AZERBAIJAN NATIONAL ACADEMY OF SCIENCES
INFORMATION SECURITY AS A NATIONAL SECURITY COMPONENT
Rasim M. Alguliyev, Yadigar N. İmamverdiyev, Rasim Sh. Mahmudov

The essence and different approaches to the national security are explored in the article.  The article interprets the duties and provision methods of the national security. Different areas and vital interests that are the objects of the national security are classified. According to this classification, the components of the national security, such as socio-political security, military security, information security, food security, energy security, education system security, scientific and technological security, health system security, transport system security, environmental security, Mass Media security, and cultural-moral security are differentiated. The development of ICT, the growing role and responsibilities of the information society in the national security system in connection with the formation of information security are described. The article also analyzes the relationship between the information security and other components of the national security. Application areas of ICT in each national security component and information security threats are identified. Their solution ways are described. The article uses analysis and synthesis, comparison, generalization and systematic approach. The results obtained in the article can be used for the development of new security concepts, strategies and other regulatory documents for the national security in the context of the information society (pp.3-25).

Keywords:national security, information security, military security, economic security, energy security.
DOI : 10.25045/jpis.v11.i1.01
References
  • Sidorkin A. I., Iroshnikov D.V. Theoretical issues of "security" concept // Journal of Politics and Law, 2019, Vol. 12, No. 3; pp. 34-39.
  • Peou S. Human Security Studies: Theories, Methods and Themes. World Scientific Publishing Company, 2014, 516 p.
  • Maslow A. H. Motivation and Personality. New York, Harpaer & Row, 1954, 395 p.
  • Smith S., Hadfield A., Dunne T., Dunne T. Foreign policy: Theories, actors, cases. OUP Oxford, 2008, 442 p.
  • Alkire S. A conceptual framework for human security. CRISE working paper No. 2. University of Oxford: Queen Elizabeth House, 2003, 53 p.
  • “Milli təhlükəsizlik haqqında” Azərbaycan Respublikasının Qanunu, http://mfa.gov.az/files/file/39.pdf
  • Azərbaycan Respublikasının  Milli   Təhlükəsizlik  Konsepsiyası, http://www.e-qanun.az/framework/13373
  • Zelikow Ph. The transformation of national security: Five redefinitions // The National Interest, 2003, no. 71, pp. 17–28.
  • Donohue L. K. Limits of national security // American Criminal Law Review, 2011, Vol. 48, No. 4, pp. 1573-1756.
  • DCAF, National Security Policy, 2005, https://issat.dcaf.ch/download/17202/201862/bg_national-security%20(1).pdf
  • İmamverdiyev Y.N. İnformasiya təhlükəsizliyi terminlərinin izahlı lüğəti, Bakı, “İnformasiya Texnologiyaları” nəşriyyatı, 2015, 160 s.
  • Əliquliyev R.M., İmamverdiyev Y.N., Mahmudov R.Ş. İnformasiya təhlükəsizliyinin multidistiplinar elmi-nəzəri problemləri // İnformasiya cəmiyyəti problemləri, 2017, №2, s.32-43.
  • Hofmann E., Rüsch M. Industry 4.0 and the current status as well as future prospects on logistics // Computers in Industry, 2017, Vol. 89, pp. 23-34.
  • Özdemir V., Hekim N. Birth of industry 5.0: Making sense of big data with artificial intelligence, “the internet of things” and next-generation technology policy // Omics: a journal of integrative biology, 2018, Vol. 22, No. 1, pp. 65-76.
  • Lu Y. Industry 4.0: A survey on technologies, applications and open research issues // Journal of industrial information integration, 2017, Vol. 6, pp. 1-10.
  • Ataç C., & Akleylek S. A survey on security threats and solutions in the age of IoT // European Journal of Science and Theology, 2019, Vol.15, pp. 36-42.
  • Margolis J. E. Understanding political stability and instability // Civil Wars, 2010, Vol. 12, No. 3, pp. 326-345.
