IT | Information Security and the Theory of Unfaithful Information

In this article, the theory of information security is written as a context of national security. Article is devoted to an actual problem of legal support of information security in the Republic of Kazakhstan.

By Aizhan Pernebekovna Pernebekova and Beisenkulov Ayazbi Ahbergenovich


Abstract

In this article, the theory of information security is written as a context of national security. Article is devoted to an actual problem of legal support of information security in the Republic of Kazakhstan. The authors analyzes modern problems and threats of information security in the conditions of globalization and considers aspects of information security. This article focuses on issues of spreading harmful information, which negatively affects the psyche, behavior, health, society and destabilizes the government administration. The article makes the case for improving the legislation of the Republic of Kazakhstan in strengthening informational security of individuals, society, the state, and measures to prevent the destructive impact of harmful information.

IT | Information Security and the Theory of Unfaithful Information

Keywords: Harmful Information, Information Security, Negative Information

In the beginning of the third millennium when the informational society is being established, the information security is taking a leading role in the system of national security. Therefore, formation of one integrated information security policy and its terms of development require priority. Thus the aim of the article is to research political mechanisms of providing information security, and define conceptual basis and principles of information security. In the Address to the people of Kazakhstan “Prosperity, security and ever growing welfare of all the Kazakhstanis” national security is defined as a long-term priority and one of the main aspects of national security is information security. In his later Addresses and during Security board sessions, the president mentioned necessity of developing the system of terms on information security [2] .

Information security is relatively a new term which appeared at the end of XX century. General information theory, notion of information security became the object of research from the mid of the last century, onrush of information technologies and quick involvement of the countries which have just recently turned their development path to catalyst power of developed countries, that is worldwide globalization process, strengthening the actuality of information security.

The Constitution of the Republic of Kazakhstan establishes only general provisions of prohibiting the distribution of harmful information, on this basis we can conclude that harmful information is clearly equated to illegal information. For example the clause 3 of article 13 in the Law of the Republic of Kazakhstan “On mass media” issued on 23rd of July, 1999 constates the basis for stopping to issue or distribute mass media: disclosure of information constituting state secrets or other secrets protected by law, information dissemination, revealing the techniques and tactics of anti-terrorist operations during their implementation, promotion of narcotic drugs, psychotropic substances and precursors, propaganda or agitation of cult of cruelty and violence, social, racial, national, religious, class and tribal superiority, the transmission of radio, television programs, and pornographic and sexual-erotic film and video demonstration, use of media for breaching the pre election campaign, for execution of activities by foreigners, stateless persons, foreign legal bodies, interfering and (or) promoting the nominating or electing of candidates, political parties that nominate party list and achieving certain results in elections, campaigning while its prohibited, forcing to participate or not participate in the strike.

General information theory, notion of information security became the objects of research from the mid of the last century, onrush of information technologies and quick involvement of the countries which have just recently turned their development path to catalyst power of developed countries, that is worldwide globalization process, strengthening the actuality of information security. However it is worth mentioning of works of several Kazakhstani researchers who wrote about information policy.

Famous political scientist G. Zh. Ibrayeva scientifically justified role and position of mass media in conditions of forming democratic society in Kazakhstan. She also researched impact of mass media, media system establishment in the country, state unity saving in conditions of entering the world information space, saving of culture and mentality of Kazakhstan people to information security.

In his doctorate thesis Y. K. Aliyarov paid attention to aspects of international and legal framework of country’s information security as well as to methodological issues of informational policy establishment in conditions of global informational support. Some suggestions of Y. K. Aliyarov were reflected in information security concept of the Republic of Kazakhstan.

Documents, analyzing ways of current legal acts, structural and functional methods act as a methodological basis of the article. Actuality of this article is related to factors and conditions established in society below:

First, dynamic development of information technologies which play significant role in political and economic, socio-cultural life of society and state demands high requirements of solving information security issues, it means dependence of national security form information security is going to raise.

Second, development of globalization process is aligned with economic factors in the country as well as with information process and conditions of entering world information space. In conditions of entering worldwide information space and formation of national security in our country information security should be considered as an essential and exigent part of external and internal policy.

Third, in economic structure of the Republic of Kazakhstan in conditions where sector of raw materials prevail issues of training specialists in this sphere, development of information and communication techniques, technologies which play an important role in information security require their thorough consideration.

Fourth, information expansion of developed countries is strengthening in conditions of world globalization, in its turn it impacts to social, cultural aspects and independence of the country. Therefore researching technical, technological, legal aspects of information security along with humanitarian issues always has been important.

And the reasons for their termination are propaganda or agitation of forced change of the constitutional structure, violation of integrity of the Republic of Kazakhstan, undermining of state security, war, propaganda of extremism or terrorism, publication and dissemination of information materials aimed at inciting ethnic and religious hatred (paragraph 4 of Article 13 of the Law of the Republic of Kazakhstan “On the mass media” dated 23 July 1999).

The definition of harmful information in the legal context for the first time was given by I. L. Bachilo. In her opinion, the harmful information its a such information “the dissemination or use of which entails the need to protect legal entities from its negative impact.” But this is not the only definition of harmful information. Others understand by this the massive information, i.e. that is not confidential which damage entities as a result of its use or disseminating. Note that the definitions of harmful information are generalized and without specifying. However I. Panarin attempted to define them concretely, and as an information that can negatively affect the human psyche he refers the information that creates negative character and specially selected negative facts of reality that may be transmitted on television and in newspapers, information flow to extract one thing from which is impossible.

