The problems of implementation of information security in political disputes of Donald Trump’s supporters and opponents
Abstract
The most advanced countries use the information potential to achieve military, political and economic goals. Information resources such as information and technology, accordingly, become tools of information influence. The role of the United States of America as one of the most powerful political, economic and military actors in modern international relations should be noted. The power of the United States has largely been caused by the active development and implementation of information technology in various spheres of public life. However, due to the active use of information technology, the US earlier than other countries had faced the negative consequences of information threats and cyber attacks and gained considerable experience in counteracting them.
References
National Cyber Strategy of the United States of America [Electronic resource]. September 2018. Washington D.C.: The White House, 2018. 26 p. Retrieved from: https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf
Wolff J. Trump’s Reckless Cybersecurity Strategy [Electronic resource] / J. Wolff. Retrieved from: https://www.nytimes.com/2018/10/02/opinion/trumps-reckless-cybersecurity-strategy.html
Grisby A. The White House National Cyber Strategy: Continuity with a Hint of Hyperbole [Electronic resource] / A. Grisby. Retrieved from: https://www.cfr.org/blog/white-house-national-cyber-strategy-continuity-hint-hyperbole
Symantec Corporation. 10 cyber security facts and statistics for 2018 [Electronic resource]. Retrieved from: https://us.norton.com/internetsecurity-emerging-threats-10-facts-about-todays-cybersecurity-landscape-that-you-should-know.html
The Statistic Portal. Biggest cyber security problems facing the U.S. government according to adults in the United States as of January 2017 [Electronic resource]. Retrieved from: https://www.statista.com/statistics/676601/biggest-us-government-cyber-security-problems/
Жигалкин Ю. Доказательства вмешательства России в выборы президента США [Электронный ресурс] / Ю. Жигалкин. Режим доступа: https://www.svoboda.org/a/usa-russia-indictment/29044968.html
CNN. 2016 Presidential Election Investigation Fast Facts [Electronic resource]. Retrieved from: https://edition.cnn.com/2017/10/12/us/2016-presidential-election-investigation-fast-facts/index.html
Barr W.P. (Attoney General). Letter to Congress on Special Councel’s Report [Electronic resource] / W.P. Barr. Retrieved from: https://games-cdn.washingtonpost.com/notes/prod/default/documents/9048a12b-2332-4645-a1be-d645db216eb5/note/6f3248a4-4d94-4d5f-ad42-8ff6ccb1a89e.pdf#page=1
Kolbasiuk M. White House National Cyber Strategy: An Analysis [Electronic resource] / M. Kolbasiuk. Retrieved from: https://www.bankinfosecurity.com/white-house-national-cyber-strategy-analysis-a-11558