Information security for various users of computer systems. Who monitors security on the Russian Internet? 4 who keep order on the Internet

Kolesov Yuri Mikhailovich

Volik Ruslan Vladimirovich

Subject and class

Computer Science, 10-11 grade

Abstract to the project

This project is aimed at students in grades 10-11 studying at the specialized level of computer science and ICT in high school. This project is aimed at studying legal aspects information security. In the process of studying this topic, students become familiar with the concepts of information security, information law, acts of federal legislation and information law.

In the federal component state standard in computer science and ICT of secondary (complete) general education, the topic of the project is represented by the following didactic units.

Social mechanisms in the field of information (7 hours).

Economics of the information sphere. Cost characteristics of information activities. The role of standards in modern society. Standardization in the field of information technology. Standards for describing information resources.

Information ethics and law, information security. Legal norms. related to information, offenses in the information sphere, measures to prevent them. The role of the media.

Project goals

Learning Objectives

  • to develop knowledge about the types of information offenses and punishments;
  • contribute to the acquisition of knowledge about information security methods;
  • study acts of federal legislation in the field of information security;
  • systematize knowledge about user rights in the field of information security;

Educational goals

  • formation of readiness for conscious compliance with legal norms;
  • instilling respect for laws and readiness to fulfill the requirements enshrined in them;

Developmental goals

  • development of skills to work with Internet resources;
  • developing the ability to correctly summarize data and draw conclusions;
  • development of skills to compare, generalize, analyze;
  • development of skills to sort information;

Questions guiding the project

Fundamental Question

Who keeps order online?

Problematic issues

1) What are the requirements for information protection?

2) What rights does the user have?

3) How can the owner protect?

Study questions

1) What is information law?

2) What acts of federal legislation are there?

3) What are the ways to protect information?

4) What are the penalties for information violations?

5) What are the most serious violations in the field of information security?

Project plan

Project duration: 10 days

Teacher publication

Knowledge, skills and abilities

Teacher presentation to identify student ideas and interests

An example of a student project activity product

Formative and summative assessment materials

Presentation evaluation criteria - Presentation evaluation criteria

Evaluation criteria for Wiki articles - Evaluation criteria for Wiki articles

Group observation assessment-

Moderator (from lat. moderor - to restrain, moderate) is a user who has broader powers compared to ordinary users and participants in public platforms (for example, forums, blogs, chats, groups, communities, etc.). In general, the moderator is obliged to monitor compliance with the rules of the site by its visitors and control their communication.

A moderator has limited rights compared to an administrator. The administrator is the main responsible person on the site with almost unlimited powers. The administrator can be either the owner himself or a person appointed by the owner. He monitors everything that happens on the site: he supervises the moderators; is responsible for advertising placement and establishes connections with similar websites, blogs, communities, groups, etc. The administrator has more global challenges than the moderator. Moderator is an assistant administrator who performs duties authorized by the administrator.

The main tasks of the moderator are maintaining order and rules of the site (forum, chat, community, etc.), creating a favorable atmosphere for users, preventing abuse, insults and conflicts among forum or community participants, as well as deviations from the topic of the section; timely redirection to the administrator of information about technical problems that have arisen (Fig. 1).

Rice. 1. Example of a set of rules for a forum

Rice. 2. Example of a ban on the forum

Rice. 4. Example of a comment with editing by a moderator, text.ru

In order to competently moderate a site, it is advisable to understand the basics of web programming (setting up the “engines” of sites and forums, installing extensions and plugins, etc.). It is necessary to have an understanding of the topic of the site, have communication skills and experience, and also be able to resolve disputes and conflicts that arise between users or between the moderator himself and users).

A moderator is needed for any platform where active communication between users occurs.

Basic rights and responsibilities of a moderator

The rights and responsibilities of a moderator on each specific site may differ. Typically, typical rights and responsibilities of a moderator include:

Rights:

  • edit and delete user messages;
  • if necessary, delete user pages;
  • issue warnings and apply other sanctions (for example, a ban - a ban on using the site) to users who violate the rules of communication;
  • restrict the rights of some users to view or edit the site, and also prohibit sending messages;
  • transfer your rights and powers to another moderator;
  • block and ban (prohibit using the platform) users (Fig. 2);

Responsibilities:

  • notify users of events or other important events taking place on or off site (Fig. 3);
  • move topics if they do not fit the category;
  • promptly respond to complaints and requests from users;
  • comply with the rules established by the owner of the site or its administrator.

