<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE root>
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ali="http://www.niso.org/schemas/ali/1.0/" article-type="research-article" dtd-version="1.2" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">RUDN Journal of Law</journal-id><journal-title-group><journal-title xml:lang="en">RUDN Journal of Law</journal-title><trans-title-group xml:lang="ru"><trans-title>Вестник Российского университета дружбы народов. Серия: Юридические науки</trans-title></trans-title-group></journal-title-group><issn publication-format="print">2313-2337</issn><issn publication-format="electronic">2408-9001</issn><publisher><publisher-name xml:lang="en">Peoples’ Friendship University of Russia named after Patrice Lumumba (RUDN University)</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">35038</article-id><article-id pub-id-type="doi">10.22363/2313-2337-2023-27-2-500-521</article-id><article-id pub-id-type="edn">GPPYPM</article-id><article-categories><subj-group subj-group-type="toc-heading" xml:lang="en"><subject>LAW AND DIGITAL TECHNOLOGIES</subject></subj-group><subj-group subj-group-type="toc-heading" xml:lang="ru"><subject>ПРАВО И ЦИФРОВЫЕ ТЕХНОЛОГИИ</subject></subj-group><subj-group subj-group-type="article-type"><subject>Research Article</subject></subj-group></article-categories><title-group><article-title xml:lang="en">Legal support for the development of sustainable and secure information and telecommunications infrastructure</article-title><trans-title-group xml:lang="ru"><trans-title>Правовое обеспечение развития устойчивой и безопасной информационно-телекоммуникационной инфраструктуры</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-9069-8830</contrib-id><contrib-id contrib-id-type="researcherid">L-2766-2018</contrib-id><contrib-id contrib-id-type="spin">3633-3515</contrib-id><name-alternatives><name xml:lang="en"><surname>Belousov</surname><given-names>Andrey L.</given-names></name><name xml:lang="ru"><surname>Белоусов</surname><given-names>Андрей Леонидович</given-names></name></name-alternatives><bio xml:lang="en"><p>Candidate of Economic Sciences, Associate Professor of the Department of Legal Regulation of Economic Activities</p></bio><bio xml:lang="ru"><p>кандидат экономических наук, доцент департамента правового регулирования экономической деятельности</p></bio><email>andreybelousov@mail.ru</email><xref ref-type="aff" rid="aff1"/></contrib></contrib-group><aff-alternatives id="aff1"><aff><institution xml:lang="en">Financial University under the Government of the Russian Federation</institution></aff><aff><institution xml:lang="ru">Финансовый университет при Правительстве Российской Федерации</institution></aff></aff-alternatives><pub-date date-type="pub" iso-8601-date="2023-06-23" publication-format="electronic"><day>23</day><month>06</month><year>2023</year></pub-date><volume>27</volume><issue>2</issue><issue-title xml:lang="en">VOL 27, NO2 (2023)</issue-title><issue-title xml:lang="ru">ТОМ 27, №2 (2023)</issue-title><fpage>500</fpage><lpage>521</lpage><history><date date-type="received" iso-8601-date="2023-06-22"><day>22</day><month>06</month><year>2023</year></date></history><permissions><copyright-statement xml:lang="en">Copyright ©; 2023, Belousov A.L.</copyright-statement><copyright-statement xml:lang="ru">Copyright ©; 2023, Белоусов А.Л.</copyright-statement><copyright-year>2023</copyright-year><copyright-holder xml:lang="en">Belousov A.L.</copyright-holder><copyright-holder xml:lang="ru">Белоусов А.Л.