Developers: | Ministry of Defence of the Russian Federation (Ministry of Defence), Rostelecom |
Branches: | MILITARY INDUSTRIAL COMPLEX |
Content |
2019: Multiservice Transport Network of Communication (MTNC)
The Armed Forces of the Russian Federation started creation of "the sovereign Internet" - the closed system of exchange of digital information "multiservice transport network of communication" (MTNC), Izvestia reports in March, 2019. The first stage of works will be completed by the end of 2019, and completely the project will be implemented in two years[1].
MTSS will not have the points of exchange of traffic connecting it with the Internet, told the edition in the Ministry of Defence. It is planned that a system will allow to organize high-speed transfer practically of any information volume in all territory of the country using Big Data technology.
MTSS will be based on the fiber-optical networks divided into zone trunk canals. The Ministry of Defence already started preparation for laying of the transarctic line from Severomorsk to the Far East for needs of the VTR and coastal troops. For operational and fast data transmission the single system of management "Uniform circuit of information security" will be created. The officers servicing it will be able to trace in real time traffic and to redirect data streams if some of segments of networks it is overloaded.
Will monitor all actions in network the electronic journal. The archive will be placed on servers of the Ministry of Defence and will be constantly duplicated to save data in case of damage of one of them, i.e. actually the army will receive the closed cloud storage. Besides, MTSS will have own search engine.
The edition notes that the Russian military for information exchange use now the closed data transmission segment (CDTS) which involved networks of civil operators until recently. In the long term ZSPD will be completely integrated into MTSS.
2016: Closed Data Transmission Segment (CDTS)
In October, 2016 it became known that the Army of the Russian Federation completed the formation of communications system under the name "The Closed Data Transmission Segment" (ZSPD). The military Internet is not connected to a global network, and on all computers connected to it the measures preventing use not certified a flash drives and external hard drives are implemented. The network also includes own mail service on which it is allowed to transfer the classified information, including with a signature stamp of "Special importance", Izvestia reports.
According to the interlocutor of the edition, ZSPD it is unrolled on the infrastructure of Rostelecom and own infrastructure of the Russian Defense Ministry which is not connected to the Internet. In each military unit servers for enciphering and data transmission are located. Access to server is resolved only strictly limited group of people. As noted a source, now the network functions in full. Its expansion and also installation of additional terminals in military units and organizations is in the future planned.
On the military Internet there are websites, the main of them is available to the address mil.zs. It is possible to browse these resources on the computers certified by service of protection of the state secret (The eighth management of the General Staff). It is impossible to connect not certified third-party devices to these computers, for example, a flash drives, printers, scanners and so forth. In case of connection of such device, the attempt will be recorded by special software.
See Also
- Censorship on the Internet. World experience
- Censorship (control) on the Internet. Experience of China
- Censorship (control) on the Internet. Experience of Russia, Roskomnadzor
- Law on regulation of Runet
- VPN and privacy (anonymity, anonymizers)
- Protection of critical information infrastructure of Russia
- Law On security of critical information infrastructure of the Russian Federation
- National Biometric Platform (NBP)
- Single Biometric System (SBS) of these clients of banks
- Biometric identification (market of Russia)
- Directory of solutions and projects of biometrics
- Digital economy of Russia
- Information security of digital economy of Russia
- SORM (System for Operative Investigative Activities)
- State detection system, warnings and mitigations of consequences of the computer attacks (State system of detection, prevention and elimination of consequences of computer attacks)
- National filtering system of Internet traffic (NASFIT)
- Yastreb-M Statistics of telephone conversations
- How to bypass Internet censorship of the house and at office: 5 easy ways
- The auditor - a control system of blocking of the websites in Russia
- The Single Network of Data Transmission (SNDT) for state agencies (Russian State Network, RSNet)
- Data network of public authorities (SPDOV)
- Single network of telecommunication of the Russian Federation
- Electronic Government of the Russian Federation
- Digital economy of Russia
- Cyber crime in the world
- Requirements of a NIST
- Global index of cyber security
- Cyber wars, Cyber war of Russia and USA
- Cyber crime and cyber conflicts: Russia, FSB, National coordination center for computer incidents (NKTsKI), Information Security Center (ISC) of FSB, Management of K BSTM of the Ministry of Internal Affairs of the Russian Federation, Ministry of Internal Affairs of the Russian Federation, Ministry of Defence of the Russian Federation, National Guard of the Russian Federation
- Cyber crime and cyber conflicts: Ukraine
- Cyber crime and cyber conflicts: USA, CIA, NSA, FBI, US Cybercom, U.S. Department of Defense, NATO, Department of Homeland Security, Cybersecurity and Infrastructure Security Agency (CISA)
- Cyber crime and cyber conflicts: Europe, ENISA
- Cyber crime and cyber conflicts: Israel
- Cyber crime and cyber conflicts: Iran
- Cyber crime and cyber conflicts: China
- As the USA spied on production of chips in the USSR
- Security risks of communication in a mobile network
- Information security in banks
- Digital transformation of the Russian banks
- Overview: IT in banks 2016
- The policy of the Central Bank in the field of data protection (cyber security)
- Losses of the organizations from cyber crime
- Losses of banks from cyber crime
- Trends of development of IT in insurance (cyberinsurance)
- Cyber attacks
- Overview: Security of information systems
- Information security
- Information security (world market)
- Information security (market of Russia)
- The main trends in data protection
- Software for data protection (world market)
- Software for data protection (the market of Russia)
- Pentesting (pentesting)
- Cybersecurity - Means of enciphering
- Cryptography
- VPN - Virtual private networks
- Security incident management: problems and their solutions
- Authentication systems
- Law on personal data No. 152-FZ
- Personal data protection in the European Union and the USA
- Quotations of user data in the market of cybercriminals
- Jackpotting
- Virus racketeer (encoder)
- WannaCry (virus racketeer)
- Petya/ExPetr/GoldenEye (virus racketeer)
- Malware (malware)
- APT - Targeted or target attacks
- DDoS and DeOS
- Attacks on DNS servers
- DoS-attacks on content delivery networks, CDN Content Delivery Network
- How to be protected from DDoS attack. TADetails
- Rootkit
- Fraud Detection System (fraud, fraud, fraud detection system)
- Solutions Antifraud directory and projects
- How to select an antifraud system for bank? TADetails
- Security Information and Event Management (SIEM)
- Directory of SIEM solutions and projects
- Than a SIEM system is useful and how to implement it?
- For what the SIEM system is necessary and as it to implement TADetails
- Intrusion detection and prevention systems
- Reflections of local threats (HIPS)
- Confidential information protection from internal threats (IPC)
- Phishing, DMARC, SMTP
- Trojan
- Botha's botnet
- Backdoor
- Worms Stuxnet Regin
- Flood
- Information loss preventions (DLP)
- Skimming (shimming)
- Spam
- Sound attacks
- Antispam software solutions
- Classical file infectors
- Antiviruses
- Cybersecurity: means of protecting
- Backup system
- Backup system (technologies)
- Backup system (security)
- Firewalls