Особенности классификации информационных и киберпреступлений в российском уголовном праве
In article the concept of information crimes reveals, the place and information role as a part of a crime is defined, information characteristic as object and a crime subject is given. In article various approaches to classification of information crimes are analyzed, classification of information crimes, including in connection with categories information, and also on participation of the Russian Federation in the international integration processes in this sphere is offered.
In the article the concept of the electronic document to the Russian legislation, describing the legal status of an electronic document that specifies the location of the electronic document in proof system of criminal and civil procedure, the range of problems in terms of raising the evidentiary value of electronic documents and on the basis of existing international agreements and practical experience in the U.S. this area, offers ways of improving legislation to overcome this legal conflict.
The direction of cloud computing protection development is considered in the article. It is suggested to consider the structure of a queuing system based on processing data centers (PDC), as the combination of six components: the hardware PDC element; telecommunication PDC resources access element; users and the software associated to them; the «middle» PDC layer, providing calculating virtualization and including control system; application services, provided by PDC as the layer of application software for guest operating systems; data storage systems, especially databases. The ways of data protection in every subsystem, the directions of necessary development and the possibility of different security levels provision are discussed in the article. According to the author, the most complicated objective is to certify access control system in modern database systems like Oracle and DB-2.
We study the problem of restricting the rights and freedoms in order to ensure information security. The limitations and problems associated with them relations of public and private interests considered as a system consisting of a set of elements such as objects, subjects of information security and the activities of these entities to ensure information security.
In this paper the authors propose a new approach to teaching practical information security in higher school based on case studies. They justify its place in information security curriculum by providing an example from the experience of using the approach for BSc and MSc students of Higher School of Economics in the courses on «Technical and Organizational Aspects of Information Security and Information Security Technologies». This paper fills the gap in existing practices for teaching information security which currently lack in guidelines for designing case studies and integrating them into the curriculum.
The Handbook of CO₂ in Power Systems' objective is to include the state-of-the-art developments that occurred in power systems taking CO₂ emission into account. The book includes power systems operation modeling with CO₂ emissions considerations, CO₂ market mechanism modeling, CO₂ regulation policy modeling, carbon price forecasting, and carbon capture modeling. For each of the subjects, at least one article authored by a world specialist on the specific domain is included.