A. V. Minbaleev [6] lists the harmful information types:

-false (doubtful, incomplete, inaccurate, corrupted);
-propaganda of pornography, violence, cruelty;
-inciting social, racial, national or religious hatred, hostility and superiority;
-destructively influencing on the psyche of the people;
-information about the unhealthy goods and services with limited turnover;
-offences;
-harmful to the health, moral and spiritual development of children;
-improper advertising.

Based on the above mentioned the classification of harmful information can be represented as follows:

-false information, incomplete, corrupted, inaccurate, also imposed;
-inciting social, racial, national or religious hatred, hostility and enmity;
-obscene;
-destructively affects not only on the human psyche, but also on health.

However, in Kazakhstan’s legislation there are no clear criteria for determining harmful information, no any explanation of the “harmful information” concept, there is no provision on execution of an examination by its definition, also it does not contain any rule governing the mechanism for dissemination of this information.

Information and legal security of the person is the protection of all rights relating to the admission to information, which in its turn includes seeking, receiving, possessing, transfer, distribution, copying, non-proliferation, the creation of information.

We should take into account the fact that human consciousness and sub consciousness can be manipulated due to the effect of information. Undoubtedly, manipulation specifically aimed at harming can harm one person as well as indefinite group of people. Manipulation is possible in any sphere of human activity. In the religious sphere the manipulation is aimed at attracting new believers into a particular religious group, in which they became zombie obedient to their leaders directions.

Therefore, the information security of the person forms by protecting the information from threats and harm, by protecting the individual from harmful information.

In general, information security is a feature of all social activities and information process that provides life and development of humanity, turns human life into developed humanistic and information civilization, helps to prevent and eliminate irrelevant problems of informational support [7] . It means that only in conditions of providing information security informatization process of society acting as a development source can turn human life into intellectual and humanistic feature on the basis of information usage [8] .

It is known that information security is one of the main fields of national security of every country. Law “On the national security of the Republic of Kazakhstan”: states “information security-defense state of state information resources and individual rights, society interests in information field”.

Currently issues of providing information security are relevant not only to our country, but also to all developed countries. Information systems in different spheres of life and resource using experience are indicating various risks of losing information which lead to material and other expenses. Moreover reaching of full security of information is a very complicated issue.

It is known if state authorities who make decisions on important issues are not provided with full, genuine and on time information then making precise and reasonable decisions would be hard. Some time ago US president R. Nicholson said “1 dollar spent for false information and outreach is more important than 10 dollars spent for making weapons”. Industry of information editing reached global degree. Complex changes in modern day human society, technologies of data editing influence on significance of information security issues. For instance, according to foreign bibliography sources, at the end of 70’s service type in gathering, editing and using of information reached 46% of product in US national turnover and made 53% of total salary sum [5] . Creation of “electronic” money (credit cards) caused money theft in big amounts. It is possible to find much information on data theft from editing systems of automated data in press and different sources, it demonstrates significance and actuality of mentioned issues.

Providing of information security contains of a set of terms’ system on providing information security and its tools as well as its subjects. The system of terms on providing information security is mainly characterized by significance direction, aim, principles, implementation objects and methods [9] .

The most important of providing information security is legal level. Set of arrangements directed to creating of non-tolerant view to people who violate information security and infringing of information security belong to this level. The most important thing in this level is to create mechanism of law issuing which can follow the progress of information technologies. For sure, predicting everything in advance and issue the law according to it is impossible. However process of law issuing should not be in arrears of development process of information technologies. Because it can lead to information security reduction. One of the requirements of legal level is to correspond each state standards on information technologies and information security with international standards.

Since declaring our independence a lot of law and Presidential decrees, governmental orders on development of information technologies, information security, information defense, information relation were published. It starts with the main articles of the Republic of Kazakhstan on information security of state policy and regulated by laws “On national security”, “On state secrets”, “On informatization”, Presidential decrees, governmental orders, state programs and interstate documents. 22nd article on providing information security is considered in law “On national security of the Republic of Kazakhstan”. In 7th March of 2004 article on “Providing security in communication sphere” was added to this law.

Law “On state secrets” defines legal basis and integrated system of protection of state secrets on providing national security for the benefit of the Republic of Kazakhstan, it regulates social relations which come out of referring the data to state secrets, secreting them, ruling them, protecting and disclosing these secrets. Definitions to the following notions are given in the law: “state secrets”, “state secret”, “confidential information”, “secret sign”, “data sources which are state secrets”, “protection system of state secrets”.

Different information types which are considered as state secrets are shown by this law. For instance, in the following spheres different information types which are considered as state secrets of the Republic of Kazakhstan are given: information on military sphere in 11th article, information on economics, science and technique in 12th article, information of foreign political and economical fields in 13th article, information on intelligence, counterintelligence, strategic search services and etc. In addition arrangements of referring the data to state secrets, order of secreting the data sources which are state secrets, data and principles of secreting their sources, secrecy level of data and secrecy sign of data sources, data and disclosing their secret sources, providing with information that is devoted to integrated and other works, giving secret information to foreign countries, giving permission of secret information to authorities of the Republic of Kazakhstan, citizens, and foreigners, certificating ways of protection tools of state secrets are indicated in the law.

