Preview

MGIMO Review of International Relations

Advanced search

THE RUSSIAN’S DIGITAL SOVEREIGNTY AS A TECHNICAL BASIS OF INFORMATION SECURITY

https://doi.org/10.24833/2071-8160-2016-6-51-76-91

Abstract

The article deals with the problem of the emergence of concept of "information sovereignty" in Russia, the prospects for its practical and theoretical introduction to the scientific revolution. The problem of "information sovereignty" in the normative documents of Russia, China and other Countries is examined. The focus of the article, first time in the domestic and foreign historiography, the technical aspects of independence in the field of digital technologies is analyzed. In this connection, the most important components of digital sovereignty is analyzed, technically ensuring national security. The author concludes that the main feature of the Russian technical resources to ensure the sovereignty of the information is fragmentary and uneven in the development of its components. The greatest progress has been made in the development of components such as the Russian search engines, social networks, national segment of "Internet"and the navigation system. Russian software and hardware require to ensure the accelerated development of information sovereignty, Russia's national security. The greatest attention should be Russian payment system, because this issue is directly dependent on the direction of development of the national economy. The problem of information sovereignty is largely related to issues of public decision-making, in bringing regulatory and legislative framework in line with the national security concept of the country.

About the Author

V. V. Bukharin
Lomonosov Moscow State University
Russian Federation

Ph.D., Senior Lecturer, School of Public Administration,

Moscow



References

1. Anureev S.V. Platezhnye sistemy i ikh razvitie v Rossii [Payment systems and their development in Russia]. Moscow, Finansy i statistika Publ., 2011. 288 p. (In Russian).

2. Baluev D.G. Vliianie sovremennykh sotsial'nykh media na informatsionnyi suverenitet Rossii: osnovnye podkhody k issledovaniiu [The impact of social media on information sovereignty of Russia: approaches to the study. State and municipal management]. Gosudarstvennoe i munitsipal'noe upravlenie. Uchenye zapiski SKAGS, 2015, no. 3, pp. 140 - 143. (In Russian).

3. Baturin Ju.M., Zhodzizhskij A.M. Komp'juternaja prestupnost' i komp'juternaja bezopasnost' [Computer crime and computer security]. Moscow, Iuridicheskaia literatura Publ., 1991. 160 p. (In Russian).

4. Bodjen Zh. Metod legkogo poznaniia istorii [Method for the easy knowledge of history]. Moscow, Nauka Publ., 2000. 412 p. (In Russian).

5. Bol'shaia sovetskaia entsiklopediia [The Great Soviet Encyclopedia]. Vol. 25. Moscow, Bol'shaia sovetskaia entsiklopediia, 1976. 600 p. (In Russian).

6. Bondarenko A., Marshalko G., Shishkin V. GOST R 34.12–2015: chego ozhidat' ot novogo standarta? [GOST R 34.12-2015: what to expect from the new standard?]. Information Security - Informacionnaja bezopasnost', 2015, no. 4, pp. 48 - 50. (In Russian).

7. Ishchukova E.A., Bogdanov K.I. Realizatsiia algoritma shifrovaniia Magma s ispol'zovaniem tekhnologii NVidia Cuda [Implementation of the encryption algorithm magma using NVidia CUDA technology]. Mezhdunarodnyi zhurnal prikladnykh i fundamental'nykh issledovanii, 2015, no. 12, pp. 789 - 793. (In Russian).

8. Krapivenskii A.S. Verbal'nyi aspekt kul'turnoi bezopasnosti molodezhi v sotsial'nykh setiakh i blogosfere runeta [Verbal aspect of youth cultural security in social networks and blogosphere of runet]. Sovremennye problemy nauki i obrazovaniia, 2012, no. 2. Available at: http://www.science-education.ru/ru/article/ view?id=5935 (Accessed: 04.12.2016). (In Russian).