In accordance with the established rules of a particular site, a moderator may have the following tasks:

  • increasing the popularity of the site;
  • increasing the number of participants in forums, chats, groups in in social networks;
  • stimulating the appearance of interesting topics on forums, blogs, groups and social network communities;
  • sending short advertisements;
  • permission conflict situations, which may arise when users communicate with each other or moderators with users.

Actions of the moderator in relation to users who have violated the rules of communication on the site (site, blog, forum, chat, group, community):

1. Warning about violations;

2. Please delete message(s) containing obscene language, insults, spam, etc.;

3. Accrual of penalty points;

4. Blocking a user account (including by IP addresses - the unique address of a computer connected to the Internet or local network). Blocking by IP address does not allow a situation where users, if their profiles are blocked, create new accounts with different data and continue communicating on the site;

5. Displaying information about his violations and inappropriate behavior in the user’s profile (Fig. 4);

6. Recording of violations with subsequent blocking of users.

Moderator Responsibility

By accepting his authority, the moderator is responsible for all actions that he performs. Since the moderator is an example of behavior for other users, he must make higher demands on himself. The moderator must be responsible for order on the site and maintaining a pleasant atmosphere of the resource; for promptly informing administrators about all technical problems on the site. If a moderator does not follow the rules of the administrator's instructions or exceeds his authority, he may lose his rights to moderate.

Moderation methods

  • Moderation- constant monitoring by the moderator(s) of compliance with the rules of communication of site users (forum, blog, chat, group, community, etc.), which were established by the owner of the site or its administrator, as well as the process of checking any material entering the material site.
  • Pre-moderation- control of content before publication on the site. A message written by a user is first checked by a moderator. He can correct errors in the text (spelling and punctuation), supplement, and check for prohibited topics. After which the message is either accepted for publication or rejected. Pre-moderation is usually used on official websites of companies, as well as in thematic communities and groups. This type of moderation helps keep the quality of the resource’s content under control. The main disadvantages are low efficiency (user messages appear on the site only after checking by a moderator), as well as the subjectivity of content assessment (the moderator may refuse to publish a message, focusing on his own preferences, judgments or opinion about the user who wrote the message). Some users who systematically violate the rules of communication on the site are subject to temporary pre-moderation. The moderator sets the pre-moderation period, after which he/she has the right to post messages again.
  • Post-moderation- control of content after its publication on the site. The main advantage is that the content appears on the site immediately after publication. However, with this type of moderation, the constant presence of a moderator is necessary due to the risk of incorrect messages containing obscene language or other prohibited components.
  • Automoderation- one of the types of post-moderation, in which the quality of content is determined by the users themselves by voting “for” or “against” the message. The advantages of this type of post-moderation include efficiency (messages appear immediately after publication), as well as a high percentage of objectivity (there is no subjective opinion of one moderator). However, for auto-moderation you need to configure additional software with filtering and voting functions. With auto-moderation, the possibility of participants colluding against one of the users who wrote the message and collectively voting against it cannot be ruled out.
  • Mediation board (abbr.. KK) is one of the ways to organize moderation on a large blog hosting site, for example, Livejournal. As a rule, it is led by several moderators. The commission is looking into complaints from users whose rights within the blog have been violated. Users with complaints can submit a written complaint for consideration on the “Complain about violations” blog page. Some requests may be rejected, for example, if moderators or administrators consider them to be unreasonable. Complaints not related to Livejournal and from third parties (not from the user whose rights have been infringed) will not be accepted for consideration.

The final decision on each specific complaint is made by one of the administrators. The Commission has the right to block (freeze) the accounts of users whose entries do not comply with the rules specified in Livejournal.