Security policy is formed on the basis of analyses about the exact threats, which are dangerous for informational systems of organization. After analyzing possible threats and identifying protection strategy, the programme maintaining the information security will be adopted. Resources will be divided and responsible people will be appointed and the progress control will be identified according to this programme.

In the Ph.D. thesis “The development strategy of information policy of the Republic of Kazakhstan during the transition period” by A. Sarsenbaev, the aspects of information security were classified as external and internal:

The external aspect of information security is the necessity of organizing protection from the corrupted, false, aggressive and other external data, which affect negatively on the internal stability of a country, social and political processes and national identity. Keeping country’s information security is that the government has rights to protect its national informational space from the external danger according to the interests of society and government.

The internal aspect of information security is to protect informational space against internal information which run counter to the national security, territorial integrity of a country, independence and interests of citizenry. The formation of the national informational system competitive with informational systems of other countries, preventive measures of national channels from external “attacks” are also considered as the internal informational system.

Currently, different types of mass media, also research papers, symposiums and conferences are mentioning the globalization process about which the whole world concerned.

Globalization is to attract the whole world to open system of financial and economic, socio-political and cultural relations using the advanced technology and informational space. This is an objective process, and now it accelerated [1] . Informatization of the world gives an opportunity to increase the role of non-governmental structures along with traditional players of international relations, governments. In our modern society, the n­ew field, i.e. information sphere is coming out on top. Information sphere differentiates with the new contradictions formed in the result of fight directed to information and to acquirement of information as a new resource. Because of that, new threats related to the cyber security are appeared. In this case, there will be formed new view point to the notion “national security” as the most important function of government. In the case of globalization, also the notion “military force” will be changed, and the importance of information weapon increases compared to old traditional weapon. The improvement of the role of information technology in the sphere of security led to the introduction of new concept like “information war” in the structure of army force on the part of west countries, especially the USA.

The provided details are only one of examples related to economic, technical aspects of the information security. Regarding the social-spiritual security, it is a natural phenomenon to have adverse effects as well as benefits of overall IT penetration in out society as the process of accessing to the global information space develops. The influence of mass media culture surely may move away the national culture on the second place. Because we can often see in any types of mass media, also Internet network compared to the level of mass media many materials that are inappropriate for our culture, education, It is perfectly clean that different programs and movies propagandizing violence, war, pornography in newspapers, magazines, TV have bad influence on youngsters and teenagers. If some call it “weaponless war”, some are calling as “informational war”, “information battle”. American experts listed the following ways of informational counter actions (informational war, informational weapon):

-control system warfare;
-informational-reconnaissance operations;
-electronic warfare;
-against hackers (computer crime);
-informational and psychological warfare;
-cybernetic warfare;
-network warfare (including the informational terrorism);
-economical-informational warfare [10] .

Generally, the aim of informational war, which is the danger for every country now, is that certain country (union of countries) takes dominance on informational sphere­, and influences on their enemies explicitly or implicitly using available information resources, control their actions. In this case, it requires huge material and intellectual inputs, and a lot of time to restore the defeated part.

The informational warfare isn’t used by the defense forces, and aimed to military objects. Other government organs and organizations, industrial and commercial structures participate in the informational warfare, and conduct their informational operations effecting on the solution of a conflict that take place. Therefore, we can say that the informational warfare is the complex of measures and operations oriented to provide ­the informational superiority comparison with opponents, and conducted by defense forces and other organizations in the interest of state national security.

Nowadays, the rate and capital of informational business are growing fast compared to other business. People who were in time and gave “interesting” information are earning money. Therefore, particular information is given in different form, in different content and finally it will be unknown which of them is right and which of them is wrong. It is obvious that user is not always able to clarify the true facts of the matter. It violates the right of individual of getting true information and intellectual proprietary rights of the owners of information. In this case, international network Internet plays a significant role, it may be used as an instrument of influence which propagandizes international terrorism, international dissension and religious extremism because of its openness and accessibility. The spiritual life requires public ideology which was prepared taking into account the interests of several ethnic groups who live in a particular area, their cultural and historical traditions in order to prevent and deactivate threats of informational security. It is said that the clear measures of evaluating the dangers of information security, main advantages in this area and state policy may be stated on the base of such ideology.
Information security in Kazakhstan is actual in all areas of society. It is clear that development of the process of globalization is directly related to information process, conditions of introducing to the world information space together with economic factors in the country. Therefore information space and its participants such as state structure, mass media, social organizations, individual citizens play an important role in forming and praising national soul and national patriotism.

Results of the conducted investigations give opportunities to suggest in the following theoretical and practical directions:

Ÿ One of the main political mechanisms to provide with the information security is to improve acts of normative and legal system in accordance with the process of technology developments. Teaching, explaining, helping works should be conducted in the process of law adoption, not prohibition and deterrence. The law in use is generally directed to secure information resources and the right of state power together with the state interests in the information field. Free access to information which is defined with the constitution of citizens, also legal acts that regulate the rights of information security, are not enough. Therefore, it is necessary to make the laws, such as “Information and information security”, “About separate information”. It is also necessary to pay attention to appropriateness of laws, which are adopted, will be adopted, changed and completed, and other normative right acts in version written in the national speech and Russian language [11] -[14] .