</copyright-holder><ali:free_to_read xmlns:ali="http://www.niso.org/schemas/ali/1.0/"/><license><ali:license_ref xmlns:ali="http://www.niso.org/schemas/ali/1.0/">https://creativecommons.org/licenses/by-nc/4.0</ali:license_ref></license></permissions><self-uri xlink:href="https://journals.rudn.ru/law/article/view/35038">https://journals.rudn.ru/law/article/view/35038</self-uri><abstract xml:lang="en"><p style="text-align: justify;">The relevance of the work is due to the need to adapt regulatory mechanisms to the actively developing digitalization processes. On the other hand, in the context of growing cyber threats and increasing dependence of public relations on information and telecommunications technologies, the directions for the development of legislation that ensure stability and security of the relevant infrastructure are subject to a certain rethinking in the legal aspect. The subject of the study is the legal support for the development of a sustainable and secure information and telecommunications infrastructure. The purpose of the work is to identify key areas for improving legal regulation in the field of functioning and development of sustainable and secure information and telecommunications infrastructure. The study applies methods of analysis, synthesis and comparison, as well as literal and systematic interpretation of the norms of the current legislation in the field of functioning and developing sustainable and secure information and telecommunications infrastructure. Finally, conclusions are formulated regarding the need for the development of legal regulation in this area. The research outlines the specific directions for changing the legal field, which ensure the sustainable development of information and telecommunications infrastructure in the Russian Federation.</p></abstract><trans-abstract xml:lang="ru"><p style="text-align: justify;">Необходимость адаптации регуляторных механизмов к активно развивающимся в настоящее время процессам цифровизации обуславливает актуальность темы исследования. При этом в условиях нарастающих киберугроз и все большей зависимости общественных отношений от информационно-телекоммуникационных технологий определенному переосмыслению в правовом аспекте подлежат направления развития законодательства, обеспечивающее стабильность и безопасность соответствующей инфраструктуры. Предмет исследования - правовое обеспечение развития устойчивой и безопасной информационно-телекоммуникационной инфраструктуры. Цель работы - определение ключевых направлений совершенствования правового регулирования в области функционирования и развития устойчивой и безопасной информационно-телекоммуникационной инфраструктуры. При проведении исследования использовались методы анализа, синтеза и сравнения, а также буквального и системного толкования норм действующего законодательства в области функционирования и развития устойчивой и безопасной информационно-телекоммуникационной инфраструктуры. В заключении сформулированы выводы относительно необходимости развития нормативного регулирования в данной сфере. Предложены конкретные направления изменения правового поля, обеспечивающее устойчивое развитие информационно-телекоммуникационной инфраструктуры в Российской Федерации.</p></trans-abstract><kwd-group xml:lang="en"><kwd>information</kwd><kwd>security</kwd><kwd>critical infrastructure</kwd><kwd>regulation</kwd><kwd>digitalization</kwd><kwd>internet</kwd><kwd>personal data</kwd></kwd-group><kwd-group xml:lang="ru"><kwd>информация</kwd><kwd>безопасность</kwd><kwd>критическая инфраструктура</kwd><kwd>регулирование</kwd><kwd>цифровизация</kwd><kwd>Интернет</kwd><kwd>персональные данные</kwd></kwd-group><funding-group><funding-statement xml:lang="en">The article was prepared based on the research financed from budgetary funds under the state assignment of the Financial University under the Government of the Russian Federation.</funding-statement><funding-statement xml:lang="ru">Статья подготовлена по результатам исследований, выполненных за счет бюджетных средств по государственному заданию Финансового университета при Правительстве РФ.</funding-statement></funding-group></article-meta></front><body></body><back><ref-list><ref id="B1"><label>1.</label><mixed-citation>Adelmeyer, M., &amp; Teuteberg, F. (2018) Cloud computing adoption in critical infrastructures -status quo and elements of a research agenda. In: MKWI 2018 Proceedings. Germany, Lüneburg. pp. 1345-1356.</mixed-citation></ref><ref id="B2"><label>2.</label><citation-alternatives><mixed-citation xml:lang="en">Belousov, A.L. &amp; Levchuk, E.Yu. (2018) Digitalization of the banking sector. Finance and credit. 24(2), 455-464. https://doi.org/10.24891/fc.24.2.455 (in Russian).