For what violations are users blocked:

  • maintaining records on behalf of another person;
  • log hacking;
  • advertising placement;
  • posting materials 18+;
  • calls for violence;
  • insults and profanity;
  • spam;
  • evading account deletion.

Types of moderators

1) Chief moderator (super-moderator)- a moderator who monitors the work of other moderators and the performance of their duties. He can recommend and select people for the position of moderator. The chief moderator is appointed by the site administrator. The responsibilities of the chief moderator include continuous supervision of the entire site, forum, group or community, and not just a separate topic or subsection. Typically, large sites and forums have several main moderators. On some sites, the main moderators have the powers of administrators.

2) Commoderator- a moderator who has limited rights and functions, for example, the right to edit only a specific portal or chat topic.

3) Chat moderator- a chat user charged with the responsibility of supervising the chat under his control and maintaining order in it. Its main task is to exclude users who do not follow the chat rules. Some chats have control over user IP addresses. This allows you to prevent these users from re-registering in the chat under a different name (login).

4) Website or blog moderator- a user who controls comments on posts on a website or blog. The moderator must ensure that users do not post advertisements, links to other resources and other information not related to the topic of the blog or site, as this may affect the speed of the site/blog, as well as their promotion.

5) Portal moderator- a user who, along with the administrator, controls all user actions on the portal, and also supervises surveys, messages, and user comments. On major portals There may be several moderators (from three).

6) Newsgroup moderator- a user assigned by the newsgroup owner. It is through the moderator that the entire news feed on news sites passes. Some newsgroups can only be posted by the moderators themselves. Working with newsgroup messages occurs on the principle of pre-moderation, when a message sent by a user first goes to the moderator, who decides whether to publish this message in the newsgroup or not. Retro moderation applies to some newsgroups. In this case, the moderator has the right to delete messages previously posted in the news group.

Forum moderator

The rights and responsibilities of moderators on different platforms are similar. Let's look at them in more detail using the example of a form moderator.

A forum moderator is a registered forum participant who monitors compliance with the forum rules by other participants. The topic of the forum should be close to him. The moderator is a kind of “caretaker” of the forum who keeps order and strives to ensure that the section or topic entrusted to him becomes even more interesting. The moderator can communicate with other forum participants as an ordinary user, take part in the discussion of any topic in any section of the forum, and express his personal opinion. The moderator must maintain a favorable atmosphere for communication and discussion on the forum, promptly put an end to disputes that arise, and prevent conflicts among users.

Responsibilities of a forum moderator

  • tracking new topics created by users;
  • moving the topic to the appropriate section;
  • deleting a topic if it violates the forum rules;
  • combining topics to discuss the same issue;
  • publishing a link to the answer if the question has already been asked;
  • control of popular topics;
  • proposal to create a subsection;
  • deleting messages that do not carry meaning;
  • unpinning or closing a topic after the discussion has ended;
  • acceptance and consideration of user complaints;
  • maintaining a faq - a section of frequently asked questions and answers to them;
  • demonstration by personal example of respect for the traditions of the forum;
  • objectivity in assessing any user actions and situations on the forum;
  • compliance with oneself and the requirements from other users of correct communication;
  • suppression of any conflict situations, incitement of ethnic hatred, persecution based on gender or religion;
  • prohibition of offensive statements and obscene language;
  • suppression of unauthorized advertising;
  • immediate notification of the administrator or superior moderator about the impossibility of fulfilling his direct duties;
  • showing tolerance for other people's opinions and respect for other forum participants, including newcomers who are not yet well versed in the peculiarities of the forum;
  • Use common sense when renaming, moving, or merging topics. If the moderator is in doubt about something, you should immediately contact the administrator for help;
  • timely response to complaints from forum members;
  • Once a week, review the section under the control of the moderator in order to objectively evaluate its work. If for some reason (departure, vacation or sick leave) the moderator cannot perform his duties, he must inform the administrator or superior moderator about this;

Forum moderator rights

The forum moderator has the right:

  • participate in forum discussions and debates;
  • edit messages from forum participants, as well as topic headings;
  • make proposals for organizing and improving the forum;
  • warn about the possible application of sanctions against users who violate the forum rules;
  • announce ongoing events and inform users about changes in the forum;
  • create, edit and close surveys;

Moderator responsibility and forum security

  • The moderator is responsible for the confidentiality of information. It must not disclose users' personal information to anyone;
  • the moderator must promptly provide information about incidents on the forum at the request of the administrator or superior moderator;
  • do not discuss the actions of other moderators with forum participants;
  • do not disclose information about other moderators and administrators;
  • not to disclose about technical features forum.