Ÿ It is necessary to provide citizens with the right to get information on the function of the government body, improve the system “electronic government” used in order to increase types of electronic services for people, government bodies participated in the system, social organizations and access of citizens to the information resources and the security of information resources. State power bodies which participate in the system and vertically directed connection in exchange of information between the people are established. There is the insufficiency of horizontal communication between government bodies. Also low level of openness in the local self-control bodies, bureaucratic corruption attempts, lack of professional specialists and low level of their wages are reasons of that there are no works devoted to the security of state secrets appropriate to their level in the field of “electronic administration” program and measures that are obligatory to do.

About The Authors:

L. N. Gumilyov Eurasian National University, Astana, Republic of Kazakhstan

Cite this Article:

Aizhan PernebekovnaPernebekova,Beisenkulov AyazbiAhbergenovich, (2015) Information Security and the Theory of Unfaithful Information. Journal of Information Security,06,265-272. doi:10.4236/jis.2015.64026

Publication Details:

Journal of Information Security, Vol.06 No.04(2015), 
Article ID:59476,7 pages  10.4236/jis.2015.64026

Copyright © 2015 by authors and Scientific Research Publishing Inc.

References:

  1. 1. Krutskih, А.V. (2004) War or Peace: International Aspects.... Scientific and Methodological Problems of Information Security (Collected Works). Moscow.
  1. 2. New Ten-Grades—New Economic Development—New Opportunities of Kazakhstan. Message of President of the Republic of Kazakhstan N.A. Nazarbaev to peoples of Kazakhstan, Egemen Kazakhstan, 30 January 2010.
  1. 3. Маzur, М. (1974) Quaity Theory of Information. Моscow, Мir 1974, Grachev G.
  1. 4. Domozetov, H. (2000) Computerization and Problems of Human Health, Freedom and Development. Philosophical and Sociological Thought, No. 4.
  1. 5. Melnikov, V. (1997) Information Security in Computer Systems. Moscow: Finances and Statistics; Electroinform, p. 368.
  1. 6. Minbaleev, А.V. (2005) Harmful Information as an Object of Legal Relations. Actual Problems of Modern Law and Legal Education: Materials of Scientific and Practical Conference. Publishing House of University for the Humanities, Ekaterinburg.
  1. 7. Baturin, Y.M. (1987) Right and Policy in Computer Sphere. Moscow: Science, p. 112.
  1. 8. Stolyarov, N.V. (n.d.) Notion, Essence, Aims and Meaning of Information Security.http://www.sec4all.net/infoprot-zakl.html
  1. 9. About the National Security of the Republic of Kazakhstan, 26 June, 1998 Low N 233.www.e.gov.kz
  1. 10. Decree No. 174 of President of the Republic of Kazakhstan dated 14th of November, 2014. (On Approving the Concept of Information Security in the Republic of Kazakhstan until 2016)
  1. 11. Lopatin, V.N. (2000) Information Security of Russia: Man. Society. State, Моscow.
  1. 12. Мelnik, I. (1999) Manipulation of Person: The Arrangement, Methods and Technologies of Information and Psychological Impact. Institute of Philosophy of RAS, Моscow.
  1. 13. Law No. 178-IV of the Republic of Kazakhstan issued on 10th of July, 2009. (Оn Implementing Amendments and Additions to Certain Legislative Acts of the Republic of Kazakhstan on Problems of Information and Communication Networks. Kazakhstanskaya Pravda, 2009, July 22)

  1. 14. Berdibayev, R.Sh. (2010) Political Mechanisms of Providing Information Security in the Republic of Kazakhstan: Dissertation of Candidate of Political Sciences, Almaty.
Name

