Int
ern
at
i
onal
Journ
al of Ele
ctrical
an
d
Co
mput
er
En
gin
eeri
ng
(IJ
E
C
E)
Vo
l.
10
,
No.
3
,
June
2020
,
pp. 3
184
~
3192
IS
S
N: 20
88
-
8708
,
DOI: 10
.11
591/
ijece
.
v10
i
3
.
pp3184
-
31
92
3184
Journ
al h
om
e
page
:
http:
//
ij
ece.i
aesc
or
e.c
om/i
nd
ex
.ph
p/IJ
ECE
The pr
otect mobi
le user d
ata in R
ussia
An
n
a
Z
ha
r
ova
Cent
er
for
C
y
b
er
spac
e
R
ese
ar
ch
,
Higher
School
o
f
Ec
onom
ic
s
Nat
iona
l
Resea
r
ch University
,
Rus
s
ia
The
Inst
it
ut
e
of
Stat
e
and
La
w
of
t
he
Russ
ia
n
Ac
a
dem
y
of
Sci
enc
e
s
,
Russ
ia
Art
ic
le
In
f
o
ABSTR
A
CT
Art
ic
le
history:
Re
cei
ved
N
ov
20
, 201
9
Re
vised
Dec
2
8
,
20
19
Accepte
d
J
an
2
, 2020
Thi
s
pape
r
studi
es
the
issue
the
i
nform
at
ion
sec
u
rity
for
sm
art
phone
users
in
Russ
ia
.
The
re
port
ana
l
y
ses
t
he
reg
ulations
the
state
uses
to
pre
vent
undec
l
are
d
func
t
iona
lit
y
and
m
al
i
ci
ous
progra
m
s
i
n
m
obil
e
phon
es
in
Russ
i
a
;
the
l
aw
enf
orc
e
m
ent
pra
ctic
e
in
thi
s
area;
th
e
re
spons
ibi
li
t
y
of
l
ega
l
ent
i
ti
es
,
offic
i
al
s
and
per
sons
for
non
-
complia
nc
e
with
the
req
uirem
ent
s
for
standa
rdi
za
t
ion,
ensuring
informati
on
se
cur
ity
an
d
viol
ation
of
de
cl
ar
at
ion
o
f
conf
orm
ity
.
The
pape
r
deve
lops
proposals
to
improve
stat
e
re
g
ula
ti
on
of
undec
l
are
d
func
ti
onalit
y
o
f
m
obil
e
device
s
pr
ovidi
ng
th
e
collection
o
f
informati
on,
in
cluding
conf
ide
nt
i
al
dat
a
.
The
rep
o
rt
discusses
spec
ifi
c
et
h
ical
issues
rel
ated
t
o
priva
c
y
,
inclu
ding
m
at
te
rs
re
l
at
ing
to
compe
nsati
on
for
damage
resultin
g
fro
m
the
le
ak
age
of
per
sona
l
informati
on
an
d
deve
lops
proposals
for
l
e
gal
ensuring
th
e
informati
on
sec
urity
of
m
obil
e
phone
users.
The
rep
or
t
first
outl
in
es
the
m
ai
n
ac
tors
,
t
e
rm
s
and
conc
e
pts
used
in
the
rep
ort
.
Seco
nd
the
standa
rds
for
m
obil
e
phone
deve
lop
ers,
alt
hough
the
re
is
no
guar
antee
of
complet
e
info
rm
at
ion
sec
uri
t
y
.
In
thi
s
ca
se
,
the
pec
uliar
i
t
y
of
Russ
ia
is
tha
t
standa
rds
used
in
the
fie
ld
of
informati
on
sec
urity
ar
e
volunt
ar
y
.
Thi
rd
how
la
w
enf
orc
ement
age
n
ci
es
prote
c
t
the
user
comm
unity
.
In
thi
s
c
ase
the
re
is a
po
te
nt
ia
l
da
nger
th
at
thi
s m
a
y
entail
un
cont
ro
ll
ed acce
ss
of
gover
nm
ent agencies t
o
conf
i
dent
i
al
d
ata
.
Ke
yw
or
d
s
:
I
nfo
rm
at
ion
secur
it
y
M
ob
il
e
phone
Russia
S
ta
nd
a
r
ds
U
ndecl
are
d functi
on
al
it
y
Copyright
©
202
0
Instit
ut
e
o
f Ad
vanc
ed
Engi
n
ee
r
ing
and
S
cienc
e
.
Al
l
rights re
serv
ed
.
Corres
pond
in
g
Aut
h
or
:
Anna Z
ha
rova
,
Ce
nter fo
r
Cy
be
rsp
ace
Resea
r
ch
,
Higher
Sc
hool
of Eco
nom
ic
s
Nati
on
al
Res
ea
rch U
niv
e
rsity
,
Russia, M
os
c
ow,
Sh
a
bolo
vk
a
street,
26s3 1
1904
9
.
Em
a
il
: ajarova
@h
se
.ru
1.
INTROD
U
CTION
In
the
e
ra
of
s
m
artphon
es
an
d
oth
e
r
inter
ne
t
enab
le
d
de
vices,
the
quest
ion
arises
as
to
how
m
uc
h
a
per
s
on
is
pr
otect
ed
f
ro
m
the
il
le
gal
the
colle
ct
ion
of
per
s
onal
inf
orm
at
ion
wh
il
e
us
in
g
s
uch
de
vices,
"...
sm
al
l
-
scal
e
IT
us
er
s
rem
ai
n
il
l
-
ser
ve
d
by
existi
ng
cy
ber
sec
ur
it
y
pract
ic
es"
[1
]
.
Wh
il
e
us
i
ng
a
m
ob
il
e
phone
a
perso
n
m
ay
no
t
su
sp
e
ct
that
his
dev
i
ce
is
relay
ing
inf
or
m
at
ion
to
a
third
pa
rty
w
ho
m
ay
su
bs
eq
uen
tl
y
us
e
this
inf
or
m
at
ion
il
le
gally
.
Alon
gs
ide
t
he
dev
el
op
m
ent
of
this
te
ch
no
l
og
y,
o
t
her
t
echnolo
gies
a
r
e
bein
g
dev
el
op
e
d
t
o
il
le
gally
collect
per
s
onal
in
form
ation
f
r
om
s
m
artph
one
us
e
rs.
T
he
i
ll
egal
colle
ct
ion
of
inf
or
m
at
ion
is
possible
thr
ough
t
he
i
ns
ta
ll
at
ion
of
a
m
alici
ou
s
pro
gr
a
m
or
thr
ough
undeclare
d
f
unct
io
ns
instal
le
d
on
t
he
m
ob
il
e
phone
by
it
s
dev
el
oper
,
"9
5%
of
t
he
te
ste
d
ap
ps
hav
e
at
le
ast
one
vu
l
ner
a
bili
ty
"
[2
]
.
Ther
e
are
va
rio
us
vu
l
ner
a
bili
ties
an
d
ris
ks
a
s
so
ci
at
ed
with
t
he
us
e
of
m
ob
i
le
dev
ic
es
[3
]
,
i
nclu
ding
the
ri
sk
s
of
il
le
gal
colle
ct
i
on
of
i
nfor
m
at
ion
.
Ne
w
ge
ne
rati
on
of
s
er
vices
are
oft
en
c
har
act
erize
d
by
hig
h
dynam
i
sm
and
un
t
ru
st
worthi
ne
ss:
“
existi
ng
te
chn
ol
og
ie
s
fo
r
m
anag
in
g
an
d
ap
plyi
ng
data
pr
iva
cy
po
li
ci
es
c
ou
l
d
be
un
s
ucces
sf
ul
...”
[4
]
F
or
t
he
pur
pose
of
un
i
fyi
ng
th
e
ap
proa
ches
to
i
nfor
m
at
ion
sec
ur
it
y,
sta
te
s
are
de
vel
op
i
ng
sta
nd
a
rds
f
or
te
chn
ic
al
re
gula
ti
on
.
Alth
ou
gh
th
e
ap
plica
ti
on
of
sta
nda
rd
s
in
t
he
de
ve
lop
m
ent
of
m
ob
ile
app
li
cat
io
ns
is
no
t
al
ways
effe
ct
ive
[5
]
.
The
sta
nd
ar
ds
de
fi
ne
the
range
of
key
issues
th
at
dev
el
opers
s
hould
be
guide
d
by
(this
de
pe
nd
s
on
t
he
dem
and
of
ap
plica
ti
on
the
sta
ndar
ds
in
the
sta
te
).
Howev
e
r,
sta
nd
a
r
ds
cannot
pro
vid
e
all
p
ossi
ble
vulnera
bili
ti
es.
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N: 20
88
-
8708
Th
e
prote
ct
mo
bile user
data
in
R
us
si
a
(
An
na
Zhar
ova
)
3185
Ther
e
f
or
e,
the
eff
ect
ive
in
for
m
at
ion
secur
it
y
is
po
ssible
on
ly
with
intero
per
a
bili
ty
of
st
and
a
r
ds
wit
h
le
gal
norm
s.
Ho
we
ve
r,
desp
it
e
t
he
existi
n
g
r
egu
la
to
ry
syst
em
,
m
alici
ou
s
s
of
t
war
e
a
nd
te
chnolo
gies
has
us
e
d
in
Russia,
i
ncl
ud
i
ng
unde
cl
ar
ed
f
unct
ions
to
il
le
gally
colle
ct
inform
at
io
n
tra
ns
m
itted
f
ro
m
internet
e
nab
le
d
dev
ic
es
.
This
pro
blem
is
relevan
t
f
or
m
any
sta
te
s,
ho
wev
e
r,
the
m
et
hods
of
str
ugg
le
diff
e
r
no
t
on
ly
the
m
et
ho
ds
i
nclu
ded
in
th
e
sta
nd
ar
ds,
an
d
the
seve
rity
of
the
punishm
ent
def
ine
d
in
the
la
w,
but
al
so
in
the
le
vel
of
in
te
roper
a
bili
ty
of
sta
ndar
ds
a
nd
la
w
norm
s
.
T
he
a
naly
sis
of
the
stu
dies
m
akes
it
po
s
s
ible
to
identify
the
m
ai
n
li
n
es
of
c
om
m
un
ic
at
ion
s
ecur
it
y,
su
c
h
a
s
the
ind
e
pe
ndent
secu
rity
of
s
m
artphon
e
use
rs
if
su
c
h
ca
pab
il
it
ie
s
are
init
ia
ll
y
pro
vid
e
d
i
n
t
he
phone
[6,
7];
ens
ur
i
ng
the
sec
ur
it
y
by
the
sta
te
if
de
fini
ng
the
re
qu
irem
en
ts
fo
r
de
velo
pe
rs
in
fiel
d
the
safety
of
t
he
m
ob
il
e
te
ch
nolo
gies,
incl
ud
i
ng
the
re
qu
irem
ents
of
the
de
velo
pm
e
nt
an
d
ap
plica
ti
on
of
sta
nd
a
r
ds
[
8];
al
so
by
i
m
po
sing
le
ga
l
li
ability
fo
r
the
de
velo
pm
e
nt
an
d
us
e
of
ha
rm
f
ul
te
ch
no
l
og
i
es
that
vi
olate
the
c
onfide
ntial
it
y
of
in
form
ation
.