9. Kriticheski vazhnye ob"ekty i kiberterrorizm. Chast' 2. Aspekty realizatsii sredstv protivodeistviia [Crucial facilities and cyberterrorism. Part 2: Aspects of implementation of countermeasures]. O.O. Andreev, A.S. Shundeev, S.A. Afonin. Ed. by V.A. Vasenin. Moscow, MTsNMO Publ., 2008. 607 p. (In Russian).

10. Kucheryavyi M.M. Gosudarstvennaia politika informatsionnogo suvereniteta Rossii v usloviiakh sovremennogo global'nogo mira [State Policy Information Sovereignty Russia in Today’s Global World]. Upravlencheskoe konsul'tirovanie, 2014, no. 9, pp. 7 - 14. (In Russian).

11. Malashevich B.M. 50 let otechestvennoi mikroelektronike. Kratkie osnovy i istoriia razvitiia [50 years of domestic microelectronics. Brief history of the foundations and development]. Moscow, Tekhnosfera Publ., 2013. 800 p. (In Russian).

12. Naumov A.O. Mjagkaja sila, cvetnye revoljucii i tehnologii smeny politicheskih rezhimov v nachale XXI veka [Soft power, the color revolutions and the technology change of political regimes at the beginning of the XXI century]. Moscow, Argamak-media Publ., 2016. 274 p. (In Russian).

13. Tanenbaum A., Bos H. Modern operating systems. 4th edition. Prentice Hall, 2014. 1101 p. (Rus. Ed.: Tanenbaum A., Bos H. Sovremennye operatsionnye sistemy. 4th edition. Moscow, 2015. 1120 p.).

14. Shiller V.V., Sheludkov N.N. Rossiiskie sotsial'nye seti kak potentsial'naia ugroza natsional'noi bezopasnosti Rossii (na primere saitov «Odnoklassniki» i «VKontakte») [Russian social networking as a potential threat to Russian national security (example «Odnoklassniki» and «VKontakte»)]. Vestnik Kemerovskogo gosudarstvennogo universiteta, 2013, no. 1 (1), pp. 124 - 129. (In Russian).

15. Steinschaden Ja. Phenomen Facebook: Wie eine Webseite unser Leben auf den Kopf stellt. Carl Ueberreuter Verlag GmbH, 2010. 208 p. (Rus. ed.: Shtainshaden Ia. Sotsial'naia set'. Fenomen Facebook. Sankt-Peterburg, 2011. 223 p.).

16. Becker G.T., Regazzoni F., Paar C., and Burleson W.P. Stealthy Dopant-Level Hardware Trojans. Cryptographic Hardware and Embedded Systems - CHES 2013, vol. 8086 of the series Lecture Notes in Computer Science, pp. 197 - 214.

17. Daemen J., Rijmen V. The Design of Rijndael, AES - The Advanced Encryption Standard. Springer-Verlag, 2002. 238 p.

18. Greenwald G. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. New York, Metropolitan Books, 2014. 304 p. Available at: http://us.macmillan.com/static/holt/greenwald/NoPlaceToHideDocuments-Uncompressed.pdf (Accessed 07.10.2016).

19. McMahon R., Bennett I. U.S. Internet Providers and the «Great Firewall of China». Council on Foreign Relations, 23.02.2011. Available at: http://www.cfr.org/internet-policy/us-internet-providers-great-firewall-china/ p9856 (Accessed 07.10.2016).

20. O'Neill J. Echelon: Somebody's Listening. Word Association Publ., 2005. 345 p.

21. Paulson T.M. Intelligence Issues & Developm. Nova Publ., 2008. 177 p.


Review

For citations:


Bukharin V.V. THE RUSSIAN’S DIGITAL SOVEREIGNTY AS A TECHNICAL BASIS OF INFORMATION SECURITY. MGIMO Review of International Relations. 2016;(6(51)):76-91. (In Russ.) https://doi.org/10.24833/2071-8160-2016-6-51-76-91

Views: 3100


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2071-8160 (Print)
ISSN 2541-9099 (Online)