-51,1,3D Technology,2,5G,9,Abkhazia,2,Academics,10,Accidents,21,Activism,1,Adani Group,4,ADB,12,ADIZ,1,Adults,1,Advertising,31,Advisory,2,Aerial Reconnaissance,13,Aerial Warfare,35,Aerospace,5,Afghanistan,88,Africa,111,Agile Methodology,2,Agriculture,20,AI Policy,1,Air Crash,10,Air Defence Identification Zone,1,Air Defense,6,Air Force,29,Air Pollution,1,Airbus,5,Aircraft Carriers,5,Aircraft Systems,5,Al Nusra,1,Al Qaida,4,Al Shabab,1,Alaska,1,ALBA,1,Albania,2,Algeria,3,Alibaba,1,American History,4,AmritaJash,10,Antarctic,1,Antarctica,1,Anthropology,7,Anti Narcotics,12,Anti Tank,1,Anti-Corruption,4,Anti-dumping,1,Anti-Piracy,2,Anti-Submarine,1,Anti-Terrorism Legislation,1,Antitrust,2,APEC,1,Apple,2,Applied Sciences,2,AQAP,2,Arab League,3,Architecture,2,Arctic,6,Argentina,7,Armenia,30,Army,3,Art,3,Artificial Intelligence,81,Artillery,2,Arunachal Pradesh,2,ASEAN,12,Asia,70,Asia Pacific,23,Assassination,2,Asset Management,1,Astrophysics,2,ATGM,1,Atmospheric Science,1,Atomic.Atom,1,Augmented Reality,7,Australia,56,Austria,1,Automation,13,Automotive,129,Autonomous Flight,2,Autonomous Vehicle,3,Aviation,63,AWACS,2,Awards,17,Azerbaijan,16,Azeri,1,B2B,1,Bahrain,9,Balance of Payments,2,Balance of Trade,3,Balkan,10,Balochistan,2,Baltic,3,Baluchistan,8,Bangladesh,28,Banking,52,Bankruptcy,2,Basel,1,Bashar Al Asad,1,Battery Technology,3,Bay of Bengal,5,BBC,2,Beijing,1,Belarus,3,Belgium,1,Belt Road Initiative,3,Beto O'Rourke,1,BFSI,1,Bhutan,13,Big Data,30,Big Tech,1,Bilateral Cooperation,19,BIMSTEC,1,Biography,1,Biotechnology,3,Birth,1,BISA,1,Bitcoin,9,Black Lives Matter,1,Black Money,3,Black Sea,2,Blockchain,32,Blood Diamonds,1,Bloomberg,1,Boeing,21,Boko Haram,7,Bolivia,6,Bomb,3,Bond Market,2,Book,11,Book Review,24,Border Conflicts,11,Border Control and Surveillance,7,Bosnia,1,Brand Management,14,Brazil,104,Brexit,22,BRI,5,BRICS,20,British,3,Broadcasting,16,Brunei,3,Brussels,1,Buddhism,1,Budget,4,Build Back Better,1,Bulgaria,1,Burma,2,Business & Economy,1193,C-UAS,1,California,5,Call for Proposals,1,Cambodia,7,Cameroon,1,Canada,54,Canadian Security Intelligence Service (CSIS),1,Carbon Economy,9,CAREC,1,Caribbean,9,CARICOM,1,Caspian Sea,2,Catalan,3,Catholic Church,1,Caucasus,9,CBRN,1,Cement,1,Central African Republic,1,Central Asia,81,Central Asian,3,Central Eastern Europe,48,Certification,1,Chad,2,Chanakya,1,Charity,2,Chatbots,2,Chemicals,7,Child Labor,1,Child Marriage,1,Children,4,Chile,10,China,576,Christianity,1,CIA,1,CIS,5,Citizenship,2,Civil Engineering,2,Civil Liberties,5,Civil Rights,2,Civil Society,5,Civil Unrest,1,Civilization,1,Clean Energy,5,Climate,66,Climate Change,22,Climate Finance,2,Clinical Research,3,Clinton,1,Cloud Computing,44,Coal,6,Coast Guard,3,Cocoa,1,Cognitive Computing,12,Cold War,5,Colombia,15,Commodities,4,Communication,11,Communism,3,Compliance,1,Computers,40,Computing,1,Conferences,1,Conflict,107,Conflict Diamonds,1,Conflict Resolution,48,Conflict Resources,1,Congo,1,Construction,5,Consumer Behavior,4,Consumer Price Index,4,COP26,4,COP28,1,Copper,2,Coronavirus,107,Corporate Communication,1,Corporate Governance,4,Corporate Social Responsibility,4,Corruption,4,Costa Rica,2,Counter Intelligence,15,Counter Terrorism,81,COVID,9,COVID Vaccine,6,CPEC,8,CPG,3,Credit,2,Credit Rating,1,Credit Score,1,Crimea,4,CRM,1,Croatia,2,Crypto Currency,16,Cryptography,1,CSTO,1,Cuba,7,Culture,5,Currency,8,Customer Relationship Management,1,Cyber Attack,7,Cyber Crime,2,Cyber Security & Warfare,115,Cybernetics,5,Cyberwarfare,16,Cyclone,1,Cyprus,5,Czech Republic,3,DACA,1,DARPA,3,Data,9,Data Analytics,36,Data Center,2,Data Science,2,Database,3,Daughter.Leslee,1,Davos,1,DEA,1,DeBeers,1,Debt,12,Decision Support System,5,Defense,12,Defense Deals,8,Deforestation,2,Deloitte,1,Democracy,22,Democrats,2,Demographic Studies,1,Demonetization,6,Denmark. F-35,1,Denuclearization,1,Diamonds,1,Digital,39,Digital Currency,1,Digital Economy,10,Digital Marketing,6,Digital Transformation,11,Diplomacy,14,Diplomatic Row,2,Disaster Management,4,Disinformation,2,Diversity & Inclusion,1,Djibouti,2,Documentary,3,Doklam,2,Dokolam,1,Dominica,2,Donald