  • Beskow D. M., Carley K. M. Social cybersecurity: an emerging national security requirement // Military Review, Vol. 99, No. 2, pp. 117-127.
  • Brooks R. A. The military and homeland security // Public Administration and Management, 2005, Vol. 10, No. 2, pp. 130-152
  • Szpyra R. Military security within the framework of security studies: Research results // Connections: The Quarterly Journal, 2014, Vol. 13, No. 3, pp. 59-82.
  • Kramer F.D., Starr S.H., Wentz L.K. (Eds.). Cyberpower and national security. Potomac Books, Inc.. 2009, 664 p.
  • İmamverdiyev Y.N. İnformasiya cəmiyyətində milli kriptoqrafiya siyasətinin formalaşdırılması problemləri // İnformasiya cəmiyyəti problemləri, 2015, №1, s. 12-23.
  • İmamverdiyev Y.N. Kiberqoşunlar: funksiyaları, silahları və kadr potensialı // İnformasiya cəmiyyəti problemləri, 2015, №2, s. 15-25.
  • Ələkbərova İ.Y. İnformasiya müharibəsi texnologiyalarının analizi və təsnifatı // İnformasiya cəmiyyəti problemləri, 2010, № 2, s. 80-91.
  • Əliquliyev R.M., Mahmudov R.Ş. İqtisadi təhlükəsizliklə informasiya təhlükəsizliyinin qarşılıqlı əlaqəsi / Azərbaycan xalqının ümummilli lideri Heydər Əliyevin 90 illik yubileyinə həsr olunmuş “İnformasiya təhlükəsizliyi problemləri üzrə I respublika elmi-praktiki konfransı”, 17-18 may, 2013, s. 7-10.
  • Əliquliyev R.M., Mahmudov R.Ş. İnformasiya iqtisadiyyatının təhlükəsizliyinin təmin edilməsi məsələləri // İnformasiya cəmiyyəti problemləri, 2013, № 1, s. 3-13.
  • Hadad S. Knowledge economy: Characteristics and dimensions // Management dynamics in the Knowledge economy, 2017, Vol. 5, No. 2, pp. 203-225.
  • Tang S. M. Rethinking economic security in a globalized world // Contemporary Politics, 2015, Vol. 21, No. 1, pp. 40-52.
  • Petrenko S. Cyber security innovation for the digital economy. River Publishers, 2018, 492 p.
  • Ozili P. K. Impact of digital finance on financial inclusion and stability // Borsa Istanbul Review, 2018, Vol. 18, No. 4, pp. 329-340.
  • Li Y., Qiu J.P., Xie Q. FinSec 3.0: Theory and practices in financial enterprise / International Symposium on Security in Computing and Communication, 2018, pp. 443-454.
  • Abbosh O., Bissell K. Securing the digital economy. Reinventing the Internet for trust. Accenture, 2019, 49 p.
  • Teoh C.S., Mahmood A.K. National cyber security strategies for digital economy / International Conference on Research and Innovation in Information Systems (ICRIIS), 2017, pp. 217-221.
  • Ang B. W., Choong W. L., & Ng T. S. Energy security: Definitions, dimensions and indexes // Renewable and sustainable energy reviews, 2015, vol. 42, pp. 1077-1093.
  • Bompard E., Carpignano A., Erriquez M., Grosso D., Pession M., Profumo F. National energy security assessment in a geopolitical perspective // Energy, 2017, Vol. 130, pp. 144-154.
  • Cai T. Energy infrastructure security in the digital age // International Journal of Public Administration in the Digital Age (IJPADA), 2018, Vol. 5, No. 2, pp. 12-22.
  • Onyeji I., Bazilian M., Bronk C. Cyber security and critical energy infrastructure // The Electricity Journal, 2014, Vol. 27, No. 2, pp. 52-60.