I
n
the
fiel
d
of
ICT,
the
de
velo
pm
e
nt
of
le
gal
no
r
m
s
witho
ut
co
ordinati
on
with
the
norm
s
of
te
chn
ic
al
re
gu
la
ti
on
does
n
ot
le
ad
to sec
ur
it
y.
In
R
us
sia
,
le
ga
l
norm
s
and
regulat
ory
sta
nd
a
r
ds
are
di
vid
e
d
a
nd
i
nc
on
sist
e
nt,
that
are
le
ad
t
o
ineff
ect
i
ve
in
f
or
m
at
ion
secu
r
it
y.
The
va
r
io
us
ways
of
e
nsu
rin
g
in
form
at
io
n
sec
ur
it
y
are
offer
e
d,
f
or
e
xam
ple,
by
co
nf
i
rm
ing
each
s
of
t
ware
cha
ng
e
[
9]
,
flexible
phon
e
set
ti
ng
s
[10
]
,
te
sti
ng
inst
al
le
d
ap
plica
tio
ns
on
the
ph
one
[11]
,
by
c
heck
i
ng
the
tr
us
t
m
etr
ic
f
or
each
c
om
po
ne
nt
of
t
he
m
ob
il
e
sys
tem
[12]
.
Ba
sic
al
ly
,
regulat
ion
is
pro
vid
e
d
at
th
e
le
vel
of
te
c
hnology
dev
el
op
m
ent
thr
ough
the
us
e
of
m
and
at
ory
sta
nd
a
r
ds
.
In
Ru
ssia,
in
form
ation
sec
ur
it
y
sta
nd
a
rds
are
op
ti
on
a
l
.
So
m
e
secur
it
y
m
od
el
s
are
us
e
d
in
Russian
sta
nd
a
rds
[12]
,
13
[
10]
and
et
c.
In
this
regar
d,
t
he
arti
cl
e
analy
zes
the
prob
le
m
s
cor
rela
ti
on
of
the
le
gi
sla
ti
ve
syst
e
m
with
th
e
norm
s
of
te
c
hn
ic
al
regulat
ion,
wh
ic
h,
wit
h
the
dev
el
op
e
d
regulat
ory
a
nd
te
ch
nical
s
yst
e
m
le
ads
to
the
fa
ct
that
m
ob
il
e
phones
wit
h
undecla
red
func
ti
on
s
a
nd
pr
ei
nst
al
le
d
m
al
war
e
are
us
e
d
in
Russia.
Fo
r
this,
m
et
ho
ds
of
pr
e
ve
nting
t
he
ris
ks
of
le
aka
ge
of
c
onfide
ntial
us
e
r
in
form
at
ion
for
s
uch
ap
plica
ti
on
le
vels as s
of
t
w
are a
nd h
a
rdwa
re
wer
e i
nv
e
sti
gated.
The
pa
per
e
xa
m
ines
the
fo
ll
ow
i
ng
are
as
of
inform
ation
secur
it
y
for
m
ob
il
e
phon
e
us
e
rs
in
Russia:
first,
the
la
w
e
nfor
cem
ent
agen
ci
es
for
the
protect
ion
of
the
us
e
r
com
m
un
it
y,
the
iden
ti
ficat
ion
of
th
e
risks
and
vu
l
ner
a
bili
ti
es
of
m
ob
il
e
phone
us
e
rs,
if
the
phone
has
"undecla
re
d
f
un
ct
io
nalit
y"
.
Seco
nd,
the
sta
nd
a
r
ds
for
m
ob
il
e
phone
de
velo
pe
rs,
al
tho
ug
h
the
r
e
is
no
guara
nt
ee
of
c
om
ple
te
inf
or
m
at
ion
secur
it
y.
I
n
this
case,
the
pec
uliari
ty
of
Russia
is
that
le
gal
sta
ndar
ds
us
e
d
in
the
fiel
d
of
i
nfor
m
at
ion
se
cur
it
y
are
volun
ta
ry.
Thir
d,
how
la
w
e
nfor
cem
ent
age
ncies
pr
otect
the
us
e
r
c
omm
un
it
y.
In
this
case
the
re
is
a
pote
ntial
da
nger
tha
t
this
m
ay
entail
un
c
ontr
olled
acce
ss
of
gove
rn
m
ent
age
ncies
to
c
onfi
dent
ia
l
data
[14]
.
The
pa
per
de
ve
lo
ps
pro
po
sal
s
f
or
ens
ur
in
g
the
inf
or
m
at
ion
secur
it
y
of
m
ob
il
e
ph
one
us
e
rs
in
the
te
rr
it
or
y
of
the
R
us
sia
n
Fede
rati
o
n
, and
pa
per
al
so
presents
:
the co
nc
ept o
f
c
om
bin
ing
legisl
at
ive an
d
te
ch
nical
nor
m
s to
pr
eve
nt
r
isks
and
th
reats
,
a
nd
Russia
n
a
nd
f
or
e
i
gn
pr
act
ic
es
of
dea
li
ng
with
vu
l
ner
a
bili
ti
es
an
d
risks
in
t
his
area
.
The
pr
ob
le
m
s
of
sta
te
m
anag
e
m
ent
of
in
for
m
at
ion
secur
it
y
of
m
ob
il
e
ph
one
us
ers
fro
m
the
po
int
of
view
of
t
he
syst
em
of
i
nter
op
e
ra
bili
ty
info
rm
at
ion
sec
ur
it
y
sta
nd
a
rds
an
d
the
le
gal
re
g
ulati
ons
in
Russia
wer
e
d
em
on
str
at
ed.
2.
RESEA
R
CH MET
HO
D
The
researc
h
was
base
d
on
the
a
naly
sis
and
com
par
iso
n
of
norm
at
ive
le
gal
act
s
a
nd
norm
s
of
te
chn
ic
al
re
gu
l
at
ion
in
R
us
si
a
and
pract
ic
es
of
ens
ur
i
ng
inf
or
m
at
ion
sec
ur
it
y
of
m
ob
il
e
com
m
un
ic
at
i
on
s
in
E
uro
pe
a
nd
i
n
Russia.
N
or
m
at
ive
act
s
de
fine
the
necessa
ry
r
ules
of
behavio
r
an
d
regu
la
ti
on
of
relat
i
on
s
i
n
the f
ie
ld
of e
nsuri
ng
t
he
in
f
orm
at
ion
secu
rity
o
f
m
ob
il
e ph
on
e
u
se
rs. T
he sources
of
nor
m
at
ive legal ac
ts wer
e
sp
eci
al
iz
ed
inf
or
m
at
ion
le
gal
search
s
yst
e
m
s
are
nam
e
d
"C
onsu
lt
ant
-
Plus"
an
d
"G
aran
t"
,
in
wh
i
ch
al
l
norm
at
ive
le
ga
l
act
s
are
pr
es
ented
in
a
n
act
ual
fo
rm
.
The
analy
sis
of
norm
at
ive
le
gal
act
s
and
sta
ndar
ds
al
lowed
to
det
erm
ine
the
sta
te
ap
proac
hes
t
hat
are
re
flect
ed
in
the
f
un
ct
ion
s
of
s
pecial
i
zed
sta
te
bo
dies
i
n
the
fiel
d
of
e
ns
uri
ng
inf
or
m
at
ion
secur
it
y,
and
that
al
so
re
vealed
th
e
sh
ort
com
ing
s
of
su
c
h
ap
proac
hes.
The
stu
dy
an
d
analy
sis
of
the
pract
ic
e
of
pro
visio
n,
re
flect
ed
in
E
urop
ea
n
stu
dies,
descr
i
bing
possible
so
luti
ons
prote
ct
ion
of
pe
rsonal
data
a
nd
inf
or
m
at
ion
se
cur
it
y,
m
ade
it
po
s
sible
to
c
om
par
e
the
R
us
sia
n
exp
e
rience
of
s
ta
nd
a
rd
iz
at
io
n
with
the
ex
per
i
ence
in
Eu
rope
and
com
e
to
t
he
co
nclusi
on
t
hat
the
prob
le
m
s
of
ens
ur
in
g
the
sa
fety
of
com
m
u
nicat
ion
s
are
r
el
evan
t
w
or
l
dwide.
I
n
the
d
evelo
pm
ent
of
sta
nd
a
rds
in
the
fiel
d
of
in
f
or
m
at
ion
secur
it
y
of
m
ob
il
e
com
m
un
icati
on
s,
E
uro
pe
an
resea
rch
e
rs
hav
e
a
dvance
d
further.
This
c
an
be
exp
la
ine
d
by
the
fact
that
a
l
arg
e
num
ber
of
m
ob
il
e
com
m
un
ic
at
io
n
te
ch
no
l
og
ie
s
(s
of
t
war
e
a
nd
ha
r
dware
)
are
dev
el
o
pe
d
by
Euro
pean
m
anufactu
rer
s
.
Howe
ver,
Rus
sia
,
us
in
g
s
uc
h
te
ch
no
l
og
ie
s
,
shou
l
d
al
so
ens
ure
the
secur
it
y
of
com
m
un
ic
ati
on
a
nd
use
rs
of
m
ob
il
e
te
lep
ho
nes.
F
or
e
ach
perso
n
in
dev
el
ope
d
co
un
t
ries,
on
a
verage
,
th
ere
is
m
or
e
than
one
s
uch
phone.
For
exa
m
ple,
on
avera
ge,
Ru
ssians
ha
ve
tw
o
m
ob
il
e
phone
nu
m
ber
s
[
15
]
.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
10
, No
.
3
,
J
une
2020
:
31
84
-
319
2
3186
To
sear
ch
for
and
form
ulate
po
s
sible
ways
to
de
velo
p
re
gula
tory
re
gula
ti
on
a
nd
el
im
in
at
e
gap
s
i
n
Russian
le
gisla
ti
on
,
t
he
forec
ast
ing
a
nd
m
od
el
ing
m
et
ho
d
was
us
e
d.
I
n
R
us
sia
,
t
her
e
is
a
la
ck
of
resea
rch
in
this
fiel
d,
in
con
t
rast
to
Eu
rope.
F
or
this
reas
on,
at
a
m
eet
ing
of
a
n
e
xpert
-
co
nsult
at
ive
gro
up
c
al
le
d
"On
L
egal
R
egu
la
ti
on
of
Li
m
iting
the
Use
of
the
I
nt
er
net
for
Cr
yptogra
ph
ic
Me
ans
an
d
Me
ans
of
Ano
nym
iz
at
ion
for
Te
rror
ist
Pur
po
ses"
w
hi
ch
wa
s
bein
g
held
unde
r
t
he
directi
on
of
R
os
kom
nad
z
or
,
2017,
th
is i
ssu
e
w
as
m
ade on
the
a
ge
nd
a
. T
he
a
uthor
is a m
e
m
ber
of this e
xpert
gro
up.