Trump,48,Donetsk,2,Dossier,2,Drones,14,E-Government,2,E-International Relations,1,Earning Reports,3,Earth Science,1,Earthquake,7,East Africa,2,East China Sea,9,eBook,1,ECB,1,eCommerce,11,Econometrics,2,Economic Justice,1,Economics,43,Economy,108,ECOWAS,2,Ecuador,3,Edge Computing,2,Editor's Opinion,51,Education,65,EFTA,1,Egypt,27,Election Disinformation,1,Elections,42,Electric Vehicle,15,Electricity,7,Electronics,8,Emerging Markets,1,Employment,19,Energy,316,Energy Policy,28,Energy Politics,27,Engineering,24,England,2,Enterprise Software Solutions,8,Entrepreneurship,15,Environment,47,ePayments,13,Epidemic,6,ESA,1,Ethiopia,3,Eulogy,4,Eurasia,3,Euro,6,Europe,13,European Union,229,EuroZone,5,Exchange-traded Funds,1,Exclusive,2,Exhibitions,2,Explosives,1,Export Import,6,F-35,6,Facebook,9,Fake News,3,Fallen,1,FARC,2,Farnborough. United Kingdom,2,FATF,1,FDI,5,Featured,1352,Federal Reserve,2,Fidel Castro,1,FIFA World Cup,1,Fiji,1,Finance,18,Financial Markets,58,Financial Planning,1,Financial Statement,2,Finland,5,Fintech,14,Fiscal Policy,14,Fishery,3,Five Eyes,1,Food Security,27,Forces,1,Forecasting,2,Foreign Policy,13,Forex,4,France,33,Free Market,1,Free Syrian Army,4,Free Trade Agreement,1,Freedom,3,Freedom of Press,1,Freedom of Speech,2,Frigate,1,FTC,1,Fujairah,97,Fund Management,1,Funding,22,Future,1,G20,10,G24,1,G7,4,Gaddafi,1,Gambia,2,Gaming,1,Garissa Attack,1,Gas Price,23,GATT,1,Gaza,13,GCC,11,GDP,13,GDPR,1,Gender Studies,2,Geneal Management,1,General Management,1,Generative AI,7,Genetics,1,Geo Politics,105,Geography,2,Geoint,14,Geopolitics,8,Georgia,11,Georgian,1,geospatial,9,Geothermal,2,Germany,67,Ghana,3,Gibratar,1,Gig economy,1,Global Perception,1,Global Trade,95,Global Warming,1,Global Water Crisis,11,Globalization,3,Gold,2,Google,20,Gorkhaland,1,Government,128,Government Analytics,1,GPS,1,Greater Asia,170,Greece,13,Green Bonds,1,Green Energy,3,Greenland,1,Gross Domestic Product,1,GST,1,Gujarat,6,Gulf of Tonkin,1,Gun Control,4,Hacking,4,Haiti,2,Hamas,10,Hasan,1,Health,8,Healthcare,72,Heatwave,1,Helicopter,12,Heliport,1,Hezbollah,3,High Altitude Warfare,1,High Speed Railway System,1,Hillary 2016,1,Hillary Clinton,1,Himalaya,1,Hinduism,2,Hindutva,4,History,10,Home Security,1,Honduras,2,Hong Kong,7,Horn of Africa,5,Housing,16,Houthi,12,Howitzer,1,Human Development,32,Human Resource Management,5,Human Rights,6,Humanitarian,3,Hungary,3,Hunger,3,Hydrocarbon,3,Hydrogen,4,IAEA,2,ICBM,1,Iceland,2,ICO,1,Identification,2,IDF,1,Imaging,2,IMEEC,2,IMF,76,Immigration,19,Impeachment,1,Imran Khan,1,Independent Media,72,India,653,India's,1,Indian Air Force,19,Indian Army,7,Indian Nationalism,1,Indian Navy,27,Indian Ocean,24,Indices,1,Indigenous rights,1,Indo-Pacific,4,Indonesia,19,IndraStra,1,Industrial Accidents,4,Industrial Automation,2,Industrial Safety,4,Inflation,10,Infographic,1,Information Leaks,1,Infrastructure,3,Innovations,22,Insider Trading,1,Insurance,3,Intellectual Property,3,Intelligence,5,Intelligence Analysis,8,Interest Rate,3,International Business,13,International Law,11,International Relations,9,Internet,53,Internet of Things,34,Interview,8,Intra-Government,5,Investigative Journalism,4,Investment,32,Investor Relations,1,iPhone,1,IPO,4,Iran,202,Iraq,54,IRGC,1,Iron & Steel,4,ISAF,1,ISIL,9,ISIS,33,Islam,12,Islamic Banking,1,Islamic State,86,Israel,142,ISRO,1,IT ITeS,136,Italy,10,Ivory Coast,1,Jabhat al-Nusra,1,Jack Ma,1,Jamaica,3,Japan,88,JASDF,1,Jihad,1,JMSDF,1,Joe Biden,8,Joint Strike Fighter,5,Jordan,7,Journalism,6,Judicial,4,Justice System,3,Kanchin,1,Kashmir,8,Kaspersky,1,Kazakhstan,25,Kenya,5,Khalistan,2,Kiev,1,Kindle,700,Knowledge Management,4,Korean Conflict,1,Kosovo,2,Kubernetes,1,Kurdistan,8,Kurds,10,Kuwait,7,Kyrgyzstan,9,Labor Laws,10,Labor Market,4,Land Reforms,3,Land Warfare,21,Languages,1,Laos,2,Large language models,1,Laser Defense Systems,1,Latin America,80,Law,6,Leadership,3,Lebanon,10,Legal,11,LGBTQ,2,Li Keqiang,1,Liberalism,1,Library Science,1,Libya,14,Liechtenstein,1,Lifestyle,1,Light Battle Tank,1,Linkedin,1,Littoral Warfare,2,Livelihood,3,Loans,9,Lockdown,1,Lone Wolf Attacks,2,Lugansk,2,Macedonia,1,Machine