Moderator on social networks

A moderator on social networks is a member of a group/community/public who is empowered to monitor the compliance of other subscribers and guests of the group/community/public with the rules established in them. The moderator actively communicates with users, takes part in the development of the group, and strives to improve it.

Group/community/public moderator rights

  • edit and delete any topics and user messages that violate the rules of the group/community/public;
  • the moderator bears full responsibility for his actions, must use his powers wisely and act as objectively as possible;
  • The moderator ensures that participants follow the group rules. He has the right to close topics or change their names;
  • if for some reason the moderator deletes a user’s post or topic, he must send a personal letter to the user’s email address with words of respect and explanations of the reasons for deleting the post;
  • if a message needs editing, the moderator can send the user his message with corrections and a request to re-post it after editing;
  • If a rule is violated by a user for the first time, the moderator has the right to give him a warning. In case of repeated violation, add the user to the black list, that is, exclude him from the group members, notifying the offender about this;
  • The moderator has the right to close topics if their discussion is unconstructive, has exhausted itself, has become irrelevant or goes beyond the established rules.

Responsibilities of a group/community/public moderator

  • design of a group/community/public page;
  • filling the group with thematic content (articles, media);
  • attracting new users;
  • maintaining activity in a group/community/public by creating discussions, holding competitions, announcing promotions;
  • editing user messages and removing spam;
  • advertising and promotion of a group/community/public on other sites, forums, blogs of similar topics;
  • collecting statistical data and conducting group/community/public analysis based on it;
  • assistance in organizing interaction between advertisers on different advertising platforms;
  • increasing the level of activity in the group/community/public;
  • tracking the names of topics or photo albums in a group. When a participant creates a topic or photo album, for example, in a group on VKontakte or Odnoklassniki, the moderator must immediately pay attention to ensuring that the name reflects the content of this album, is short and understandable to other users.

Moderator regulation of user activity on social networks

User activity is a sign that the group is “living.” The moderator should encourage users to post in existing topics and do everything possible to keep them “full of life.” One of the effective means of increasing user activity is open comments. Within their framework, any user can express their opinion on the topic. However, not all people on social media are tactful. They can leave offensive comments, post immoral pictures, incite conflicts, or overwhelm you with a large number of advertising links. Typically, such users hide under an account specially created for such purposes. Therefore, moderators must promptly clear topics and photo captions from inappropriate and incorrect comments.

The moderator should strive to increase the level of brand loyalty and thus interact with visitors so that interest in the company’s activities promoted in the group/community/public constantly increases. A moderator who promptly responds to user comments and thanks for positive feedback is almost half the success in building a brand and improving the performance of a developing group.

In order for the community to actively develop, the moderator needs to maintain the constant interest of visitors. Interesting discussion topics should appear on the Group Discussion Board at least once or twice a week, depending on user reaction to the topic. Interesting and intelligent discussions may be indexed by search engine robots (Yandex, Google, Mail.ru). This attracts an additional number of users who are looking for an answer to a similar question outside the social network.

The moderator should monitor the faq section, which contains frequently asked questions and their answers. In developed groups/communities, users leave their opinions, ask for advice and willingly share information with each other that is useful from a marketing point of view. From this section, marketers can learn a lot of interesting information that helps in further promoting the brand, for example, non-standard ways of using the product, discussing its characteristics and quality, as well as potential opportunities. The moderator should not allow discussions to deviate from the main topic, and also provide users with the necessary information about the product or service.

In promoting a group or community, surveys conducted within it are important. They are important, including for marketing and PR services, which find out why users chose a particular company. In this case, the “anonymous survey” function is effective, since users are more active. A survey with an interesting topic can attract new users to groups/communities and becomes an indicator of the level of user activity along with the “I like” and “tell your friends” marks.