3.
RESU
LT
S
A
ND AN
ALYSIS
3.1.
The term
“
m
obi
le
ph
one”
and
“s
ub
scri
be
r”
A
sm
artphon
e
is
a
pe
rsonal
c
om
pu
te
r
with
a
m
ob
il
e
com
m
un
ic
at
ion
f
unct
ion.
In
t
his
pap
e
r
we
will
us
e
sm
artph
on
e
and
m
ob
il
e
phone
as
syn
onym
s.
UMTS
m
ob
il
e
ph
ones
are
subscri
be
r
te
rm
inals
tha
t
are
structu
rall
y
an
d
f
unc
ti
on
al
ly
com
plete
dev
ic
es
that
ha
ve
con
t
ro
ls
a
nd
dis
play
an
d
pro
vid
e
us
er
s
with
te
le
ph
ony,
m
ultim
edia
and
da
ta
serv
ic
es
f
or
the
UMT
S
m
ob
il
e
telephon
e
syst
em
[16]
.
The
def
i
niti
on
of
a
su
bs
c
ribe
r
of
"
m
ob
il
e
co
m
m
un
ic
at
ion
",
was
determ
ined
at
the
end
of
Ju
ly
20
17,
by
a
m
end
ing
the
Fede
ral
Law
"O
n
Co
m
m
un
ic
at
ion
s"
.
Accord
i
ng
t
o
Ar
t.
1
"
m
ob
il
e
rad
iotel
ep
hone
com
m
un
ic
at
ion
serv
ic
e
s
are
pro
vid
e
d
to
a s
ub
s
cribe
r
w
ho
is an i
nd
i
vidua
l or a s
ubscribe
r
w
ho is a
legal
en
ti
ty
o
r
a s
ol
e pro
pr
ie
to
r"
[
17
]
.
3.2.
The co
ncept
of "undecl
ared
f
unc
tio
na
li
t
y" in
terms
of
Ru
s
si
an
le
gislat
i
on
"Undecla
re
d
f
un
ct
io
nalit
y"
i
s
a
sp
eci
fic
te
rm
ado
pted
in
Russia.
Ac
cordin
g
to
th
e
gu
i
danc
e
do
c
um
ent,
"u
ndecl
are
d
ca
pabi
li
t
ie
s
are
un
de
rstood
to
m
ean
a
ny
f
unct
io
nalit
y
of
t
he
s
of
t
war
e
w
hich
is
not
descr
i
bed
or
not
co
rresp
ondi
ng
to
f
un
ct
io
na
li
ty
descr
ibe
d
in
t
he
do
c
u
m
entat
ion
a
nd
w
hich
m
ay
vio
la
te
the
confide
ntial
it
y,
avail
ability
or
integrity
of
the
inform
ation
bein
g
pr
oce
ssed"
[
13
]
.
T
hroug
h
su
c
h
undecl
are
d
fun
ct
ion
al
it
y,
thir
d
par
ti
es
m
ay
i
ll
egall
y
gain
a
ccess
to
pe
rsonal
data
or
c
onfide
ntial
inf
orm
at
ion
.
Inform
at
ion
secur
it
y specia
li
sts fr
om
Per
cepti
on
P
oin
t war
ne
d
of
the e
xistence of
a d
a
nge
rous
vulne
rab
il
it
y
in
the
Linux
ke
rnel
wh
ic
h
gi
ves
the
at
ta
c
ker
fu
ll
acce
ss
to
t
he
A
ndro
i
d
op
erati
ng
syst
em
as
an
adm
inist
rator.
This
da
ng
e
r
ous
vu
ln
era
bili
ty
is
cal
le
d
CVE
-
2016
-
0728
an
d
had
existe
d
since
2012
[
18]
.
So
ftwa
re
f
or
m
ob
il
e
dev
ic
es
that
ha
s
unde
cl
ared
functi
onal
it
y
is
a
m
alici
ou
s
c
om
pu
te
r
pro
gr
am
.
Acc
ordin
g
t
o
A
rt.
273
of
the
Crim
inal
Cod
e
"m
al
iciou
s
com
pu
te
r
pro
gr
am
s
inclu
de
pro
gr
am
s
that
are
deliberatel
y
desig
ned
t
o
un
a
utho
rized
de
structio
n,
bl
oc
king,
m
od
ific
at
ion
,
c
opyi
ng
of
com
pu
te
r
i
nfo
rm
ation
or
ne
utrali
zi
ng
co
m
pu
te
r
inf
or
m
at
ion
pr
otect
ion
facil
it
ie
s."
3.3.
The ri
sks
of leak
ag
e
of c
onfidenti
al us
er in
fo
rm
ati
on
The
prob
le
m
of
pr
e
ve
ntin
g
undeclare
d
f
un
ct
io
nalit
y
is
directl
y
relat
ed
to
t
he
pr
oble
m
s
tru
s
t
evaluati
on
w
hi
ch
is
sti
ll
no
t
fu
ll
y
reso
l
ved.
Althou
gh
devel
op
e
rs
are
lo
ok
i
ng
for
an
d
dev
el
op
i
ng
po
ssible
secur
it
y
so
luti
on
s
f
or
sm
artph
ones
.
For
ex
a
m
ple
,
to
ensu
re
in
form
at
io
n
secu
rity
,
it
i
s
pr
op
os
e
d
tha
t
each
update
s
oft
ware
sho
uld
be
sign
e
d
(
ver
ifie
d)
[
9]
.
T
he
m
ark
et
offer
s
an
inf
or
m
at
ion
sec
ur
it
y
syst
em
c
al
le
d
TISSA,
wh
ic
h
i
m
ple
m
ents
An
dr
oid
pri
vacy
m
od
e
an
d
w
hi
ch
can
al
lo
w
use
rs
to
fle
xib
ly
co
ntr
ol
the
set
ti
ng
s
of
their
ph
one
[10]
.
De
fe
nse
In
f
orm
ation
Ser
vice
Agency
(DIS
A)
dev
el
op
e
d
a
sta
nd
a
rd
(t
he
Mob
il
e
Applic
at
ion
s
S
ecur
it
y
Re
quir
e
m
ents
G
uid
e
or
t
he
SR
G)
that
m
ay
be
use
d
f
or
de
velo
ping
ne
w
a
pps
a
nd
te
sti
ng
,
vetti
ng,
an
d
as
sessin
g
existi
ng
a
pp
s
,
pro
vid
i
ng
a
c
on
si
der
a
ble
de
gr
ee
of
protect
ion
t
hro
ugh
a
pply
ing
con
t
ro
ls
a
nd
be
st
pr
act
ic
es
in
us
e
t
hroug
hout
the
i
ndus
tr
y
to
reduce
vu
lnera
bili
ti
es
[11]
.
I
n
Russia
t
her
e
is
ano
t
her
ap
pr
oa
ch.
I
n
2002,
th
e
Fede
ral
La
w
"O
n
Tec
hnic
a
l
Re
gu
la
ti
on"
was
a
dopte
d
t
o
de
velo
p,
a
do
pt
a
nd
app
ly
m
and
at
ory
re
qu
i
rem
ent
s
f
or
pro
duct
s
an
d
desig
n
-
re
la
te
d
proce
sse
s,
incl
ud
i
ng
th
ei
r
ap
plica
ti
on
an
d
execu
ti
on
on
a
vo
lu
ntary
ba
sis
requirem
ents
to
pro
du
ct
s,
desi
gn
pr
ocesses
,
pro
duct
ion,
co
ns
tr
uction,
instal
la
ti
on
,
c
om
m
iss
ion
in
g,
op
e
rati
on,
st
orage,
t
ran
s
porta
ti
on
,
sal
e
an
d
disposal,
a
s
w
el
l
as
to
perform
ing
works
or
pro
vi
de
se
rv
ic
es
f
or
the
purpose
of
volu
ntary
ce
r
ti
ficat
ion
.
T
he
sco
pe
of
t
his
la
w
do
es
not
in
cl
ud
e
hard
war
e
or
s
of
t
war
e
in
f
orm
at
ion
secu
rity
.
The
declara
ti
on
of
c
onf
orm
ity
say
s
that
the
pro
duct
s
adh
e
re
to
the
requirem
ents
of
te
chn
i
cal
reg
ulati
on
s
(TR).
A
de
te
rm
inati
on
of
wh
et
her
pro
duct
s
m
ee
t
the
TR
requirem
ents can on
ly
be
m
ade on
the
b
a
sis
of the
d
ecl
arati
on of c
onf
or
m
i
ty
.
Fu
rt
her
the
re
is
no
le
gislat
ive
de
finiti
on
of
c
om
pu
te
r
inf
or
m
at
i
on
protect
ion
to
ols.
In
the
la
w
"On
Stat
e
Sec
rets
"
[19]
"i
nf
or
m
at
ion
securi
ty
includes
te
chn
ic
al
,
cry
ptogra
phic
,
softw
are
an
d
oth
e
r
m
eans
desig
ne
d
to
protect
inf
or
m
at
i
on
t
hat
co
ns
ti
tutes
sta
te
secr
et
s,
the
m
eans
in
w
hich
the
y
are
im
ple
m
e
nte
d,
as
well
as
m
eans
to
co
ntr
ol
th
e
eff
ect
iv
eness
of
in
form
at
ion
protect
io
n".
H
ow
e
ve
r,
a
m
obil
e
phon
e
co
ns
i
sts
of
hard
war
e
a
nd
so
ft
war
e,
a
nd
each
m
ay
hav
e
vulne
rabi
li
t
ie
s
that
can
le
ad
to
the
il
le
gal
colle
c
ti
on
of
inf
or
m
at
ion
store
d
or
associa
te
d
with
the
m
ob
il
e
phone.
R
isk
can
be
asse
ssed
us
i
ng
a
hi
erarc
hical
m
eth
od
of
trust
asses
sm
ent.
T
his
al
lows
us
er
s
to
c
om
bin
e
trust
ind
ic
at
or
s
a
nd
to
chec
k
the
m
et
ric
of
tr
us
t
f
or
eac
h
com
po
ne
nt
of
the
m
ob
il
e
syst
e
m
[12]
.
T
he
Rus
sia
n
a
ppr
oac
h
desc
rib
ed
in
the
sta
ndar
ds
al
s
o
us
e
s
this
pr
i
nciple
[
13]
.
Su
c
h
a
n
e
val
uati
on
syst
em
is
rec
ognized
as
the
m
os
t
pro
du
ct
ive
,
be
cause
e
valuate
s
al
l
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N: 20
88
-
8708
Th
e
prote
ct
mo
bile user
data
in
R
us
si
a
(
An
na
Zhar
ova
)
3187
the co
m
po
ne
nt
s o
f
the syst
em
. I
n
a
pp
ly
in
g
th
is
m
et
ho
do
l
ogy, the Eu
r
op
ea
n
an
d
Russia
n
appr
oach
es a
re
close.
