Cryptocontainer’s Active Protection as an Element of Countering the Passive Collection of Personal Data
https://doi.org/10.38086/2522-9613-2019-1-66-75
Abstract
The article is devoted to the study of the problems of personal information security, taking into account the impact of Big data in the current crisis of information security. A person is rapidly immersed in cyberspace, conducts business in it, conducts financial operations, actively receives educational and other social services. These processes lead to the formation of a digital footprint. The article considers the phenomenon of the digital footprint appearance and the processes associated with it. In particular, considered the formation of a new symbolic environment. The cryptocontainer, complex information protection software, was designed and developed as a result of the actual personal information security problems analysis and as a part of the secure platform creation initiative. Its principles are discussed in this article. An alternative approach to providing information security was proposed, taking into account the personal information space.
About the Author
V. A. KourbatskiBelarus
Master of Applied Mathematics and Information Technology
23 Svobody Sq. 220030 Minsk, Republic of Belarus
References
1. Grinyaev S. N. Pole bitvy – kiberprostranstvo: Teoriya, priemy, sredstva, metody i sistemy vedeniya informacionnoj vojny [Cyberspace: Theory, Techniques, Means, Methods and Systems of Information Warfare]. Moscow: Harvest Publ., 2004. 448 p. (in Russian).
2. Korovin V. Tret'ya mirovaya setevaya vojna [The Third World Network War]. St. Petersburg: Piter Publ., 2014. 352 p. (in Russian).
3. Usloviya ispol'zovaniya Google [Google Terms of Use]. Available at: https://policies.google.com/terms?hl=ru&gl=ru (accessed: 16.03.2019) (in Russian).
4. Google hands data to US Government in WikiLeaks espionage case. Available at: https://wikileaks.org/google-warrant/ Letter-to-Google.html (accessed: 16.03.2019).
5. Instagram Terms of Use. Available at: https://instagram.com/about/legal/terms/ (accessed: 16.04.2019).
6. Kourbatski A. N. The system actualization of information security problems of the personality. Problemy bezopasnosti i protivodejstviya terrorizmu [Problems of safety and counteraction to terrorism]. Moscow: MCCME, 2008, pp. 110–117 (in Russian).
7. Kourbatski A. N. Personal information security and code of conduct in the virtual space. Voprosy zashchity informacii [Information security issues], 2014, no. 4, pp. 218–224 (in Russian).
8. Project «Weeping Angel» specification. Available at: https://wikileaks.org/vault7/#Weeping%20Angel (accessed: 25.03.2019).
9. Project «Pandemic» specification. Available at: https://wikileaks.org/vault7/#Pandemic (accessed: 25.03.2019)
10. Project «Angelfire» specification. Available at: https://wikileaks.org/vault7/#Angelfire (accessed: 25.03.2019)
11. Kharin Y. S., Agiyevich S. V., Vasiliev I. L., Matveyev G. V. Kriptologiya [Cryptology]. Minsk: BSU Publ., 2013. 511 p. (in Russian).
12. Tanenbaum E. Raspredelennye sistemy. Principy i paradigmy [Distributed systems. Principles and paradigms]. St. Petersburg: Piter Publ., 2003. 877 p. (in Russian).
Review
For citations:
Kourbatski V.A. Cryptocontainer’s Active Protection as an Element of Countering the Passive Collection of Personal Data. Digital Transformation. 2019;(1):66-75. (In Russ.) https://doi.org/10.38086/2522-9613-2019-1-66-75