability to move within a system or network and replicate in a manner similar to viruses. Avalanche-like reproduction of programs leads to overload of communication channels, memory, and then to blocking of work;

"Trojan horses"- such programs “hide” under the guise of a useful application, but, in fact, harm the computer: they destroy software, copy and send files with confidential information to an attacker, etc.

Khorev Anatoly Anatolievich,
doctor of technical sciences, professor
Moscow state institute electronic engineering
(Technical University),
Moscow city

Information Security Threats

6. Protection against unauthorized access to information. Terms and definitions: guidance document: approved. decision of the chairman of the State Technical Commission of Russia dated March 30, 1992 [Electronic resource]. - Access mode: http://www.fstec.ru/_razd/_ispo.htm .

7. Code of the Russian Federation on Administrative Offenses: Feder. Law of July 30, 2001 No. 195-FZ: [adopted by the State. Duma December 20, 2001: approved by the Federation Council December 26, 2001]. [Electronic resource]. - Access mode: http://www.rg.ru/2001/12/31/admkodeks-dok.html .

8. Commentary on the Criminal Code of the Russian Federation. - 3rd ed., rev. and add./Under total. ed. Yu.I.Skuratova, V.M.Lebedeva. -M.: Norma-Infra-M, 2000. - 896 p.

9. On trade secrets: Feder. Law of July 29, 2004 No. 98-FZ: [adopted by the State. Duma on July 9, 2004: approved by the Federation Council on July 15, 2004]. [Electronic resource]. - Access mode: http://www.rg.ru/2004/08/05/taina-doc.html .

10. About personal data: feder. Law of July 27, 2006 No. 152-FZ: [adopted by the State. Duma on July 8, 2006: approved by the Federation Council on July 14, 2006]. [Electronic resource]. -Access mode: http://www.rg.ru/2006/07/29/personaljnye-dannye-dok.html

11. About information, information technology and on the protection of information: Feder. Law of July 27, 2006 No. 149-FZ: [adopted by the State. Duma on July 8, 2006: approved by the Federation Council on July 14, 2006]. [Electronic resource]. - Access mode: http://www.rg.ru/2006/07/29/informacia-dok.html .

12. List of confidential information: approved. Decree of the President of the Russian Federation of March 6, 1997 No. 188. [Electronic resource]. - Access mode: http://www.fstec.ru/_docs/doc_1_3_008.htm

13. Regulations on certification of informatization objects according to information security requirements: approved. Chairman of the State Technical Commission under the President of the Russian Federation November 25, 1994 [Electronic resource]. - Access mode: http://www.fstec.ru/_razd/_ispo.htm .

14. Rules for classifying information constituting a state secret to various degrees of secrecy: approved. Decree of the Government of the Russian Federation of September 4, 1995 No. No. 870 (as amended on January 15, May 22, 2008). [Electronic resource]. - Access mode: http://govportal.garant.ru:8081/SESSION/SungJswow/PILOT/main.html .

15. Technical protection of information. Basic terms and definitions: recommendations for standardization R 50.1.056-2005: approved. By order of Rostekhregulirovanie dated December 29, 2005 No. 479-st. - Input. 2006-06-01. - M.: Standartinform, 2006. - 16 p.

16. Khorev A.A. Technical protection of information: textbook. allowance for university students. In 3 vols. Vol. 1. Technical channels of information leakage. - M.: SPC "Analytics", 2008. - 436 p.

| Military threat to Russia's national security

Fundamentals of life safety
Grade 9

Lesson 8
Military threat to Russia's national security




At the beginning of the XXI century. Russia is at a new stage in its historical development. Fundamentals are being reformed state structure, the process of reassessment of national values ​​and the coordination of the interests of the individual, society and the state, the further development of socio-economic, political, legal, ethnic ties and relations is being carried out. Approaches to ensuring national security are changing, which, in turn, allows us to reconsider the place and role of Russia in the world.

At the beginning of the new century, the processes of increasing the role of military force to ensure the political and economic interests of the states of the world were outlined. At present, the strong Russian Armed Forces are acquiring geopolitical significance.

In this regard, the organization of the defense of the state - the Russian Federation - is of particular importance.

State defense is a system of political, economic, social and legal measures to prepare for armed defense and armed defense of the Russian Federation, the integrity and inviolability of its territory. It is organized and carried out in accordance with the Constitution of the Russian Federation, federal constitutional laws, the Federal Law "On Defense", other laws of the Russian Federation and regulatory legal acts.

For the purposes of defense, military duty of citizens is established in the country and the Armed Forces of the Russian Federation are created.