Howe
ver,
des
pi
te
the
existe
nc
e
of
a
regulat
or
y
f
ram
ewo
r
k,
the
issue
of
pr
e
ve
nting
t
he
il
le
gal
colle
ction
of
confide
ntial
inf
or
m
at
ion
re
m
ai
ns
.
I
n
t
his
re
gard,
we
will
co
ns
i
d
er
regulat
or
y
act
s
to
det
erm
ine
the
re
quirem
ents
an
d
c
onditi
ons f
or
the
ha
r
dware and
s
of
t
w
are
c
om
plex
to
be
i
ntr
oduce
d
into
ci
vil
ci
rc
ul
at
ion
in Russ
ia
.
3.4.
Int
er
op
er
ab
il
ity
of leg
al n
or
m wi
th
n
orm
of
tech
nical re
gu
la
tio
n for
m
ob
il
e d
ata
sec
urity
Ther
e
a
re
different
po
sit
io
n
on
w
hethe
r
th
e
certi
ficat
ion
of
t
he
m
ob
il
e
phone
s
of
tw
are
le
ads
t
o
the
secu
rity
of
the
co
nf
i
den
ti
a
l
inform
at
ion
of
the
m
ob
il
e
phon
e u
se
r.
Sec
uri
ty
exp
erts
a
gree
that
sta
nd
a
r
dized
so
luti
ons
an
d
pr
act
ic
es
sho
uld
be
us
e
d
in
the
first
place
[
20
]
,
[
21]
.
Stan
dards
hel
p
offi
cers
res
pons
ibl
e
fo
r
introd
ucin
g ne
w
sec
ur
it
y m
ea
su
res
to
a
nswe
r
the
quest
io
ns
reg
a
rd
i
ng the c
ho
ic
e
of m
et
ho
ds
, t
he pri
or
it
ie
s and
extent
of
i
m
pl
e
m
entat
ion
,
o
r
the
su
f
fici
ency
of
the
ap
proac
h.
O
n
the
oth
e
r
hand,
it
is
i
mp
ossi
ble
to
en
vi
sage
al
l
sit
uations
in
the
sta
nd
a
r
d,
the
refor
e
vu
l
ner
a
bi
li
ti
es
no
t
co
ver
e
d
by
re
gu
la
ti
on
will
arise.
Su
c
h
vu
l
ner
a
bi
li
ti
es
can
be
e
xp
l
oited.
The
r
e
is
ris
k
high
i
s
us
i
ng
of
ree
war
e
r
ou
ti
ne
s
and
li
br
a
ries
t
hat
can
con
ta
in
kn
own
m
al
war
e.
Rus
sia
'
s
app
r
oach
to
softwa
re
sta
nd
a
r
dizat
ion
is
differe
nt.
T
he
sco
pe
of
the
F
eder
al
Law
O
n
Tec
hn
ic
al
Re
gu
la
ti
on
“d
oes
not
a
pp
l
y
to
[.
.
.]
sta
nda
rd
s
f
or
the
diss
e
m
inati
on
,
pro
visio
n
or
discl
os
ure
of
i
nfo
rm
ation”
(
par
a.
3
of
Ar
t
.
1)
.
Co
nse
quently
,
c
om
pu
te
r
pro
gr
a
m
s
are
no
t
s
ubj
ect
t
o
m
and
at
ory
certi
ficat
ion
.
Wh
e
n
purc
hasi
ng
s
of
tw
are,
c
on
s
um
ers
sho
ul
d
be
ass
ured
that
the
re
a
re
no
functi
ons
al
l
ow
i
ng
the
il
le
gal
tra
nsfer
of
i
nfor
m
at
ion
.
H
oweve
r,
due
to
la
c
k
or
m
and
at
or
y
sta
nd
a
rds,
c
on
su
m
ers
can
no
t
ha
ve
su
c
h
c
onfide
nc
e.
Accor
ding
to
t
he
lo
gic
of
the legisl
at
ion
,
th
e
vo
l
un
ta
rily
acce
ptance o
f
sta
nd
a
r
ds
m
eans
the
c
om
pan
y
dem
on
strat
es
t
he
sa
fety
of
it
s
ph
on
es
to
the
c
onsu
m
er,
giv
in
g
it
a
co
m
pet
it
ive
adv
a
ntage.
T
he
netw
or
k
op
e
rati
ng
syst
e
m
Mi
cro
so
ft
W
i
ndows
Ser
ve
r
20
03
c
onfir
m
ed
their
co
m
pl
ia
nce
with
the
re
qu
i
rem
ents
of
FSTEC
in
the
certi
ficat
ion
of
in
form
at
ion
secur
it
y
too
ls
fo
r
in
form
at
i
on
sec
ur
it
y
req
ui
rem
ents
FSTEC
of
Russia,
certi
fy
ing
the
Russia
n
ve
rsion
o
f
W
i
ndows
Se
rver
2003
(S
ta
ndard
E
diti
on
an
d
Enter
pri
se
Editi
on
)
and
t
he
R2
ve
rsion.
Mi
cr
os
oft
al
so
un
der
ta
kes
the
m
on
thl
y
certi
ficat
ion
of
new
patche
s
for
these
pro
du
ct
s
.
Give
n
that
t
he
de
velo
pm
ent
of
softwa
re
is
the
resu
lt
of
intel
le
ct
ua
l
act
ivit
y,
it
is
log
ic
al
t
o
assig
n
respo
ns
ibil
it
y
to
the
softwa
re
dev
el
op
e
r.
H
oweve
r
t
he
par
t
of
R
us
sia
n
ci
vi
l
le
gislat
ion
de
vo
te
d
to
intel
le
ct
ual
act
ivit
y
and
th
e
m
eans
of
in
di
vid
ualiz
at
io
n
do
e
s
not.
Acc
ordi
ng
t
o
the
fir
st
and
sec
ond
par
t
of
the
Ci
vi
l
Cod
e
,
the
i
m
po
sit
ion
of
li
abili
ty
is
po
s
sible
only
on
t
he
ge
neral
basis
of
Art
.
15
a
nd
1064
of
the
Ci
vil
Code
.
Accor
ding
to
wh
ic
h
a
perso
n
w
ho
se
ri
gh
t
ha
s
bee
n
vio
la
te
d
m
ay
cl
aim
ful
l
com
pen
sat
ion
f
or
los
ses
ca
us
e
d
to
him
Part
1
a
nd
pa
rt
2
of
Ar
t.
1064
s
pecifies
that
losses
a
re
unde
rstood
as
exp
e
ns
es
that
t
he
per
s
on
has
or
will
hav
e
t
o
pe
rform
to
restor
e
hi
s
vio
la
te
d
ri
ght,
as
well
as
the
unear
ne
d
incom
e
that
this
per
s
on
w
ould
ha
ve
receive
d unde
r
nor
m
al
co
ndit
ion
s
of ci
vil t
urnove
r,
ha
d his
rig
ht not
been
vio
la
te
d.
The
per
s
on
w
ho
ca
us
e
d
the
har
m
is
exem
pt
fr
om
co
m
pensat
ion
for
har
m
,
if
he
ca
n
pr
ov
e
t
hat
the
ha
rm
was
no
t
ca
us
e
d
t
hroug
h
his
fa
ult.
H
ow
e
ver,
th
e
la
w
m
ay
pr
ov
ide
com
pen
sat
ion
f
or
ha
rm
a
nd
in
the
abse
nce
of
the
fa
ult
of
th
e
har
m
-
bea
rer
.
The
m
ob
il
e
phone
u
se
r
ca
n
protect
him
sel
f
only
by
inclu
s
ion
of
conditi
ons
f
or
the
res
pons
i
bili
ty
of
the
devel
op
e
r
f
or
e
rro
rs
in
t
he
softw
are.
Howe
ver,
su
c
h
pr
ocedu
re
f
or
con
cl
ud
i
ng
a
c
on
t
ract
in
m
os
t
cases
was
no
t
us
ed,
beca
use
pr
act
ic
e
f
ollow
s
t
he
pat
h
of
us
e
ag
reem
ent
of
acce
ssion.
Sey
ed,
et
al
.
[
6]
be
li
eves
that
th
e
losses
to
persons
us
i
ng
c
om
pu
te
r
progra
m
s
in
their
econom
i
c
act
ivit
ie
s
l
ie
in
the
con
tract
ua
l
sp
her
e
.
The
Ci
vil
Cod
e
est
ablishes
a
pres
um
ption
of
faul
t
of
the
har
m
-
bear
e
r.
In
A
rt.
10
64,
t
he
pr
es
um
ption
of
t
he
fa
ult
of
t
he
har
m
-
be
arer
s
ugge
sts
that
the
a
bs
e
nc
e
of
guil
t
shoul
d
be
pr
ese
nted
by
ha
rm
-
bear
er.
H
ow
e
ve
r,
t
he
de
velo
per
'
s
fa
ult
do
e
s
no
t
a
rise,
if
the
res
pons
i
bili
ty
of
the
s
oft
war
e
dev
el
op
e
r
is
not
determ
ined
by
the
c
on
t
r
act
and
i
f
al
l
the
te
rm
s
that
are
sp
eci
fied
in
the
c
on
t
ra
ct
are
com
plied w
it
h.
In
the
f
ourth
par
t
of
the
Ci
vil
Cod
e:
para.
3
of
Ar
t.
1252
of
the
Ci
vil
Cod
e
dete
rm
ines
that
rig
htholder
ca
n
the
protect
io
n
of
his
exclu
sive
rig
hts
by
exer
ci
sed
th
r
ough
a
cl
ai
m
for
com
pen
sat
ion
f
or
dam
ages
to
a
per
s
on
w
ho
il
le
gally
us
ed
th
e
resu
lt
of
inte
ll
ect
ual
act
ivity
or
a
m
eans
of
in
div
i
du
al
iz
at
ion
of
le
gal
entit
ie
s,
com
m
od
it
ie
s,
la
bor
an
d
ser
vices,
w
hic
h
are
p
rovide
d
with
le
gal
pro
te
ct
ion
.
I
n
thi
s
case
,
the
pro
of
of
th
e
a
m
ou
nt o
f
da
m
ages
in
acco
r
dan
ce with
t
he
gen
e
ral
r
ules
is
assigne
d
to
th
e
rig
ht
holde
r
whose
rig
ht
is
vio
la
te
d.
Acc
ordi
ng
t
o
Ar
t
.
1252
of
the
Ci
vil
Cod
e,
com
pen
sat
ion
f
or
dam
ages
is
connecte
d
on
ly
with
the
vio
la
ti
on
of
this
exclusi
ve
rig
ht
and
w
it
h
the
il
l
egal
us
e
of
the r
es
ult
of
intel
le
ct
ual
activity
or
by
m
ea
ns
of
ind
ivi
du
al
iz
at
ion,
but
no
t
with
the
fact
that
the
so
ft
war
e
it
sel
f
can
inflic
t
prop
e
rty
or
m
or
al
ha
rm
to
us
ers
of
so
ft
war
e
.
