TY - GEN
T1 - The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan
AU - Boranbayev, Askar
AU - Boranbayev, Seilkhan
AU - Nurusheva, Assel
AU - Yersakhanov, Kuanysh
PY - 2018/1/1
Y1 - 2018/1/1
N2 - As information technologies are embedding in increasing number of spheres of life of states and societies, dependence on the use of them transforms in new vulnerabilities and security concerns for entire states. The article is devoted to the analysis of the modern state of information security in the Republic of Kazakhstan. This article reviews the law, standards, technologies and incidents in the field of information security. Some statistics of information security events, threats and incidents are considered. The measures to provide information security in Kazakhstan including the basic norms of information security of information systems, resources and networks are described. The importance of timely elimination of vulnerabilities, exclusion and prevention of information security threats and incidents is highlighted. In conclusion the authors emphasizes that effective ways to solve the existing problems of low security clearance is full implementation of the specific recommendations are made to improve the information security of the country.
AB - As information technologies are embedding in increasing number of spheres of life of states and societies, dependence on the use of them transforms in new vulnerabilities and security concerns for entire states. The article is devoted to the analysis of the modern state of information security in the Republic of Kazakhstan. This article reviews the law, standards, technologies and incidents in the field of information security. Some statistics of information security events, threats and incidents are considered. The measures to provide information security in Kazakhstan including the basic norms of information security of information systems, resources and networks are described. The importance of timely elimination of vulnerabilities, exclusion and prevention of information security threats and incidents is highlighted. In conclusion the authors emphasizes that effective ways to solve the existing problems of low security clearance is full implementation of the specific recommendations are made to improve the information security of the country.
KW - Incident
KW - Information security
KW - Information technology
KW - Standard
KW - Threat
KW - Vulnerability
UR - http://www.scopus.com/inward/record.url?scp=85045832352&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85045832352&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-77028-4_6
DO - 10.1007/978-3-319-77028-4_6
M3 - Conference contribution
AN - SCOPUS:85045832352
SN - 9783319770277
T3 - Advances in Intelligent Systems and Computing
SP - 33
EP - 38
BT - Information Technology - New Generations - 15th International Conference on Information Technology
PB - Springer Verlag
T2 - 15th International Conference on Information Technology : New Generations, ITNG 2018
Y2 - 16 April 2018 through 18 April 2018
ER -