Learning,7,Madagascar,1,Mahmoud,1,Main Battle Tank,3,Malaysia,12,Maldives,13,Mali,7,Malware,2,Management Consulting,6,Manpower,1,Manto,1,Manufacturing,15,Marijuana,1,Marine Engineering,3,Maritime,50,Market Research,2,Marketing,38,Mars,2,Martech,10,Mass Media,29,Mass Shooting,1,Material Science,2,Mauritania,1,Mauritius,2,MDGs,1,Mechatronics,2,Media War,1,MediaWiki,1,Medicare,1,Mediterranean,12,MENA,6,Mental Health,4,Mercosur,2,Mergers and Acquisitions,18,Meta,2,Metadata,2,Metals,3,Mexico,13,Micro-finance,4,Microsoft,12,Migration,19,Mike Pence,1,Military,110,Military Exercise,10,Military Service,1,Military-Industrial Complex,3,Mining,15,Missile Launching Facilities,6,Missile Systems,56,Mobile Apps,3,Mobile Communications,11,Mobility,4,Modi,8,Moldova,1,Monaco,1,Monetary Policy,6,Money Market,2,Mongolia,11,Monkeypox,1,Monsoon,1,Montreux Convention,1,Moon,4,Morocco,2,Morsi,1,Mortgage,3,Moscow,2,Motivation,1,Mozambique,1,Mubarak,1,Multilateralism,2,Mumbai,1,Muslim Brotherhood,2,Mutual Funds,1,Myanmar,30,NAFTA,3,NAM,2,Namibia,1,Nanotechnology,4,Narendra Modi,2,NASA,13,National Identification Card,1,National Security,5,Nationalism,2,NATO,33,Natural Disasters,14,Natural Gas,33,Natural Language Processing,1,Nauru,1,Naval Base,5,Naval Engineering,23,Naval Intelligence,2,Naval Postgraduate School,2,Naval Warfare,50,Navigation,2,Navy,23,NBC Warfare,2,NDC,1,Nearshoring,1,Negotiations,2,Nepal,12,Netflix,1,Neurosciences,7,New Delhi,4,New Normal,1,New York,5,New Zealand,7,News,1246,News Publishers,1,Newspaper,1,NFT,1,NGO,1,Nicaragua,1,Niger,3,Nigeria,10,Nikki Haley,1,Nirbhaya,1,Non Aligned Movement,1,Non Government Organization,4,Nonproliferation,2,North Africa,23,North America,53,North Korea,58,Norway,5,NSA,1,NSG,2,Nuclear,41,Nuclear Agreement,32,Nuclear Doctrine,2,Nuclear Energy,4,Nuclear Fussion,1,Nuclear Propulsion,2,Nuclear Security,47,Nuclear Submarine,1,NYSE,1,Obama,3,ObamaCare,2,OBOR,15,Ocean Engineering,1,Oceania,2,OECD,5,OFID,5,Oil & Gas,382,Oil Gas,7,Oil Price,73,Olympics,2,Oman,25,Omicron,1,Oncology,1,Online Education,5,Online Reputation Management,1,OPEC,129,Open Access,1,Open Journal Systems,1,Open Letter,1,Open Source,4,OpenAI,2,Operation Unified Protector,1,Operational Research,4,Opinion,688,Opinon Poll,1,Optical Communications,1,Pacific,5,Pakistan,181,Pakistan Air Force,3,Pakistan Army,1,Pakistan Navy,3,Palestine,24,Palm Oil,1,Pandemic,84,Papal,1,Paper,3,Papers,110,Papua New Guinea,2,Paracels,1,Partition,1,Partnership,1,Party Congress,1,Passport,1,Patents,2,PATRIOT Act,1,Peace Deal,6,Peacekeeping Mission,1,Pension,1,People Management,1,Persian Gulf,19,Peru,5,Petrochemicals,1,Petroleum,19,Pharmaceuticals,14,Philippines,17,Philosophy,2,Photos,3,Physics,1,Pipelines,5,PLA,2,PLAN,4,Plastic Industry,2,Poland,8,Polar,1,Policing,1,Policy,8,Policy Brief,6,Political Studies,1,Politics,52,Polynesia,3,Pope,1,Population,6,Portugal,1,Poverty,8,Power Transmission,6,President APJ Abdul Kalam,2,Presidential Election,30,Press Release,158,Prison System,1,Privacy,18,Private Equity,2,Private Military Contractors,2,Privatization,1,Programming,1,Project Management,4,Propaganda,5,Protests,11,Psychology,3,Public Policy,55,Public Relations,1,Public Safety,7,Publications,1,Publishing,7,Purchasing Managers' Index,1,Putin,7,Q&A,1,Qatar,114,QC/QA,1,Qods Force,1,Quad,1,Quantum Computing,3,Quantum Physics,4,Quarter Results,2,Racial Justice,2,RADAR,2,Rahul Guhathakurta,4,Railway,9,Raj,1,Ranking,4,Rape,1,RBI,1,RCEP,2,Real Estate,6,Recall,4,Recession,2,Red Sea,5,Referendum,5,Reforms,18,Refugee,23,Regional,4,Regulations,2,Rehabilitation,1,Religion & Spirituality,9,Renewable,17,Report,4,Reports,47,Repository,1,Republicans,3,Rescue Operation,1,Research,5,Research and Development,24,Restructuring,1,Retail,36,Revenue Management,1,Rice,1,Risk Management,5,Robotics,8,Rohingya,5,Romania,2,Royal Canadian Air Force,1,Rupee,1,Russia,311,Russian Navy,5,Saab,1,Saadat,1,SAARC,6,Safety,1,SAFTA,1,SAM,2,Samoa,1,Sanctions,5,SAR,1,SAT,1,Satellite,14,Saudi Arabia,129,Scandinavia,6,Science & Technology,392,Science Fiction,1,SCO,5,Scotland,6,Scud Missile,1,Sea Lanes of