Judic
ia
l
pr
act
ic
e
in
cases
of
the
protect
ion
of
i
ntell
ect
ual
righ
ts
ha
s
dete
rm
ine
d
that
com
pensat
io
n
for
m
or
al
dam
age
as
a
non
-
pro
per
ty
ri
gh
t
is
no
t
c
onnecte
d
with
e
xclusi
ve
rig
hts,
"a
n
e
xclusi
ve
ri
gh
t
is
no
t
su
bject
to
prot
ect
ion
by
recoveri
ng
com
pensat
ion
f
or
m
or
al
har
m
,
as
it
i
s
a
pr
operty
righ
t"
[
22
]
.
Ac
c
ordi
ng
Ar
t.
1100
of
t
he
Ci
vil
Cod
e,
t
he
ri
gh
t
ho
l
der
for
a
protect
io
n
of
his
pe
rs
onal
non
-
pro
per
t
y
righ
ts
ca
n
cl
aim
ed
on
rec
ognizi
ng
the
righ
t
an
d
resto
rin
g
the
sit
ua
ti
on
that
exi
ste
d
befor
e
the
vio
la
ti
on
of
th
e
la
w;
can
cl
aime
d
su
pp
ressin
g
a
ct
ion
s
that
vio
la
te
the
la
w
or
t
hr
eat
e
n
it
s
vio
la
ti
on.
Accor
ding
to
the
ge
ner
al
gro
unds,
com
pen
sat
ion f
or m
or
al
h
arm
is carr
ie
d ou
t
r
egardless
of th
e fa
ult of the
harm
'
s caus
er.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
10
, No
.
3
,
J
une
2020
:
31
84
-
319
2
3188
Th
ere
f
or
e,
if
the
software
ha
rm
s
the
li
censee,
then
only
on
the
basis
of
ge
ner
al
pr
ov
isi
on
s
of
the
Ci
vil
Cod
e
,
can
the
li
cen
s
ee
dem
and
co
m
pen
sat
ion
f
rom
the
li
censo
r
.
The
li
cens
or
m
us
t
pr
ov
i
de
e
vid
e
nce
that
the
dam
a
ge
was
not
hi
s
fau
lt
.
If
it
is
est
ablished
t
hat
the
dam
age
was
cause
d
thr
ough
the
fa
ult
of
the
li
censor,
th
en
the
li
censor
will
hav
e
to
s
at
isfy
the
dam
age
in
f
ull,
unle
ss
the
la
w
or
the
co
ntract
prov
i
des
for
c
om
pen
sat
ion
of
l
os
ses
in
a
sm
al
le
r
a
m
ou
nt.
F
or
exam
ple,
t
he
E
uro
pe
an
C
omm
issio
n
in
20
09
pro
po
s
ed
a
bill
to
pr
otect
so
ftware
use
rs
from
err
ors
inh
ere
nt
in
the
software
w
hich
pro
vi
des
for
the
li
abili
t
y
of
so
ft
war
e
vend
or
s
for
the
s
hortc
om
ing
s
of
the
so
ft
war
e
pro
du
ct
an
d
c
om
pen
sat
ion
f
or
dam
age
cause
d
to
the
c
on
s
um
er
as
a
resu
lt
of
it
s
us
e
[23]
.
I
n
2017,
EC
rec
onsidere
d
t
he
Dire
ct
ive
85/3
74/E
EC.
“T
he
pur
pose
of
this
evaluati
on
is
to
assess
th
e
functi
onin
g
a
nd
t
he
pe
rfor
m
ance
of
Co
unci
l
Directi
ve
85/
374/EEC
c
on
c
ern
i
ng
Lia
bili
ty
fo
r
D
efecti
ve
Pro
duct
s
(LD
P
)
as
m
od
ifie
d
by
D
irect
ive
1999/34
/EC
of
the
Euro
pean
Pa
rliam
ent
and
of
the
C
ouncil.
A
key
issue
is
to
ref
l
ect
wh
et
her
D
irect
ive
85/3
74/EEC
is
fit
f
or
pur
pose
vis
-
à
-
vis
new
te
ch
no
l
ogic
a
l
dev
el
op
m
ents
a
nd
w
het
her
it
co
ver
s
cases
of
m
al
fu
nctio
ning
ap
ps
a
nd
non
-
e
m
bed
ded
so
ft
war
e
”
[
24
]
.
Russia
al
s
o
wan
ts
t
o
im
pl
e
m
ent
the
ide
a
that
softwar
e
shou
l
d
be
de
v
el
oped
acco
rd
i
ng
t
o
secur
it
y r
ules.
The
Co
unci
l
of
the
Eu
rasia
n
Eco
nom
ic
Com
m
issi
on
de
te
rm
ined
that
"i
nd
e
pende
nt
so
ft
war
e
is
consi
der
e
d
a
n
act
ive
m
edical
dev
ic
e
[...]
and
the
sa
fety
of
a
m
edical
dev
ic
e
is
de
fin
ed
as
the
abse
nce
of
un
acce
pta
ble
risk
as
so
ci
at
e
d
with
ca
us
in
g
har
m
to
li
fe,
hu
m
an
he
al
th
an
d
the
env
i
ronm
ent."
[25]
.
Com
pan
ie
s
are
try
ing
to
s
ol
ve
these
pro
bl
e
m
s
by
dev
el
op
i
ng
t
he
Dec
la
rati
on
of
I
nfor
m
at
ion
Se
cu
rity
.
Fo
r
exam
ple,
MTS
has
de
ve
lop
e
d
a
Decla
r
at
ion
on
th
e
Prote
ct
ion
of
Subscri
ber
s
from
Cy
ber
th
reats
(
MTS)
,
banks
a
re
al
so
dev
el
op
i
ng
t
he
ir
own
Infor
m
at
ion
Secu
rity
Declarat
ion
s
[26]
.
Cu
rr
e
ntly
,
Russian
ci
vi
l
la
w
do
e
s
not
direct
ly
deter
m
ine
t
he
pe
rsons
re
s
pons
i
ble
for
possible
dam
ag
e
caused
by
software
.
The
re
are
no
current
sta
ndar
ds
that
determ
i
ne
the
secu
rity
ru
le
s
of
th
e
software
bein
g
de
velo
ped.
Acc
ordin
g
to
Cha
pt
er
19
of
the
R
us
sia
n
Ad
m
inist
rati
ve
Cod
e,
a
dm
inist
rati
ve
li
ability
is
est
ablished
only
for
vi
olati
on
s
of
te
c
hn
ic
al
regulat
ion
s
,
sta
te
sta
nd
ar
ds
,
certi
ficat
ion
r
ules,
an
d
re
gu
la
tory
do
c
um
ents
on
ens
uri
ng
the
uni
f
or
m
it
y
of
m
easur
em
ents;
gen
e
ral
pu
rpo
se
hard
war
e
a
nd
softwa
re
do
no
t
fall
into
t
hese
cat
eg
ori
es.
A
way
out
of
s
uc
h
a
sit
uation
co
ul
d
be
the
intr
oductio
n
of
a
pract
ic
e
wh
ic
h
would
in
cl
ude
in
li
cense
agreem
ents
the
pe
rson
respo
ns
ible
for
possible
ha
rm
from
the so
ft
w
are.
Accor
ding
to
Ar
t.
5
of
the
C
ivil
Cod
e
"st
a
ndar
d
business
pr
act
ic
e
are
th
e
est
ablishe
d
r
ule
of
c
onduct
that
is
pr
evale
nt
and
widely
app
li
ed
in
a
ny
area
of
entre
prene
ur
ia
l
or
ot
her
act
ivit
y,
not
the
ru
le
of
cond
uct
pro
vid
e
d
by
la
w".
Stan
da
rd
bu
si
ness
pr
act
i
ce
are
sources
of
la
w.
F
or
exam
ple,
in
IS
O/IEC
19
770
-
2:
20
09
wh
ic
h
wa
s
put
into
ef
fect
in
Russia
in
2016,
sect
io
n
“
h
”
def
i
nes
the
re
qu
i
rem
ent
"t
o
ref
le
ct
in
the
t
ag
of
so
ft
war
e
ide
ntific
at
ion
data
a
nd
the r
eq
uire
m
ents
of
va
rio
us
sub
j
ect
s,
in
c
lud
in
g
s
of
twa
r
e
dev
el
ope
rs,
s
of
t
war
e
li
censo
r
s,
pac
ker
s
,
distri
butors
of
softwa
re,
al
l
sub
j
ect
s
w
hich
a
re
exter
nal
to
th
e
consum
er."
[27]
.
We
pro
pose
s
upplem
enting
sect
ion
“
h
”
of
this
sta
nd
ar
d
with
a
pro
vision
to
i
nclu
de
in
the
softwar
e
ta
gs
identific
at
ion
of
w
ho
is
res
pons
i
ble
f
or
a
ny
ha
rm
caused
by
the
s
of
t
war
e
.
T
his
wil
l
m
ake
it
po
s
s
ible
to
un
i
qu
el
y i
de
ntify t
he pers
on i
n
c
harge a
nd e
xten
d respo
ns
i
bili
ty
A
ccordin
g
to
the
ge
ner
a
l groun
ds
of th
e Ci
vil
Cod
e
.
For
the
le
gal
regulat
ion
of
the
us
e
and
certi
ficat
io
n
of
m
ob
il
e
dev
ic
es
,
it
is
nec
essary
to
a
m
e
nd
Art
.
2
"B
asi
c
Co
nc
epts"
of
the
La
w
"O
n
C
ommun
ic
at
io
ns
",
a
ddin
g
a
def
i
niti
on
o
f
"m
ob
il
e
dev
ic
e".
I
n
a
ddit
ion
,
it
is
necessary
to
dev
el
op
a
set
of
le
gal
proposals
f
or
th
e
pr
otect
io
n
of
so
ftwa
re
us
e
r
s
fr
om
any
inh
ere
nt
error
s
. For t
his
, Art.
1235
of the Civil
Co
de on t
he
li
cen
se
agr
eem
ent sho
uld
be
s
upplem
ented wit
h p
rovisio
ns
about the
li
abili
ty
o
f
the
li
cen
so
r
for er
ror
s.
In
the
pr
e
am
bl
e
of
la
w
№
2300
"
On
t
he
pr
otect
ion
of
c
onsu
m
er
rig
hts"
[28]
it
is
dete
rm
ined
that
the
la
w
re
gu
la
t
es
relat
ions
th
at
arise
bet
wee
n
c
on
s
um
ers
a
nd
m
anu
factu
r
ers,
sel
le
r
s,
im
porters
w
he
n
s
el
li
ng
goods;
est
ablis
hes
t
he
ri
gh
ts
of
co
nsum
ers
to
purc
hase
good
s
of
a
de
qu
at
e
qual
it
y
and
s
afety
for
t
he
he
al
th,
li
fe
and
property
of
co
nsu
m
ers
and
the
env
ir
onm
ent;
ob
ta
ini
ng
in
form
ation
ab
out
goods
a
nd
thei
r
m
anu
f
act
ur
e
r;
est
ablishes
sta
te
and
so
c
ia
l
pr
otect
ion
;
and
the
m
e
ch
anism
to
reali
ze
these
rig
hts.