</mixed-citation><mixed-citation xml:lang="ru">Белоусов А.Л., Левчук Е.Ю. Диджитализация банковского сектора // Финансы и кредит. 2018. Т. 24. № 2. С. 455-464. https://doi.org/10.24891/fc.24.2.455</mixed-citation></citation-alternatives></ref><ref id="B3"><label>3.</label><citation-alternatives><mixed-citation xml:lang="en">Belousov, A.L. &amp; Shustrov, A.A. (2022) Opportunities of using the blockchain technology in the insurance industry. Digest Finance. 27(1), 89-107. https://doi.org/10.24891/fc.25.1.196 (in Russian).</mixed-citation><mixed-citation xml:lang="ru">Белоусов А.Л., Шустров А.А. Возможности применения технологии блокчейн в сфере страхования // Дайджест-финансы. 2022. Т. 27. № 1. С. 89-107. https://doi.org/10.24891/fc.25.1.196</mixed-citation></citation-alternatives></ref><ref id="B4"><label>4.</label><mixed-citation>Buzdugan, A. &amp; Capatana, G. (2022) Cyber security maturity model for critical infrastructures. In: Ciurea, C., Boja, C., Pocatilu, P. &amp; Doinea, M. (eds.) Education, Research and Business Technologies. Smart Innovation, Systems and Technologies. Vol. 276. Springer, Singapore. pp. 225-236. https://doi.org/10.1007/978-981-16-8866-9_19.</mixed-citation></ref><ref id="B5"><label>5.</label><mixed-citation>Ciaian, P., Rajcaniova, M. &amp; d’Artis, K. (2018) Virtual relationships: Short- and long-run evidence from BitCoin and altcoin markets. Journal of International Finansicial Markets, Institutions &amp; Money. (52), 173-195.</mixed-citation></ref><ref id="B6"><label>6.</label><mixed-citation>Dehling, T., Lins, S. &amp; Sunyaev, A. (2019) Security of critical information infrastructures. In: Reuter, C. (ed.) Information Technology for Peace and Security. Springer Vieweg, Wiesbaden. pp. 319-339. https://doi.org/10.1007/978-3-658-25652-4_15</mixed-citation></ref><ref id="B7"><label>7.</label><citation-alternatives><mixed-citation xml:lang="en">Goryan, E.V. (2018) Institutional mechanisms for ensuring the security of the critical information infrastructure of the Russian Federation and Singapore: a comparative legal aspect. Administrative and municipal law. (9), 49-60. https://doi.org/10.7256/2454-0595.2018.9.27762 (in Russian).</mixed-citation><mixed-citation xml:lang="ru">Горян Э.В. Институциональные механизмы обеспечения безопасности критической информационной инфраструктуры Российской Федерации и Сингапура: сравнительно-правовой аспект // Административное и муниципальное право. 2018. № 9. С. 49-60. https://doi.org/10.7256/2454-0595.2018.9.27762</mixed-citation></citation-alternatives></ref><ref id="B8"><label>8.</label><mixed-citation>Ghafir, I., &amp; Saleem, J. et al. (2018) Security threats to critical infrastructure: the human factor. The Journal of Supercomputing. (74), 4986-5002. https://doi.org/10.1007/s11227-018-2337-2</mixed-citation></ref><ref id="B9"><label>9.</label><mixed-citation>Leszczyna, R (2019) Cybersecurity controls. In: Cybersecurity in the electricity sector. Springer, Cham. pp. 181-209. https://doi.org/10.1007/978-3-030-19538-0_7</mixed-citation></ref><ref id="B10"><label>10.</label><mixed-citation>Linkov, I. &amp; Kott, A. (eds.). (2019) Fundamental concepts of cyber resilience: introduction and overview. In: Cyber resilience of systems and networks. Risk, systems and decisions. Springer, Cham. pp. 1-25.https://doi.org/10.1007/978-3-319-77492-3_1.</mixed-citation></ref><ref id="B11"><label>11.</label><citation-alternatives><mixed-citation xml:lang="en">Polyakova, T.A. &amp; Shinkaretskaya, G.G. (2020) Issues of formation of the international information security system in the context of transformation of law and new challenges and threats. Law and State: Theory and Practice. 10(190), 138-142. https://doi.org/10.47643/1815-1337_2020_10_138 (in Russian).</mixed-citation><mixed-citation xml:lang="ru">Полякова Т.А., Шинкарецкая Г.Г. Проблемы формирования системы международной информационной безопасности в условиях трансформации права и новых вызовов и угроз // Право и государство: теория и практика. 2020. № 10(190). С. 138-142. https://doi.org/10.47643/1815-1337_2020_10_138</mixed-citation></citation-alternatives></ref><ref id="B12"><label>12.