Let's define several types of activities, for example:

Solving applied problems that reflect the specifics of the activity of a particular specialist user;

Solving management problems, which is typical for any company;

Providing information services in a specialized company, such as an information center, library, etc.;

commercial activity;

Banking activities.

Information security methods

When developing methods for protecting information in the information environment, the following should be taken into account: important factors and conditions:

Ø expanding the areas of computer use and increasing the growth rate of the computer park (that is, the problem of information security must be solved at the level of technical means);

Ø a high degree of concentration of information in its processing centers and, as a consequence, the emergence of centralized databases intended for collective use;

Ø expanding user access to global information resources (modern data processing systems can serve an unlimited number of subscribers located hundreds and thousands of kilometers away);

Ø complication software computing process on a computer, since modern computers can work:

In multiprogram mode, when several tasks are solved simultaneously;

In multiprocessor mode, when one task is solved by several parallel processors;

In time sharing mode, when the same computer can simultaneously serve a large number of subscribers.

TO traditional methods of protection from intentional information threats include: restricting access to information, encryption (cryptography) of information, control of access to equipment, legislative measures. Let's look at these methods.

Restriction of access to information is carried out at two levels:

At the level of the human environment, that is, by creating an artificial barrier around the protected object: issuing special passes to admitted persons, installing a security alarm or video surveillance system;

At the level of protecting computer systems, for example, by dividing information circulating in a computer system into parts and organizing access to it for persons in accordance with their functional responsibilities. When protected at the software level, each user has a password that allows him to have access only to the information to which he is authorized.



Encryption (cryptography) of information consists of transforming (coding) words, letters, syllables, numbers using special algorithms. To get acquainted with encrypted information, the reverse process is needed - decoding. Encryption provides a significant increase in the security of data transmission over the network, as well as data stored on remote devices.

Access control to equipment means that all equipment is closed and sensors are installed at access points that are triggered when the equipment is opened. Such measures allow you to avoid, for example, connecting third-party devices, changing operating modes of the computer system, downloading third-party programs, etc.

Legislative measures consist of the implementation of existing laws, regulations, instructions in the country regulating the legal liability of officials - users and service personnel for leakage, loss or modification of information entrusted to them.

When choosing information security methods for a specific computer network, a thorough analysis of all possible methods of unauthorized access to information is necessary. Based on the results of the analysis, measures are planned to ensure the necessary protection, that is, a security policy is developed.

Security policy is a set of technical, software and organizational measures aimed at protecting information on a computer network.

Let's look at some methods of protecting computer systems from intentional information threats.

Protection against information theft is usually carried out using special software. Unauthorized copying and distribution of programs and valuable computer information is theft of intellectual property. Protected programs are subject to preliminary processing that puts the executable code of the program in a state that prevents its execution on “foreign” computers (file encryption, insertion of password protection, checking the computer based on its unique characteristics, etc.). Another example of protection: to prevent unauthorized access to information on a local network, an access control system is introduced at both the hardware and software levels. Can be used as a hardware access control device electronic key, connected, for example, to a printer connector.



To protect against computer viruses, “immune-resistant” software (analyzer programs) are used, which provide access control, self-control and self-healing. Antivirus tools are the most common means of protecting information.

For physical protection of computer systems, special equipment is used to identify industrial espionage devices, to exclude the recording or retransmission of computer emissions, as well as speech and other information-carrying signals. This allows you to prevent the leakage of informative electromagnetic signals outside the protected area. The most effective means of protecting information in communication channels is the use of special protocols and cryptography (encryption).

To protect information from random information threats, for example, in computer systems, means are used to increase the reliability of equipment:

Ø increasing the reliability of electronic and mechanical components and elements;

Ø structural redundancy - duplication or tripling of elements, devices, subsystems;

Ø functional control with diagnostics of failures, that is, detection of failures, malfunctions and software errors and elimination of their influence on the information processing process, as well as indicating the location of the failed element.