Howe
ver,
neit
her
R
os
potre
bnadz
or
nor
t
he
Roskom
nad
zo
r
co
ntr
ols
the
inf
or
m
at
ion
sec
ur
it
y
of
c
onsum
ers
of
m
ob
il
e co
m
m
un
ic
at
ion
s
. E
nsu
rin
g
in
form
at
io
n
sec
ur
it
y i
s no
t a functi
on
of
Rospotre
bnadz
or, alt
houg
h
it
is an
agen
cy
t
hat
is
e
m
po
we
re
d
to
con
t
ro
l
t
he
ob
s
erv
a
nce
a
nd
upholdi
ng
the
i
nterests
of
ci
ti
zens
i
n
a
wide
var
ie
ty
of
i
ndus
trie
s
.
T
he
basis
f
or
the
w
ork
of
the
a
ge
ncy
is
the
la
w
"O
n
the
protec
ti
on
of
co
nsum
er
ri
gh
ts"
.
I
n
orde
r
for
the
pro
vision
s
of
the
la
w
"On
t
he
protect
ion
of
c
onsum
er
rig
hts"
to
app
ly
to
t
he
re
su
lt
s
of
intel
le
ct
ual
act
ivit
y,
it
is
necessary
that
s
uch
softwa
re
(
the
pro
visio
n
a
nd
tran
sfe
r
of
rig
hts
f
or
t
he
r
esults
of
intel
le
ct
ua
l
act
ivit
y) b
e inc
lud
e
d
in
the
pr
ea
m
ble o
f
this
la
w.
The
li
st
of
R
osko
m
nad
z
or
f
un
ct
io
ns
does
no
t
incl
ude
th
e
colle
ct
ion
of
evide
nce
f
or
an
offe
ns
e
com
m
it
te
d
within
the
"p
ri
m
ary"
colle
ct
i
on
of
e
vid
e
nc
e
(in
the
c
ourse
of
the
pr
e
-
in
vestiga
ti
on
)
or
the
im
ple
m
ent
at
ion
of
instr
uctions
f
r
om
the
in
vestigat
or
or
the
c
ourt
on
t
he
perform
ance
of
urge
nt
inv
est
igati
ve
a
ct
ion
s.
T
he
li
st
of
inform
at
i
on
that
Ros
kom
nad
zor
is
au
thoriz
ed
to
bl
ock
do
es
no
t
inclu
de
har
m
fu
l
so
ft
wa
re.
The
refo
re,
the
exten
sio
n
of
the
auth
or
it
y
of
Ros
kom
nadzor
wil
l
al
low
app
li
cat
io
n
dir
ect
ly
to
this
sta
te
body.
It
is
al
so
ne
cessary
to
ext
end
t
he
auth
ori
ty
of
Roskom
nad
zo
r
on
the
pri
m
ary
colle
c
tio
n
of
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N: 20
88
-
8708
Th
e
prote
ct
mo
bile user
data
in
R
us
si
a
(
An
na
Zhar
ova
)
3189
evide
nce.
T
his
inf
or
m
at
ion
on
the
detect
ed
offenses,
R
osko
m
nad
z
or
shou
l
d
co
nsult
with
la
w
e
nfo
r
ce
m
ent
agen
ci
es
be
for
e
m
aking
deci
sion
s
.
It
is
ne
cessary
to
de
ve
lop
le
gal
m
eth
ods
a
nd
crit
e
ria
f
or
i
den
ti
f
yi
ng
undeclare
d
fun
ct
ion
al
it
y
of
m
ob
il
e
de
vices;
proce
dures
f
or
interact
ion
be
tween
us
er
s
of
m
ob
il
e
de
vices
an
d
te
le
com
m
un
ic
a
ti
on
s
operat
ors
,
and
R
os
kom
nazd
or
with
te
le
com
op
erato
rs,
if
the
sp
rea
d
of
har
m
fu
l
so
ft
war
e
via
a
m
ob
il
e
phone
is
conf
irm
ed.
In
te
rac
ti
on
proce
dure
s
sh
ould
determ
ine
the
pr
oc
edure
f
or
lo
dg
i
ng
a
com
plaint
to
a
te
le
co
m
m
un
ic
at
ion
s
operat
or
or
Ro
skom
nad
zo
r
ab
out
che
ckin
g
a
m
ob
il
e
phon
e
if
the
owne
r
of a m
o
bile p
hone
s
us
pects
th
e presence
of
ha
rm
fu
l sof
t
ware o
n his
dev
ic
e
.
Russia
pro
vide
s
inf
or
m
at
ion
secur
it
y
by
s
et
ti
ng
re
qu
i
re
m
ents
in
the
s
ta
nd
a
rd
s
f
or
t
he
pr
ocess
of
work
i
ng
with
sp
eci
fic
in
f
orm
at
ion
of
lim
i
te
d
acce
ss
(for
exam
ple,
pers
on
al
data,
ba
nk
sec
re
cy
).
H
oweve
r,
the
stu
dy
sho
w
ed
that
e
ven
t
houg
h
m
ob
il
e
operat
or
s
w
ork
with
in
form
at
i
on
of
lim
it
ed
acce
ss
(
per
s
ona
l
us
er
inf
or
m
at
ion
),
t
he
pro
cess
of
ensurin
g
the
secur
it
y
of
tra
ns
m
itted
infor
m
at
ion
and
store
d
in
form
at
i
on
on
m
ob
il
e
ph
one
us
ers'
ph
on
e
s
is
o
utside
of
t
he
sphere
of
in
f
or
m
at
ion
secu
r
it
y.
In
this
re
ga
rd,
the
sta
te
ne
eds
to
reconside
r
it
s
appro
ac
hes
t
o
m
on
it
or
in
g
m
ob
il
e
so
ft
war
e
te
ch
nolo
gies
in
Russi
a,
and
to
sta
nd
a
r
dize
the softwa
re
for
m
ob
il
e phone
s.
I
n b
oth
E
uro
pe
a
nd Russia,
the app
ro
ac
hes
a
nd m
od
el
s th
at
f
orm
the b
as
is for
ens
ur
in
g
the
in
form
ation
secu
rity
of
m
ob
il
e
us
ers
a
re
cl
os
e
,
this
is
becau
s
e
Russia
is
a
m
e
m
ber
of
the
IS
O
internati
onal
orga
nizat
ion
f
or
the
de
velo
pme
nt
of
sta
ndar
ds
.
H
oweve
r,
m
os
t
of
the
pr
ob
le
m
s
in
Rus
sia
ar
e
connecte
d
with
the
pri
ncipl
e
of
volu
ntar
y
ado
ptio
n
of
sta
nd
ar
ds
in
the
fiel
d
of
inf
or
m
at
ion
secur
it
y.
This,
i
n
tu
rn,
al
lows
te
ch
nolog
y
de
velo
pers
not
to
ce
rtify
their
te
ch
no
l
og
ie
s
,
an
d
sta
t
e
bodies
do
not
ha
ve
the
res
ponsi
bili
ty
to
con
t
ro
l
t
he
im
po
rted
te
chnolo
gies
of
m
ob
il
e
com
m
u
nicat
ion
an
d
t
o
super
vise
t
he
us
e
of
su
c
h
te
chnolo
gi
es
in
Russia.
Accor
dingly
,
m
ob
il
e
ph
one
us
ers
ha
ve
a
m
otivati
on
t
o
protect
them
se
lves
wit
h
the
possible
te
chnolo
gies
pr
esented
on
t
he
m
ark
et
,
but
this
al
so
le
ads
to
the
em
e
rg
e
nce
of
un
r
el
ia
ble
te
chnolo
gies
on the
m
ark
et
th
at
can wor
k
f
or
thir
d partie
s.
3.5.
S
tand
ards i
n the fiel
d
of m
obi
le
co
nnec
tio
n inform
at
i
on securi
t
y
Am
big
uity
in
the
certi
ficat
io
n
requirem
ents
of
m
ob
il
e
ph
one
c
om
po
ne
nts
increase
s
the
l
ikeli
hood
of
m
ob
il
e
ph
one
s
con
ta
i
ning
undeclare
d
f
unct
ion
al
it
y.
I
n
Russia,
the
sta
nd
a
rds
re
la
te
d
to
inf
orm
at
ion
te
chnolo
gy
secur
it
y
too
ls
are
un
it
ed
by
the
IS
O
27000
se
ri
es.
I
n
ad
diti
on
in
20
16
R
ussi
a
introdu
ce
d
Stat
e
sta
nd
a
rds
G
OST
R
56546
-
2015,
f
or
vulne
ra
bili
ty
detect
ion
of
i
nfor
m
at
ion
syst
em
s
and
the
cl
assifi
cat
ion
of
vu
l
ner
a
bili
ti
es
of
in
form
at
ion
syst
e
m
s.
This
is
par
t
of
a
s
et
of
sta
ndar
ds
est
ablishin
g
the
cl
assifi
ca
ti
on
of
vu
l
ner
a
bili
ti
es,
the
ru
le
s
for
descr
i
bing
the
vu
l
ner
a
bili
ti
es,
and
proce
dur
es
for
pe
rfo
rm
ing
work
t
o
id
entify
and
a
ssess
the
vu
l
ner
a
bili
ti
es
of
i
nfor
m
at
ion
syst
e
m
s.
GO
S
T
R
56546
-
2015
cl
assi
fies
th
ese
vulnera
bili
ti
es
by
their
or
i
gin
a
nd
by
the
ty
pe
of
def
ic
ie
ncy.
Sect
ion
5.2
i
nclu
des
"t
he
a
bili
ty
to
intr
oduce
c
omm
and
s
into
the
op
e
rati
ng
syst
e
m
that
al
low
at
ta
ckers
to
rem
otely
view
direct
ory
structu
res,
cop
y,
delet
e
file
s."
The
intr
oducti
on
of
com
m
and
s
into
the
O
S
al
lows
the
prof
il
in
g
of
a
m
ob
il
e
cl
ie
nt.
A
n
ap
p
m
a
y
con
ta
in
no
m
al
war
e,
bu
t
m
ay
be
pro
gr
a
m
m
ed
to
trans
m
it
a
us
er'
s
ad
dr
ess
bo
ok,
loc
at
ion
,
a
nd
a
ny
per
s
onal
ly
identify
in
g
inf
or
m
at
ion
to a
pre
-
determ
ined
locat
i
on
[
5]
.