</label><citation-alternatives><mixed-citation xml:lang="en">Polyakova, T.A. &amp; Troyan, N.A. (2022) Formation of scientific and legal approaches to the development of a system for the use of digital technologies in rule-making. Legal policy and legal life. (1), 43-58. https://doi.org/10.24412/1608-8794-2022-1-43-58 (in Russian).</mixed-citation><mixed-citation xml:lang="ru">Полякова Т.А., Троян Н.А. Формирование научно-правовых подходов к развитию системы применения цифровых технологий в нормотворчестве // Правовая политика и правовая жизнь. 2022. № 1. С. 43-58. https://doi.org/10.24412/1608-8794-2022-1-43-58</mixed-citation></citation-alternatives></ref><ref id="B13"><label>13.</label><citation-alternatives><mixed-citation xml:lang="en">Savenkov, A.N. (2017) Counteracting cybercrime in the financial and credit sphere as a vector for ensuring global security. State and Law. (10), 5-8. (in Russian).</mixed-citation><mixed-citation xml:lang="ru">Савенков А.Н. Противодействие киберпреступности в финансово-кредитной сфере как вектор обеспечения глобальной безопасности // Государство и право. 2017. № 10. С. 5-8.</mixed-citation></citation-alternatives></ref><ref id="B14"><label>14.</label><citation-alternatives><mixed-citation xml:lang="en">Shinkaretskaya, G.G. &amp; Berman, A.M. (2020) Digitalization and the problem of ensuring national security. Education and Law. (5), 254-260. https://doi.org/10.24411/2076-1503-2020-10544 (in Russian).</mixed-citation><mixed-citation xml:lang="ru">Шинкарецкая Г.Г., Берман А.М. Цифровизация и проблема обеспечения национальной безопасности // Образование и право. 2020. № 5. С. 254-260. https://doi.org/10.24411/2076-1503-2020-10544</mixed-citation></citation-alternatives></ref><ref id="B15"><label>15.</label><citation-alternatives><mixed-citation xml:lang="en">Shinkaretskaya, G.G. &amp; Berman, A.M. (2022) Cyberattacks - the illegal use of digital technologies. International Law. (1), 40-50. https://doi.org/10.25136/2644-5514.2022.1.37271 (in Russian).</mixed-citation><mixed-citation xml:lang="ru">Шинкарецкая Г.Г., Берман А.М. Кибератаки - противоправное использование цифровых технологий // Международное право. 2022. № 1. С. 40-50. https://doi.org/10.25136/2644-5514.2022.1.37271</mixed-citation></citation-alternatives></ref><ref id="B16"><label>16.</label><mixed-citation>Sicari, S., Rizzardi, A. &amp; Grieco, L.A. (2015) Coen - Porisini A. Security, privacy and trust in Internet of things: the road ahead. Computer Networks. (76), 146-164.</mixed-citation></ref><ref id="B17"><label>17.</label><mixed-citation>Tvaronavičienė, M., Plėta, T., Casa, S.D. &amp; Latvys, J. (2020) Cyber security management of critical energy infrastructure in national cybersecurity strategies: cases of USA, UK, France, Estonia and Lithuania. Insights into Regional Development. 2(4), 802-813. https://doi.org/10.9770/IRD.2020.2.4(6)</mixed-citation></ref><ref id="B18"><label>18.</label><mixed-citation>Vandezande, N. (2017) Virtual currencies under EU anti - money laundering law. Computer law &amp; Security review. (33), 341-353.</mixed-citation></ref><ref id="B19"><label>19.</label><citation-alternatives><mixed-citation xml:lang="en">Zharova, A.K. (2019) Legal support of information security in “smart cities”. Lawyer. (12), 69-76. https://doi.org/10.18572/1812-3929-2019-12-69-76 (in Russian).</mixed-citation><mixed-citation xml:lang="ru">Жарова А.К. Правовое обеспечение информационной безопасности в «умных городах» // Юрист. 2019. № 12. С. 69-76. https://doi.org/10.18572/1812-3929-2019-12-69-76</mixed-citation></citation-alternatives></ref><ref id="B20"><label>20.</label><citation-alternatives><mixed-citation xml:lang="en">Zharova, A.K. (2020) Issues of ensuring the security of a person's digital profile. Lawyer. (3), 55-61. https://doi.org/10.18572/1812-3929-2020-3-55-61 (in Russian).</mixed-citation><mixed-citation xml:lang="ru">Жарова А.К. Вопросы обеспечения безопасности цифрового профиля человека // Юрист. 2020. № 3. С. 55-61. https://doi.org/10.18572/1812-3929-2020-3-55-61</mixed-citation></citation-alternatives></ref></ref-list></back></article>
