Cybersecurity of the Digital Ruble in the System of Destructive Events of the Digital Space
https://doi.org/10.26794/3033-7097-2025-1-3-44-54
Abstract
The article discusses the current problems of ensuring the cybersecurity of the digital ruble in the context of growing threats to the digital space. The relevance of the research is determined by the following factors: the need to develop a new cybersecurity concept for the digital ruble; an increase in the number of computer attacks on the credit and financial sector; an increase in the destructive information impact on financial organizations; the need to identify and prevent cyber threats; the importance of protection against hacker attacks, viruses and fraud; the need to optimize processes and improve the quality of financial payments. The purpose of the research is to develop a technical solution to ensure the cybersecurity of the digital ruble infrastructure. During the study, the following tasks were solved: the concepts of “trust infrastructure” and “cybersecurity” were clarified; cyberspace tools were analyzed in the context of protecting the digital ruble; proposals were developed to improve the cybersecurity of the trust infrastructure. The practical significance of the work lies in the possibility of applying the proposed solutions to strengthen the digital ruble protection system.
Keywords
About the Authors
A. V. IvanovRussian Federation
Anatoly V. Ivanov — Dr. Sci. (Sociol.), Prof. Department of Information Security, Faculty of Information Technology and Big Data Analysis, Financial University under the Government of the Russian Federation; Chief Researcher, Institute of Digital Technologies, Russian Academy of Sciences
Moscow
A. V. Tsaregorodtsev
Russian Federation
Anatoly V. Tsaregorodtsev — Dr. Sci. (Tech.), Prof, Chief Researcher, Institute of Digital Technologies of the Russian Academy of Sciences; Professor of the Department of Applied Informatics and Intelligent Systems in the Humanities, Peoples’ Friendship University of Russia (RUDN)
Moscow
References
1. Telbukh V.V., Desyakh A.V., Andrushkevich S. S., Pilipenko L.V. Method of identifying destructive content in Internet information resources. News of TulSU. Technical sciences. 2023;3:423–428 (In Russ.). DOI: 10.24412/2071-6168-2023-3-423-429
2. Levonevsky D. K. Methods and models of protection of corporate information systems from complex destructive influences. The abstract Diss. Cand. Sci. (Tech.). St. Petersburg: Saint Petersburg Institute of Informatics and Automation of the Russian Academy of Sciences; 2020. 144 p. URL: https://www.elibrary.ru/swbxfd (In Russ.).
3. Rabchevsky A. N. Methods and algorithms for decision support to counteract destructive influences in social networks based on multifactorial analysis of user roles. Diss. Cand. Sci. (Tech.). Perm: Perm State National Research University; 2022. 138 p. URL: https://pstu.ru/files/2/file/adm/dissertacii/rybachevskiy/Dissertaciya_RabchevskiyiAN.pdf (In Russ.).
4. Sidorova A. P. The concept of digital space and its characteristics. Opportunities and threats of using digital space. Scientific dialogue: A young scientist. Collection of scientific papers based on the materials of the XXVIII International Scientific conference. St. Petersburg; 2020:48–55 (In Russ.). DOI: 10.18411/spc-22-05-2020-11
5. Stelmashonok E. V., Vasilyeva I. N., eds. Information security of the digital space. St. Petersburg: SPbGEU Publishing House; 2019. 155 p. URL: https://infosec.spb.ru/wp-content/uploads/2019/02/elibrary_36956934_98598916.pdf?ysclid=md8g277xn6103946799
6. Korolev V. I. Architectural construction of the public key infrastructure of the integrated information space. Information technology security. 2015;22(3):59–71. URL: https://elibrary.ru/vhhxbz (In Russ.).
7. Grachkov I. A., Malyuk A. A. Problems of developing trusted software used at critical information infrastructure facilities (organizational and methodological aspects). Information technology security. 2019:26(1):56–63. URL: https://elibrary.ru/yzellv (In Russ.).
8. Melnikov D. A. and others. Recommendations for creating a trust infrastructure for the digital ruble system. Information technology security. 2024:31(3):43–63 (In Russ.). DOI: 10.26583/bit.2024.3.01
9. Yazov Yu. K. On the definition of “cybersecurity” and related terms. Cybersecurity issues. 2025;1(65):2–6. URL: https://cyberrus.info/wp-content/uploads/2025/03/vokib-2025-1-st01-s002-006.pdf (In Russ.). DOI: 10.21681/2311-3456-2025-1-2-6
10. Ivanov A.V., Ognev I. A. Problems of assessing trust in information security audit processes. Cybersecurity issues. 2024;3(61):40–50. URL: https://cyberrus.info/wp-content/uploads/2024/05/vokib-2024-3-st05-s040-050.pdf (In Russ.). DOI: 10.21681/2311-3456-2024-3-40-50
11. Starodubtsev Yu.I., Zakalkin P.V., Ivanov S. A. Structural and functional model of cyberspace. Cybersecurity issues. 2021;4(44):16–24. URL: https://cyberrus.info/wp-content/uploads/2021/07/16–24–444–21_2-Starodubtsev.pdf (In Russ.). DOI: 10.21681/2311-3456-2021-4-16-24
Review
For citations:
Ivanov A.V., Tsaregorodtsev A.V. Cybersecurity of the Digital Ruble in the System of Destructive Events of the Digital Space. Digital Solutions and Artificial Intelligence Technologies. 2025;1(3):44-54. (In Russ.) https://doi.org/10.26794/3033-7097-2025-1-3-44-54