Since
2018
in
Russia,
t
he
i
ssu
e
of
prese
r
ving
in
f
or
m
at
i
on
has
bee
n
s
olv
e
d
by
com
m
un
ic
at
ion
op
e
rato
rs
bein
g
require
d
t
o
s
tore
i
n
R
us
sia
1)
inf
orm
ation
ab
ou
t
voic
e
da
ta
,
te
xt
m
essages,
im
ages,
so
un
ds
,
vid
e
o
or
oth
e
r
com
m
un
ic
at
i
on
s
of
us
e
rs
f
or
three
ye
ars;
2)
te
xt
m
essages
of
use
rs
of
co
m
m
un
ic
at
ion
serv
ic
es
,
vo
ic
e
in
form
ation
,
im
ages,
so
un
ds
,
vi
de
o,
oth
er
m
essages
of
us
e
rs
of
com
m
un
ic
at
i
on
se
rv
ic
es
f
or
six
m
on
ths
[29]
.
Tel
ecom
m
un
icati
on
s
op
e
rato
r
s
are
obli
g
e
d
t
o
pr
ov
i
de
aut
horize
d
sta
te
bo
dies
inf
orm
ati
on
on
us
ers
of
c
omm
un
ic
at
io
n
se
rv
i
ces
an
d
on
the
com
m
un
ic
at
ion
se
rv
ic
es
re
ndered
t
o
them
,
and
ot
her
i
nform
at
ion
necessa
ry
for
t
he
pe
rfo
rm
anc
e
of
t
he
ta
sk
s
assigne
d
to
t
he
se
bodies,
i
n
c
ases
est
ablishe
d
fe
der
al
la
ws
[29]
.
The
c
os
t
of
e
ntry
into
f
or
ce
of
these
norm
s
w
as
assesse
d
i
n
diff
e
re
nt
ways
.
A
re
pr
ese
ntati
ve
of
Me
ga
Fon
sai
d
that
accor
ding
to
the
m
os
t
m
od
est
cal
culat
ion
s,
e
xpens
es
for
the
whole
co
un
t
ry
fo
r
al
l
op
e
rato
rs
woul
d
exceed
1
tril
lio
n
r
ub
le
s
.
T
his
will
aff
ect
t
he
c
os
t
of
c
om
m
un
ic
at
ion
s
erv
ic
es.
Th
e
he
ad
of
t
he
Mi
nistry
of
Com
m
un
ic
at
io
ns
sai
d
that
he
do
es
not
see
the
threat
of
a
n
increase
in
pr
ic
es
f
or
m
obil
e
op
erato
rs
due
to
the ado
ptio
n of am
end
m
ents
[
30
]
.
If
co
nf
i
de
ntial
data
is
stored
not
on
the
phone
but
on
the
serv
er
of
the
m
ob
il
e
op
erat
or
,
the
n
op
e
rati
ve
acce
ss
to
confide
nt
ia
l
data
sh
ou
l
d
be
al
lowed
on
ly
fr
om
the
m
ob
il
e
phon
e
us
i
ng
a
n
ap
plica
tio
n
that
do
e
s
no
t
ha
ve
cachin
g,
since "cac
hing
is
a
vu
lne
rab
il
it
y
that
al
lows
the
le
aked
c
onfide
ntial
info
rm
at
ion
store
d
on
the
ph
on
e"
[31]
.
Althou
gh
he
belie
ves
th
at
this
ris
k
ca
n
be
reduce
d
us
i
ng
arti
fici
al
int
el
li
gen
ce,
t
hat let
add
adap
ta
bili
ty
and
er
ror
resis
ta
nce
w
he
n
usi
ng
hi
gh
-
s
pe
ed
c
om
pu
ti
ng
[32]
.
T
his
bri
ngs
int
o
quest
ion
the
reli
abili
ty
of
op
e
rato
rs.
An
e
valuati
on
of
"
reli
abili
ty
"
can
be
ca
rr
ie
d
ou
t
ei
ther
by
vo
l
un
ta
ry
certi
ficat
ion
by
the
de
velo
pe
r
of
his
a
ppli
cat
ion
,
or
by
a
n
ope
n
rati
ng
wh
ic
h
is
car
ried
out
by
us
er
s
of
t
his
ap
plica
ti
on
.
The
pr
ese
nce
of
a
li
cense
w
il
l
a
l
low
the
de
velo
per
t
o
be
con
si
der
e
d
"r
el
ia
ble"
or
"s
uffici
ently
reli
able."
In
the
case
of
an
open
vo
te
,
t
he
cl
ass
will
be
assigne
d
accor
ding
to
the
s
iz
e
of
the
recei
ved
rati
ng.
Th
e
wide
range
of
a
pp
li
c
at
ion
s
f
or
m
obil
e
ph
ones
a
nd
m
ob
il
e
ph
ones
them
sel
ves
wh
ic
h
al
l
ha
ve
di
ff
ere
nt
re
qu
i
re
m
ents
of
in
form
ation
secu
rity
m
ak
es
it
dif
ficult
for
t
he
us
er
to
ens
ure
their
inf
or
m
at
ion
secur
it
y.
Gove
rnm
ents
assign ci
ti
zens
the r
es
ponsi
bili
ty
o
f dete
rm
ining t
he sa
fest m
od
el
on
wh
ic
h t
he
ap
plica
ti
on is b
ase
d.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
10
, No
.
3
,
J
une
2020
:
31
84
-
319
2
3190
Creat
ing
a
m
and
at
or
y
sta
nda
rd
iz
at
io
n
of
ap
plica
ti
on
s
is
of
great
i
m
po
rt
ance,
beca
us
e
app
li
cat
io
ns
will
be
easi
ly
recog
nizable
by
con
su
m
ers.
The
res
pons
i
bili
ty
of
the
devel
op
e
r
will
al
s
o
be
cl
ear.
F
or
this
,
sta
nd
a
rd
iz
at
io
n
bodies
s
hould
dev
el
op
m
and
a
tory
sta
ndar
ds
fo
r
reli
able
on
l
ine
secu
rity
an
d
de
vice
sec
ur
i
ty
in
te
rm
s
of
pe
rs
onal
data
proce
ssing.
F
or
exa
m
ple,
the
devel
op
e
rs
of
the
sta
ndar
d
s
ugge
st
that
the
le
vel
of
secur
it
y
is
co
nfi
rm
ed
by
a
va
li
d
dig
it
al
sig
na
ture.
This
al
l
ow
s
a
tr
us
te
d
s
ource
to
c
reate
the
co
de
a
nd
t
hat
it
do
e
s
not
con
t
ai
n
m
al
ic
iou
s
program
s.
If
the
sign
at
ure
is
m
issi
ng
or
the
sign
at
ure
cannot
be
ver
ifie
d,
the
ap
plica
ti
on
sh
ould
no
t
e
xe
cute
it
.
Fu
rt
he
r
to
this,
a
ny
m
ob
il
e
cod
e
i
n
an
a
pp
m
us
t
no
t
only
be
si
gn
e
d,
bu
t al
so
be a
m
ob
il
e co
de
that
h
as
al
read
y be
en
cat
egorized
.
A
ny uncate
go
rized code,
e
ve
n
thou
gh
po
te
nt
ia
ll
y
safe,
m
us
t n
ot
be use
d
[
5]
.
3.6.
SIM
-
car
ds
An
im
po
rta
nt
com
po
ne
nt
of
the
m
ob
il
e
phone
is
the
Subscri
ber
Identi
ficat
ion
M
odule
ca
r
d
(S
IM
-
car
d).
T
his
m
od
ule
is
a
m
ic
ro
com
pu
te
r
in
the
form
of
a
plasti
c
card
with
non
-
vol
at
il
e
m
e
m
or
y
and
it
s
own
m
ic
ro
pro
cesso
r,
w
hich
pro
vid
es
acce
s
s
to
inform
at
i
on
sto
r
e
d
in
the
m
e
m
or
y,
a
nd
sec
ur
it
y
functi
ons.
Thro
ugh
un
a
ut
horized
acce
s
s
to
a
SI
M
-
ca
r
d,
in
form
at
ion
about
a
pe
rs
on'
s
per
s
on
al
da
ta
can
be
ob
t
ai
ned
.
Tech
no
l
og
y
de
velo
per
s
a
re
try
ing
to
ove
r
com
e
var
iou
s
vu
l
ner
a
bili
ti
es.
To
ens
ur
e
t
he
secur
it
y
of
m
ob
il
e
bu
si
nes
s
ap
plica
ti
on
s,
a
m
od
el
of
a
secur
e
SI
M
card
,
na
m
ed
PK
-
S
IM
ca
rd
ha
s
been
dev
el
ope
d,
w
hich
i
s
a
sta
ndar
d
S
I
M
card
with
a
dd
it
io
nal
P
KI
functi
onal
it
y.
Dev
el
op
e
rs
pr
esent
a
sec
uri
ty
fr
am
ewo
r
k
offer
i
ng
so
luti
ons
f
or
t
he
de
velo
pm
ent
of
sec
ur
e
m
ob
il
e
bu
si
ness
a
ppli
cat
ion
s
us
i
ng
SMS
as
t
he
bear
e
r
[33]
.
St
and
a
r
d
№
03.
48
pr
ovides
e
nd
-
to
-
en
d
sec
ur
it
y
ser
vices
f
or
a
S
MS
m
essage
go
i
ng
to
or
c
om
ing
from
the
S
IM
card
[34]
.
Alt
hough
t
her
e
a
re
sta
ndar
ds
t
hat
ha
ve
so
m
e
dr
a
wbacks
,
for
exam
ple,
tho
se
de
velo
pe
d
by
the
Euro
pean
Tel
ecom
m
un
icati
on
s
Stan
dards
I
ns
ti
tute
(E
TSI)
wh
ic
h
only
addresses
the
m
ob
il
e
ind
us
t
ry
needs a
nd does
not co
ns
i
der
t
he
a
uth
e
ntica
ti
on and
sessio
n key
distri
bu
ti
on
for br
oa
der
s
olu
ti
ons.
In
R
us
sia
,
IPS
\
ID
S,
ap
plica
ti
on
fire
wall
s,
SI
EM
,
secu
rity
te
sti
ng
,
a
nti
D
DoS,
a
nti
-
f
r
aud
syst
em
s
hav
e
bee
n
pro
po
s
ed
f
or
t
he
protect
io
n
a
nd
c
on
t
ro
l
of
vulne
rab
il
it
ie
s.
H
owever,
rece
nt
st
ud
ie
s
ha
ve
s
ug
gested
that
IP
-
base
d
secur
it
y
te
chnolo
gies
are
no
longer
ef
fecti
ve,
a
nd
for
ne
w
so
l
utions
-
a
virtu
al
net
work,
so
ft
war
e
-
de
fin
ed
net
work,
ne
twork
data
nam
ing
,
resea
rc
h
is
require
d
becaus
e
they
are
sti
ll
at
the
init
ia
l
sta
ge.
[
35
]
I
n
add
it
io
n,
the
r
egu
la
to
ry
secu
rity
of
m
ob
il
e
phone
us
e
rs
in
Russia
is
rela
te
d
to
the
le
gislat
ive
requirem
ents
f
or
t
he
sal
e
of
only
ide
ntif
ie
d
SI
M
car
ds.