The Constitution of the Russian Federation defines the legal foundations and the most significant norms for the organization of the defense of the state and the leadership of the Armed Forces of the Russian Federation. Article 59 of the Constitution states: "Protection of the Fatherland is the duty and obligation of a citizen of the Russian Federation."

The measures that the state takes to organize defense stem from the existing external and internal threats to Russia's national security.

In the current international situation, there are three types of threats to the national security of Russia, the neutralization of which is, to a certain extent, the function of the Armed Forces of the Russian Federation:

external;
internal;
cross-border.

The main external threats include:

Deployment of groupings of forces and means aimed at a military attack on the Russian Federation or its allies;
territorial claims against the Russian Federation, the threat of political or forceful rejection of certain territories from the Russian Federation;
interference in the internal affairs of the Russian Federation by foreign states;
buildup of troop groupings leading to disruption of the existing balance of forces near the borders of the Russian Federation;
armed provocations, including attacks on military installations of the Russian Federation located on the territories of foreign states, as well as on objects and structures on the state border of the Russian Federation or on the borders of its allies;
actions hindering Russia's access to strategically important transport communications;
discrimination, suppression of the rights, freedoms and legitimate interests of citizens of the Russian Federation in foreign countries.

The main internal threats include:

Attempts to forcibly change the constitutional order and violate the territorial integrity of Russia;
planning, preparation and implementation of actions to disrupt and disrupt the functioning of public authorities and administration, attacks on state, national economic, military facilities, life support facilities and information infrastructure;
creation, equipping, training and functioning of illegal armed formations;
illegal distribution on the territory of the Russian Federation of weapons, ammunition and explosives;
large-scale activities of organized crime that threaten political stability across the constituent entities of the Russian Federation;
activities of separatist and radical religious national movements in the Russian Federation.

The main cross-border threats include:

Creation, equipment, provision and training on the territories of other states of armed formations and groups for the purpose of their transfer for operations on the territory of Russia;
activities of subversive separatist, national or religious extremist groups supported from abroad, aimed at undermining the constitutional order of the Russian Federation, creating a threat to the territorial integrity of the Russian Federation and the security of its citizens;
cross-border crime, including smuggling and other illegal activities on a scale that threatens the national security of Russia, conducting information actions hostile to the Russian Federation;
drug trafficking activities that create a threat of drug penetration into the territory of the Russian Federation or drug transit to other countries:
the threat of the activities of international terrorist organizations: at present, there has been a merging of domestic and international terrorism, and its threats are increasing, including with the use of components of weapons of mass destruction.

Proceeding from the foregoing, it should be emphasized that at the present time ensuring the military security of the Russian Federation has become the most important direction of the state's activity. The main goal in this area is to ensure the possibility of an adequate response to the threats that may arise for Russia in the 21st century, taking into account the rational costs of national defense.

Fighters from illegal armed formations in a settlement on the territory of the Republic of Chechnya. 90s 20th century

Liquidation of a warehouse of weapons and ammunition belonging to illegal armed groups. The village of Starye Atagi. Republic of Chechnya, February 2002

Remember! The armed forces of the Russian Federation play the main role in ensuring the military security of the state.

Everyone should know this

The Russian Federation is considering the possibility of using military force to ensure its national security, based on the following principles:

The use of all forces and means at its disposal, including nuclear weapons, if necessary, repelling armed aggression, if all other measures to resolve the crisis situation have been exhausted or have proved ineffective;
the use of military force within the country in strict accordance with the Constitution and federal laws in the event of a threat to the lives of citizens, the territorial integrity of the country, as well as the threat of a violent change in the constitutional order.

Testing of MANPADS "Igla" at the training ground of the air defense troops training center. Krasnodar region, April 2001

Checkpoint of the troops of the Ministry of Internal Affairs on the border with Chechnya. Stavropol Territory, late 90s.

At present, ensuring the national security of Russia from military threats only through political opportunities (membership in international organizations, partnerships, influence opportunities) becomes ineffective.

An analysis of the existing threats to Russia's national security, taking into account the changes that have taken place in the field of military and combat confrontation, put on the agenda the question of the need to reassess the prospects for military construction in Russia, taking into account the role and place of our country in modern world. In this regard, measures are being taken in the country to strengthen and equip the Armed Forces of the Russian Federation with modern weapons.

Questions

1. What role does the defense of the state play in ensuring the national security of Russia?

2. What external threats to Russia's national security currently exist?

3. What threats are internal threats to Russia's national security?

4. What are the main cross-border threats to Russia's national security?

5. What role is currently called upon to play the Armed Forces of the Russian Federation to ensure national security?

Exercise

Give an example of the involvement of the Armed Forces within the country to ensure the security of citizens and the territorial integrity of Russia.