Every year the number of threats to the information security of computer systems and methods of their implementation is constantly increasing. The main reasons here are the shortcomings of modern information technologies and the ever-increasing complexity of the hardware. The efforts of numerous developers of software and hardware methods for protecting information in computer systems are aimed at overcoming these reasons.

http://infdeyatchel.narod.ru/_private/metodik/urok/prav_norm.swf

2. Answer the following questions:

1. Who keeps order online? admin

2. What are the requirements for information security?

these requirements apply to documents

3. What rights does the user have?

Anti-virus protection, software environment limitation

4. How can the owner protect?

5. What is information law?

6. What acts of federal legislation are there?

7. What are the ways to protect information?

8. What are the penalties for information violations?

9. What are the most serious violations in the field of information security?

3. Draw a conclusion about the practical work done:


Practical lesson No. 3

Imagine the situation: people from different countries and everyone speaks only their native language. To communicate with each other, they must develop standard rules and a common vocabulary for all. This approach is what gives the Internet its amazing capabilities. The World Wide Web is a system in which different computer networks exchange information using a standardized set of rules. Without such rules, computer networks would not be able to communicate with each other.

Let's imagine for a moment the scale of the Internet. It is a collection of computer systems connected into a common network covering the entire globe. The functioning of the Internet is determined by certain sets of rules called protocols. By acting in accordance with the requirements of these protocols, the computer is able to exchange information with other devices connected to the network. The Internet relies on a giant infrastructure of routers, network access points (NAPs), and computer systems. The system also includes satellites, miles of cables, and hundreds of wireless routers that are used to exchange information between computers and networks.

Global system

This is truly a global system. Communication cables run in all directions across countries and oceans, cross borders and provide network connectivity from the most remote corners of the globe. The Internet is still growing. Every day more and more computers are connected to it, various organizations and companies are organizing access to the Internet in those countries where it does not yet exist.

The Internet is a gigantic system built from much smaller systems. If it is a single system, does it have a single owner? Is there a person or organization that controls the Internet? Can anyone alone own such a structure covering vast territories? If you want to know, read this article.

As mentioned earlier, the Internet works because it has a system of rules called protocols. In accordance with these protocols, some computers can transmit information to others over the network. If there were no protocols, there would be no way to guarantee that information sent by one computer would be correctly recognized by another, or even that the information would get to the right address.

Protocols and rules

As the Internet evolves, so must the protocols. Someone has to be involved in developing and changing the rules. There are several organizations that oversee the Internet's infrastructure and protocols. Among them:

  • Internet Society: Non-profit organization, which develops Internet standards, policies and educational materials.
  • Internet Engineering Task Force (IETF): International organization with an open membership policy that has multiple working groups. Each working group focuses its efforts on a specific area, such as Internet security. The common goal of all working groups is to preserve the architecture of the Internet and maintain its stability.
  • Internet Architecture Board (IAB): The IAB is a committee of the IETF designed to oversee the creation of Internet protocols and standards.
  • Internet Corporation for Assigned Names and Numbers (ICANN): As a private, non-profit corporation, ICANN administers the Internet's Domain Name System (DNS). ICANN's mission is to ensure that every domain name the name corresponds to the correct IP address.

The Internet Society and IETF are open membership organizations. Both organizations welcome participation and membership from Internet experts. They define the principles of the Internet and the ways of its evolution.

On the other hand, ICANN is a private organization. There are people who are concerned about ICANN's privileged position. They explain their wary attitude towards this organization by the fact that ICANN has great power over those who would like to register a domain name. ICANN makes money by accrediting providers called registrars. Registrars sell domain names to individuals and businesses. If you want to register a specific name, it is ICANN that decides whether it can be done.

Although none of these organizations own the Internet, each of them can influence its operation. The Internet does not have a single owner. While the structure of the Internet is carefully designed and maintained, the actual content of the Internet remains the "untameable" cyberspace we all know and love.

Owners of the Internet

Who actually owns the Internet? There are two answers to this question.

  • Nobody
  • A lot of people

If we consider the Internet as a unified, holistic system, we can say that no one owns it. There are organizations that determine the structure of the Internet and how it works, but they do not own it. No government or company can claim ownership of the Internet. The Internet is similar to a telephone system - the entire system as a whole does not have a single owner.