  • Biresselioglu M.E., Nilsen M., Demir M.H., Røyrvik J., Koksvik G. Examining the barriers and motivators affecting European decision-makers in the development of smart and green energy technologies. // Journal of Cleaner Production, 2018, Vol. 198, pp. 417-429.
  • Venkatachary S. K., Prasad J., Samikannu R. Economic impacts of cyber security in energy sector: a review // International Journal of Energy Economics and Policy, 2017, Vol. 7, No. 5, pp. 250-262.
  • Yadav G., Paul K. Assessment of SCADA system vulnerabilities / The 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2019, pp. 1737-1744.
  • Khan R., Maynard P., McLaughlin K., Laverty D., Sezer S. Threat analysis of BlackEnergy malware for synchrophasor based real-time control and monitoring in smart grid / The 4th International Symposium for ICS & SCADA Cyber Security Research, 2016, pp. 53-63.
  • Pourbeik P., Kundur P. S., & Taylor C. W. The anatomy of a power grid blackout - Root causes and dynamics of recent major blackouts // IEEE Power and Energy Magazine, 2006, Vol. 4, No. 5, pp.22-29.
  • Godfray H.C.J., Beddington J.R., Crute I.R., Haddad L., Lawrence D., Muir J.F., Pretty J., Robinson S., Thomas S.M., Toulmin C. Food security: The challenge of feeding 9 billion people // Science, 2010, 327, pp. 812–818.
  • Aker J.C., Ghosh I., Burrell J. The promise (and pitfalls) of ICT for agriculture initiatives // Agricultural Economics, 2016, Vol. 47, No. S1, pp. 35-48.
  • Mohanraj I., Ashokumar K., Naren J. Field monitoring and automation using IoT in agriculture domain // Procedia Computer Science, 2016, Vol. 93, pp. 931-939.
  • Gebbers R., Adamchuk V.I. Precision agriculture and food security // Science, 2010, No. 327(5967), pp. 828-831.
  • Cooper, C. 2015. Cybersecurity in food and agriculture. Kirjassa Leclair, J. (ed.): Protecting Our Future, Volume 2: Educating a Cybersecurity Work Force. Albany NY: Excelsior College. 234 s.
  • Fernando E., Assegaff S., Rohayani A.H. Trends information technology in E-agriculture: A systematic literature review / 3rd International Conference on Information Technology, Computer, and Electrical Engineering, 2016, pp. 351-355.
  • Əliquliyev R.M., İmamverdiyev Y.N. E-dövlətin informasiya təhlükəsizliyi: aktual tədqiqat istiqamətləri // İnformasiya cəmiyyəti problemləri, 2010, №1, s. 3-13.
  • Mowery D.C. National security and national innovation systems // The Journal of Technology Transfer, 2009, Vol. 34, No. 5, pp. 455.
  • Halbert D. Intellectual property theft and national security: Agendas and assumptions // The Information Society, 2016, Vol. 32, No. 4, pp. 256-268.
  • Mayers A.M. A study on how cyber economic espionage affects US national security and competitiveness. Doctoral dissertation, Northcentral University, 2018, 120 p.
  • Tabansky L. Towards a theory of cyber power: The Israeli experience with innovation and strategy / 8th IEEE International Conference on Cyber Conflict (CyCon), 2016, pp. 51-63.
  • Klein J.I., Rice C. US education reform and national security. Council on Foreign Relations. 2014, No. 68, 121 p.
  • Orikpe E.A. Education and national security: Challenges and the way forward // Journal of Educational and Social Research, 2013, Vol. 3, No. 10, pp. 53-59.
  • Dai N.H.P., András K., Zoltán R. E-learning security risks and counter measures // Engineering Research and Solutions in ICT, 2016, Vol. 1, pp. 17-25.
  • Bialaszewski D. Information security in education: are we continually improving? // Issues in Informing Science and Information Technology, 2015, Vol. 12, pp. 45-54.
