{"title":"Issues of Legal and Expert Support of Law Enforcement Activities in the Field of Cybercrime Counteraction","authors":"B. Leonov, Valerii Serohin","doi":"10.51369/2707-7276-2019-3-1","DOIUrl":null,"url":null,"abstract":"The article is devoted to the analysis of the problems of legal and expert support of law enforcement activities in the field of cybercrime counteraction. The article deals with the issues of criminal and legal protection of information security in the context of the implementation of inter-national treaties into the field of national legislation. The authors both analyzed legislation in the field of cybersecurity provision; the modern doctrine devoted to its interpretation and made some suggestions for its improvement.\nKey words: cybersecurity, cybercrime, computer crime, harmful software, special software for secretly obtaining information.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"79 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Security of the Person, Society and State","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.51369/2707-7276-2019-3-1","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The article is devoted to the analysis of the problems of legal and expert support of law enforcement activities in the field of cybercrime counteraction. The article deals with the issues of criminal and legal protection of information security in the context of the implementation of inter-national treaties into the field of national legislation. The authors both analyzed legislation in the field of cybersecurity provision; the modern doctrine devoted to its interpretation and made some suggestions for its improvement.
Key words: cybersecurity, cybercrime, computer crime, harmful software, special software for secretly obtaining information.