“UrFR Newsletter. Information Security” is a periodical peer-reviewed subscription journal, founded by the resolution of the Coordination council of training (retraining) and the continuing professional development of specialists in information security in Ural Federal Region. 

The journal is issued once a quarter. The publications are formed gradually as the articles appear. The editorial board has a right to refuse the author’s publication if the article’s scientific level is not sufficient or it does not fit the research agenda. It also has a right to send the article back for improvements. 
Original scientific works and review articles of Russian scientists dedicated to topical issues in information security and security in personal, state and social activities are published in the journal.

Journal of the Ural Federal District  Information security”  is a periodical peer-reviewed subscription journal, founded by the resolution of the Coordination council of training (retraining) and the continuing professional development of specialists in information security in Ural Federal Region. 

The journal is listed among the leading Russian scientific journals and magazines recommended by the Higher Attestation Commission of Russia for publication of the key research findings of Candidate and Doctoral (PhD) theses in:

  • 12.04 – Radio Engineering, including Television Systems and Devices,
  • 13.01 – System Analyses, Control and Information Processing (field related),
  • 13.19 – Methods and Systems for Information Protection.

 

The journal is issued once a quarter. The publications are formed gradually as the articles appear. The editorial board has a right to refuse the author’s publication if the article’s scientific level is not sufficient or it does not fit the research agenda. It also has a right to send the article back for improvements. 
Original scientific works and review articles of Russian scientists dedicated to topical issues in information security and security in personal, state and social activities are published in the journal.

The structure of the journal includes  5  headings reflecting the current trends in the field of research on security issues in the information field:

  • Research and design of technical means (technical protection of information; ensuring information security of facilities, automated systems and communication systems; development and use of technical and software-hardware means of protecting information; methods of ensuring protection of information in television and communication systems, radar and radio navigation systems; development and application of measurement and control instruments in the field of information security)
  • Information technology and computer security (information protection in computer systems; computer virology; development and use of information protection tools against unauthorized access, software to ensure the integrity and availability of information)
  • Data analysis methods (mathematical and simulation modeling, data processing systems, neural networks, artificial intelligence, cryptography, development of algorithms and data analysis methods; identification, identification and classification of threats to information security breaches; assessment of information security of objects, automated systems and communication systems; modeling of countering information security threats; physical processes and phenomena in information security)
  • Organizational, technical and legal protection of information (organization of auditing and monitoring the state of facilities; managing information security of facilities; feasibility studies of protecting information; developing and applying technical means for training information security specialists; providing personnel for information security; protecting state, commercial, professional, official secrets, intellectual property, personal data, organizational and legal support of information ion security)
  • Actual problems of cybersecurity (information security of industrial automated systems and facilities, protection of critical information infrastructure of facilities; methods of monitoring and ensuring the reliability of information; methods of protecting and backing up information and software of automated control systems)