  • Pires E., Moreira F. The integration of information and communication technology in Schools: Online Safety // Procedia Technology, 2012, Vol. 5, pp. 59–66.
  • Thomson K.L., Futcher L.A., Gomana L. Towards a framework for the integration of information security into undergraduate computing curricula // South African Journal of Higher Education, 2019, Vol. 33, No. 3, pp. 155-175.
  • Feldbaum H., Patel P., Sondorp E., Lee K. Global health and national security: the need for critical engagement // Medicine, conflict and survival, 2006, Vol. 22, No. 3, pp. 192-198.
  • Fidler D. P. Public health and national security in the global age: infectious diseases, bioterrorism, and realpolitik // Geo. Wash. Int'l L. Rev., 2003, Vol. 35, pp. 787-856.
  • Blaya J.A., Fraser H.S., Holt B. E-health technologies show promise in developing countries // Health Affairs, 2010, Vol. 29, No. 2, pp. 244-251.
  • Chenthara S., Ahmed K., Wang H., Whittaker F. Security and privacy-preserving challenges of e-health solutions in cloud computing // IEEE Access, 2019, Vol. 7, pp. 74361–74382.
  • Pandey A., Singh B., Saini B.S., Sood N. Medical data security tools and techniques in e-health applications / Medical Data Security for Bioengineers, 2019, pp. 124-131.
  • İmamverdiyev Y.N. E-səhiyyə: informasiya təhlükəsizliyinin aktual problemləri / “Elektron tibbin multidissiplinar problemləri” I respublika elmi-praktiki konfransı, Bakı, 24 may 2016-cı il, c.31-38.
  • Theoharidou M., Kandias M., Gritzalis D. Securing transportation-critical infrastructures: Trends and perspectives. Global Security, Safety and Sustainability & e-Democracy, 2011, pp. 171-178.
  • Thomopoulos N., Givoni M., Rieltveld P. (Eds.). ICT for transport: Opportunities and threats. Edward Elgar Publishing, 2015, 336 p.
  • Dellios K., Papanikas D., Polemi D. Information security compliance over intelligent transport systems: is IT possible?.// IEEE Security & Privacy, 2015, Vol. 13, No. 3, pp. 9-15.
  • Popović, T., Latinović, N., Pešić, A., Zečević, Ž., Krstajić, B., & Djukanović, S. (2017). Architecting an IoT-enabled platform for precision agriculture and ecological monitoring: A case study. Computers and Electronics in Agriculture, 140, 255-265.
  • Alghazo J. Ouda O.K.M., El Hassan A., E-waste environmental and information security threat: GCC countries vulnerabilities // Euro-Mediterranean Journal for Environmental Integration, 2018, 3:13, https://doi.org/10.1007/s41207-018-0050-4
  • Ağayev B.S., Əliyeva K.T. Elektron tullantılar və məlumat daşıyıcılarının informasiya təhlükəsizliyinin bəzi aspektləri // İnformasiya cəmiyyəti problemləri, 2013, №1, 67-74.
  • McLeod D.M., Shah D.V. News frames and national security. Cambridge University Press. 2014, 232 p.
  • Taylor R. The need for a paradigm shift toward cybersecurity in journalism // National Cybersecurity Institute Journal, 2015, Vol. 1, No. 3, pp. 45-47.
  • Henrichsen J.R., Betz M., Lisosky J.M. Building digital safety for journalism: A survey of selected issues. UNESCO Publishing, 2015, 104 p.
  • Thakur K., Hayajneh T., Tseng J. Cyber security in social media: Challenges and the way forward // IT Professional, 2019, Vol. 21, No. 2, pp. 41-49.
  • Giles K. “Information troops” - A Russian Cyber Command? / 3rd International Conference on Cyber Conflict, 2011, pp. 45-60.
  • Colarik A., Janczewski L. Establishing cyber warfare doctrine. In Current and Emerging Trends in Cyber Operations. Palgrave Macmillan, London, 2015, pp. 37-50.