Communications,4,SEBI,3,Securities,2,Security,6,Semiconductor,18,Senate,4,Senegal,1,SEO,5,Serbia,4,Services Sector,1,Seychelles,2,SEZ,1,Shadow Bank,1,Shale Gas,4,Shanghai,1,Sharjah,12,Shia,6,Shinzo Abe,1,Shipping,11,Shutdown,2,Siachen,1,Sierra Leone,1,Signal Intelligence,1,Sikkim,5,Silicon Valley,1,Silk Route,6,Simulations,2,Sinai,1,Singapore,16,Situational Awareness,20,Small Modular Nuclear Reactors,1,Smart Cities,7,Social Media,1,Social Media Intelligence,40,Social Policy,40,Social Science,1,Social Security,1,Socialism,1,Soft Power,1,Software,7,Solar Energy,15,Somalia,5,South Africa,20,South America,46,South Asia,467,South China Sea,35,South East Asia,74,South Korea,58,South Sudan,4,Sovereign Wealth Funds,1,Soviet,2,Soviet Union,9,Space,46,Space Station,2,Spain,9,Special Forces,1,Sports,3,Sports Diplomacy,1,Spratlys,1,Sri Lanka,23,Stablecoin,1,Stamps,1,Startups,43,State of the Union,1,Statistics,1,STEM,1,Stephen Harper,1,Stock Markets,23,Storm,2,Strategy Games,5,Strike,1,Sub-Sahara,3,Submarine,16,Sudan,5,Sunni,6,Super computing,1,Supply Chain Management,47,Surveillance,13,Survey,5,Sustainable Development,18,Swami Vivekananda,1,Sweden,4,Switzerland,6,Syria,112,Taiwan,30,Tajikistan,12,Taliban,17,Tamar Gas Fields,1,Tamil,1,Tanzania,4,Tariff,4,Tata,3,Taxation,25,Tech Fest,1,Technology,13,Tel-Aviv,1,Telecom,24,Telematics,1,Territorial Disputes,1,Terrorism,77,Testing,2,Texas,3,Thailand,11,The Middle East,649,Think Tank,316,Tibet,3,TikTok,1,Tobacco,1,Tonga,1,Total Quality Management,2,Town Planning,2,TPP,2,Trade Agreements,14,Trade War,10,Trademarks,1,Trainging and Development,1,Transcaucasus,19,Transcript,4,Transpacific,2,Transportation,47,Travel and Tourism,13,Tsar,1,Tunisia,7,Turkey,74,Turkmenistan,10,U.S. Air Force,3,U.S. Dollar,2,UAE,139,UAV,23,UCAV,1,Udwains,1,Uganda,1,Ukraine,110,Ukraine War,22,Ummah,1,UNCLOS,7,Unemployment,1,UNESCO,1,UNHCR,1,UNIDO,2,United Kingdom,82,United Nations,28,United States,754,University and Colleges,4,Uranium,2,Urban Planning,10,US Army,12,US Army Aviation,1,US Congress,1,US FDA,1,US Navy,18,US Postal Service,1,US Senate,1,US Space Force,2,USA,16,USAF,21,USV,1,UUV,1,Uyghur,3,Uzbekistan,13,Valuation,1,Vatican,3,Vedant,1,Venezuela,19,Venture Capital,4,Vibrant Gujarat,1,Victim,1,Videogames,1,Vietnam,24,Virtual Reality,7,Vision 2030,1,VPN,1,Wahhabism,3,War,1,War Games,1,Warfare,1,Water,17,Water Politics,7,Weapons,11,Wearable,2,Weather,2,Webinar,1,WeChat,1,WEF,3,Welfare,1,West,2,West Africa,19,West Bengal,2,Western Sahara,2,White House,1,Whitepaper,2,WHO,3,Wholesale Price Index,1,Wikileaks,1,Wikipedia,2,Wildfire,1,Wildlife,3,Wind Energy,1,Windows,1,Wireless Security,1,Wisconsin,1,Women,10,Women's Right,11,Workers Union,1,Workshop,1,World Bank,35,World Economy,32,World Peace,10,World War I,1,World War II,3,WTO,6,Wyoming,1,Xi Jinping,9,Xinjiang,2,Yemen,28,Yevgeny Prigozhin,1,Zbigniew Brzezinski,1,Zimbabwe,2,
ltr
item
IndraStra Global: IT | Information Security and the Theory of Unfaithful Information
IT | Information Security and the Theory of Unfaithful Information
In this article, the theory of information security is written as a context of national security. Article is devoted to an actual problem of legal support of information security in the Republic of Kazakhstan.
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbwawaQ2OqkauoctbL_14JNAcB_s9DCPmJUW0DMAhcDPZ320aAwqCDy49mI3rZce_HDYfIf1gnoU78LnrSjEBNfdHocLR6kIHyn55q-rDsCBPTQZKNkz7lRmp9ImAIwwDS0bkj12lljSzE/s640/information-security-solutions.jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbwawaQ2OqkauoctbL_14JNAcB_s9DCPmJUW0DMAhcDPZ320aAwqCDy49mI3rZce_HDYfIf1gnoU78LnrSjEBNfdHocLR6kIHyn55q-rDsCBPTQZKNkz7lRmp9ImAIwwDS0bkj12lljSzE/s72-c/information-security-solutions.jpg
IndraStra Global
https://www.indrastra.com/2016/01/IT-Info-Security-and-theory-of-Unfaithful-Information-002-01-2016-0035.html
https://www.indrastra.com/
https://www.indrastra.com/
https://www.indrastra.com/2016/01/IT-Info-Security-and-theory-of-Unfaithful-Information-002-01-2016-0035.html
true
1461303524738926686
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content