If we look at the issue from a different point of view, it turns out that the owners of the Internet are thousands of people and organizations. It consists of many separate parts, each of which has an owner. Some owners can control the quality and level of user access to the Internet. They don't own the entire system, but their actions influence users' online experience.

Physical network

The backbone of the Internet is the physical network. It carries traffic exchanged between various computer systems. At the beginning of the development of the Internet, ARPANET performed the functions of the system backbone. These days, the routers and cables that make up the Internet backbone are provided by a few large corporations. These companies are leading Internet service providers (upstream Internet Service Providers). This means that any user intending to access the Internet will eventually have to deal with them. The leading Internet service providers are the following companies:

  • UUNET
  • Level 3
  • Verizon
  • Qwest
  • Sprint

Lower down the structure are smaller Internet service providers. Many individual consumers and businesses become clients of providers that are not part of the backbone. Small providers, in turn, negotiate Internet access with leading providers. Examples of small providers include companies that provide Internet access to customers via cable or DSL. Such companies are engaged in maintaining the part of the network that is called the last mile - the section between the end user and the point of connection to the Internet.

The backbone structure contains Internet Exchange Points, which are places where networks are physically connected with the ability to exchange data. For example, the three networks that form part of the Internet backbone, Sprint, Verizon, and AT&T, are not intertwined with each other. They are connected into a single system by Internet traffic exchange points. Several companies and non-profit organizations administer Internet traffic exchange points.

Individual computer networks that are part of the Internet may have owners. Each Internet service provider has its own network. Some governments have oversight of computer networks. Many companies have local area networks (LANs) with Internet connectivity. Each of these networks is part of the Internet and at the same time represents a separate independent unit. The owners of such networks can control the level of user access to the Internet, if such actions are provided for by local legislation.

You could consider yourself the owner of the Internet. Do you own a device that is used to connect to the Internet? If so, that means it becomes part of an incredibly large network of computer systems. You can be proud - you are the owner of part of the Internet, albeit a tiny one.

TASS-DOSSIER /Valery Korneev/. State supervision of the Internet in Russia is carried out by the Federal Service for Supervision of Communications, Information Technologies and Mass Communications (Roskomnadzor) and other relevant departments, including law enforcement agencies.

The networks of Russian Internet providers have installed the equipment of the System of Operational Investigative Measures (SORM). In accordance with the federal law "On Communications" of July 7, 2003, operators are required to provide authorized government agencies carrying out operational investigative activities or ensuring the security of the Russian Federation, information about users of communication services and their activities on the Internet.

July 14, 2007 Federal list of extremist materials(compiled by the Ministry of Justice of the Russian Federation on the basis of decisions of Russian courts, introduced by the law “On Combating Extremist Activities” of July 25, 2002). Since 2008, Russian providers began to block access to resources included in this list, although at that time there was no legal basis for such blocking.

July 28, 2012 Russian President Vladimir Putin signed a law introducing the concept extrajudicial blocking of websites("On amendments to the federal law"On the protection of children from information harmful to health and development" and certain legislative acts Russian Federation"). In accordance with this law, since November 1, 2012, Russia has been operating register of prohibited Internet resources(official website: http://eais.rkn.gov.ru/).

The blacklist initially included sites containing information about drugs, child pornography and calls for suicide, as well as resources for which a court decision was made on violation of the law. The operator of the registry with malicious information is Roskomnadzor. The Ministry of Internal Affairs, federal Service for drug control (FSKN) and Rospotrebnadzor.

In November 2013 Roskomnadzor, FSKN and Rospotrebnadzor developed a single list that contained definitions of the terms “child pornography” and “propaganda of suicide and drugs on the Internet.” It contains criteria for assessing information on websites prohibited for distribution in Russia.

The procedure for blocking a resource can be initiated based on Internet monitoring, as well as based on notifications from authorities, organizations and citizens. After receiving the request from the Prosecutor General's Office, Roskomnadzor sends a request to telecom operators to restrict access to the information resource or to illegal information posted on it. Telecom operators upon receipt of this request are required to immediately restrict access. Roskomnadzor then determines the hosting provider of the site that contains illegal information and sends a notification to it. The provider, in turn, must inform the owner information resource about the need to remove illegal content, after which access to the resource will be restored.

August 1, 2013 in Russia the so-called anti-piracy law(“On Amendments to Legislative Acts of the Russian Federation on the Protection of Intellectual Rights in Information and Telecommunications Networks,” signed by Russian President Vladimir Putin on July 2, 2013), which introduced a procedure for pre-trial blocking of sites with unlicensed films and TV series. This blocking is carried out by Roskomnadzor based on a complaint from copyright holders, whose application is considered by the Moscow City Court (Moscow City Court).

February 1, 2014 a law came into force giving Roskomnadzor the right to request the Prosecutor General or his deputies without trial blacklist and block Internet resources with calls for extremism and riots.

July 25, 2014 The order of the Ministry of Communications of April 16, 2014 came into force, obliging telecom operators to bring SORM equipment to new operating criteria by March 31, 2015, ensuring collecting more detailed and accurate data about users Internet communications and storing a complete record of them network interactions for a period of at least 12 hours.

August 1, 2014 the so-called law on bloggers("On Amendments to the Federal Law "On Information, information technology and on the protection of information" and certain legislative acts of the Russian Federation on issues of streamlining the exchange of information using information and telecommunication networks", signed by Russian President Vladimir Putin on May 5, 2014). The law obliges authors of Internet resources with an audience of over 3 thousand users per day to register with Roskomnadzor. Such website owners and blog authors are subject to the restrictions established in Russia for the media.

January 15, 2015 A package of bills with proposals for strengthening control over users Internet. The authors propose to amend the law on pre-trial blocking of sites, obliging Internet resources and hosting providers to store data about users for six months after the end of their activities, and also to notify Roskomnadzor of the “start of activities involving the dissemination of information and the organization of data exchange between network users ". The FSB, the Ministry of Internal Affairs and Rosfinmonitoring participated in the work on the package of bills, and it was the law enforcement agencies that initiated it. The purpose of the upcoming law is to identify and suppress terrorist, as well as any other criminal activity at the early stages.

From May 1, 2015 Roskomnadzor based amendments to the anti-piracy law(“On Amendments to the Federal Law “On Information, Information Technologies and Information Protection” and the Civil Procedure Code of the Russian Federation”, signed by Russian President Vladimir Putin on November 24, 2014) will be able to pre-trial block access to sites with illegal copies of books, music and programs. In case of systematic violation of intellectual property rights, access to the site may be blocked forever. This measure will be applied if the copyright holder wins a lawsuit against the same resource twice. The decision on permanent blocking, as before, will be made by the Moscow City Court. After this, Roskomnadzor will notify the operator about the court decision within 24 hours, and 24 hours will also be allotted for blocking.

Trend towards increased control over the Internet

According to estimates by the international human rights organization Freedom House (the annual Freedom on the Net rating), Russia over the past four years has shown a clear trend towards increasing control over the Internet space, being all this time in the category of “countries with a partially free Internet.” Assessing the degree of freedom on a 100-point scale (where 0 points means Internet without restrictions), the organization’s experts assigned Russia 52 points in 2011, and 60 points in 2014.

By the end of 2014, Roskomnadzor added more than 45,700 online links (URL) to the unified register of prohibited Internet resources. 64% of resources were found to be promoting and distributing drugs, 15% of child pornography, and 12% of suicide. 317 people were added to the register of bloggers, 187 were expected to be included.

According to a 2014 survey conducted by the Levada Center, 54% of Russians supported the introduction of censorship on the Internet due to the many dangerous sites and materials. 31% of respondents considered the introduction of censorship on the Internet unacceptable, while more than a third of respondents (38%) would be calm if the State Duma adopted laws restricting Russians’ access to the global Internet. Only 13% of respondents gave a negative answer to this question.

According to the Ministry of Telecom and Mass Communications as of December 2014, 62% of Russians actively use the Internet.

Business