T
his
pract
ic
e
was
i
ntr
oduced
only
in
2016.
The
am
end
m
e
nts
to
t
he
Fe
de
ral
Law
"O
n
Com
m
un
ic
at
io
ns
"
[29]
to
proh
i
bit
the
distr
ibu
ti
on
of
SIM
-
car
ds
without
pr
ov
i
ding
real
s
ubscribe
r
data
t
o
m
ob
il
e
com
m
un
ic
at
ion
s
op
e
rato
rs,
es
ta
blished
t
hat
m
ob
il
e
com
m
un
ic
at
ion
s
ser
vices
ar
e
pr
ovi
ded
on
ly
to
tho
se
subscri
ber
s
who
hav
e
pro
vide
d
reli
able
inf
orm
ation
about
them
.
The
ve
rificat
ion
of
the
i
nfor
m
at
ion
ab
out
th
e
su
bsc
ribe
r
is
carried
out
by
est
ablishing
the
fu
ll
nam
e and
d
at
e o
f birth
by the p
r
ovisi
on
of
a
n i
den
ti
ty
d
ocum
ent; t
hr
ough
a sing
le
syst
em
o
f
ide
ntific
at
ion
a
nd
authe
ntica
ti
on
;
the
us
e
of
a
n
enh
a
nce
d
el
ect
ronic
sig
natu
re
;
throu
gh
a
si
ngle
portal
of
gove
r
nm
ent
serv
ic
es;
and
thr
ough
t
he
inf
or
m
at
ion
s
yst
e
m
s
of
sta
te
b
od
ie
s,
if
the
op
e
rato
r
has
c
onnecti
ons
t
o
s
uch
syst
em
s
th
rou
gh
a
sing
le
syst
em
of
inter
-
a
ge
ncy
el
ect
ro
nic
interact
ion.
Pr
i
or
to
the
a
dopt
ion
of
these
pr
ov
isi
on
s
,
SI
M
card
s
wer
e
so
l
d wit
hout a
contract
.
Mob
il
e
op
e
rat
or
s
are
ob
li
ge
d
to
stop
the
pro
vision
of
c
omm
un
ic
at
ion
serv
ic
es
withi
n
fifteen
days
upon
receipt
of
a
re
quest
f
r
om
a
bo
dy
that
ca
rr
ie
s
out
ope
rati
on
al
sea
rc
hes,
or
upon
r
ecei
pt
of
a
request
f
ro
m
Roskom
nad
zo
r
,
f
or
m
ed
on
th
e
basis
of
t
he
r
esults
of
ov
e
rsi
gh
t
m
easur
es,
if
the
act
ual
dat
a
ab
ou
t
the
u
se
rs
do
no
t
c
orrespo
nd
with
th
os
e
sta
te
d
in
the
su
bsc
ri
ber
a
gree
m
ents.
A
s
ub
s
cribe
r
w
ho
is
a
le
gal
entit
y
or
an
in
div
id
ual
entre
pr
e
neur,
wh
e
n
usi
ng
co
rpor
at
e
ta
rif
fs,
is
ob
li
ged
t
o
pro
vid
e
the
c
om
m
un
ic
at
ion
operat
or
inf
or
m
at
ion
ab
ou
t
eac
h
act
ua
l
us
er
of
t
he
c
orp
or
at
e
ta
rif
f.
The
c
on
se
nt
of
s
uc
h
us
e
rs
for
the
tra
nsfe
r
their
per
s
onal
data
to
the
operat
or
is
no
t
re
qu
ir
ed
.
Accor
ding
to
cl
ause
4.1.5.
GOST
R
5373
2
-
2009
"t
he
us
er
of
a
m
ob
il
e
phone
bec
om
es
the
owne
r
of
t
he
s
ub
s
cribe
r
num
ber
an
d
S
IM
-
c
ard,
th
rou
gh
w
hich
t
he
ide
ntif
ic
at
io
n
of
the
s
ubscri
ber
dev
ic
e,
it
s
acce
ss
to
the
operat
or
'
s
m
ob
il
e
network,
as
well
as
protect
ion
a
gainst
un
a
utho
rized
use
of t
he
s
ub
sc
riber n
um
ber
is
en
s
ur
e
d
"
.
4.
CONCL
US
I
O
N
This
pap
e
r
de
m
on
strat
es
the
pro
blem
s
of
sta
te
m
anag
em
e
nt
of
in
form
at
i
on
secu
rity
of
m
ob
il
e
ph
one
us
ers
in
R
us
sia
.
W
e
exam
ined
two
points
of
view
:
the
inf
or
m
at
ion
secu
rity
sta
nd
a
rd
s
in
Russia
an
d
t
he
le
gal
regulat
ion
s
.
P
ossi
ble
pract
ic
al
so
luti
ons
for
ens
ur
in
g
t
he
s
ecur
it
y
of
use
r
data,
bo
t
h
f
r
om
the
sta
te
and
by
t
he
m
ob
il
e
ph
one
us
e
r
him
self
wer
e
s
ugge
ste
d
.
S
uch
s
olu
ti
on
s
a
re
cha
nge
s
:
to
the
Russian
sta
ndar
ds
;
in
key
m
anag
em
ent
schem
e
and
the
con
t
ro
l
of
acce
ss
to
inf
orm
ati
on
st
or
e
d
on
phones
t
o
el
i
m
i
nate
pro
blem
s
cause
d
by
un
a
utho
rized
thir
d
-
par
ty
acce
ss
;
as
well
a
s
e
m
po
wer
i
ng
R
os
kom
nad
zo
r
with
the
authorit
y
to
con
t
rol
the
spread
of
inform
at
ion
te
chnolo
g
y
with
un
declar
ed
f
un
ct
i
on
al
i
ty
,
and
e
xp
a
nd
i
ng
t
he
sc
op
e
of
the
la
w
on
c
onsu
m
er
pr
otect
i
on.
The
stu
dy
of
this
pro
blem
of
ens
ur
i
ng
inf
or
m
at
ion
secur
it
y
is
carrie
d
ou
t
f
or
the f
ir
st t
i
m
e.
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N: 20
88
-
8708
Th
e
prote
ct
mo
bile user
data
in
R
us
si
a
(
An
na
Zhar
ova
)
3191
REFERE
NCE
S
[1]
E.
Os
born
,
and
A.
Sim
pson
,
"O
n
sm
al
l
-
sca
le
IT
users’
sy
stem
a
rch
itect
ur
es
and
c
y
b
er
sec
ur
ity
:
A
UK
ca
se
sudy
,"
Computers
&
Se
curit
y
,
v
o
l.
70
,
p
p.
27
–
50
,
2017
.
[2]
J.
Valc
k
e, "Be
st
pra
ctice
s
in
m
ob
il
e
sec
uri
t
y
,"
Bi
o
metric
Te
chnol
o
gy
Today
,
vol
.
3
,
pp.
9
-
11,
Mar.
2
016.
[3]
A.
Arm
ando,
e
t
al.,
"S
e
cur
ity
conside
ra
ti
ons
r
el
a
te
d
to
th
e
us
e
of
m
obile
de
vic
es
in
th
e
op
era
t
ion
of
cri
t
ical
infra
struc
ture
s
,"
Inte
rnational
jou
rnal
of crit
i
cal i
nfrastr
uct
ure
protection
,
vol
.
7
,
pp.
247
–
256
,
20
14.
[4]
R.
T
al
re
ja,
M.
Dili
p,
"U
ser
Pri
vacy
on
Androi
d
Plat
form
,"
JAN
27
-
28,
In
te
rn
ati
onal
confere
nce
on
nasce
n
t
te
chno
logi
es
in e
ngine
ering
(
ICN
TE
-
2017)
,
2017.
[5]
S.
D
y
e
and
K.
Scar
fone
,
"A
standa
rd
for
de
vel
oping
sec
ur
e
m
obil
e
appl
i
cations
,
"
Compute
r
Standards
&
Inte
rfac
es
, v
o
l.
3
6,
pp
.
524
–
530
,
2014.
[6]
Y.V.
Se
y
ed
,
e
t
al
.
,
"O
n
th
e
sec
uri
t
y
of
ce
rt
ai
n
e
-
comm
unic
a
ti
on
t
y
pes
:
Risks
,
user
awa
ren
ess
an
d
re
comm
enda
ti
on
s
,"
Journal
o
f
In
f
orm
ati
on
Sec
uri
t
y
and
Appl
i
catio
ns
,
vol. 18
,
no
.
4
,
pp
.
193
-
205
,
2
013.
[7]
M.T
urka
novi
ć,
et
al.
,
"Rec
on
ci
l
ing
user
priva
c
y
and
implic
it
au
the
ntica
ti
on
for
m
obil
e
devi
c
es
,"
Computers
&
Sec
urit
y
,
vol. 53
,
pp.
215
-
233,
20
15.
[8]
E.
Schiller,
et
al
.
,
"W
ire
le
ss
Public
Safe
t
y
Ne
tworks
,
"
in
ICN/DT
N
for
Publ
ic
Safe
t
y
in
Mobil
e
Net
works
,
v
o
l
.
1
1,
pp.
231
-
247
,
20
17.
[9]
C.
Vij
a
y
akumar
an
e
t
al
.
,
"A
rel
i
abl
e
next
ge
ner
ation
c
y
b
er
sec
urity
arc
h
ite
ct
ure
for
indust
ria
l
interne
t
of
thi
ngs
envi
ronm
ent
,"
In
te
rnatio
nal
Journal
o
f
El
e
ct
rica
l
and
Computer
Enginee
ring
(
IJE
CE
)
,
vol
.
10
,
no
.
1,
pp.
387
-
395
,
20
20.
[10]
Y.
Zhou
,
et
a
l.,
"
Ta
m
ing
Inform
a
ti
on
-
Stealing
Sm
art
phone
Appl
icati
ons
,"
in
Tr
ust an
d
Tr
ustwor
thy
Computing:
4th
Inte
rnational
Co
nfe
renc
e
,
TRUST
2011
,
2011
.
[11]
S.
Schustera
,
e
t
al.
,
"M
ass
s
urve
il
l
ance
and
te
chnol
ogi
cal
poli
c
y
opti
ons:
Im
proving
sec
urity
of
priv
ate
comm
unic
at
ions
,"
Computer
S
ta
ndards
&
Inte
rfa
ce
s
,
v
o
l.
50,
pp.
76
–
82,
2017
.
[12]
R.
W
ei
ss
,
et
al
.
,
"Trust
Eva
lu
at
i
on
in
Mobile
D
evi
c
es:
An
Empirical
Stud
y
,"
Tr
ustcom/B
igData
SE/
ISP
A,
IE
EE
,
2015.
[13]
The
guid
anc
e
d
ocument
,
"P
rotect
ion
ag
ai
nst
un
aut
hori
ze
d
a
cce
ss
to
informati
on
-
Part
1:
Info
rm
at
ion
sec
uri
t
y
software
-
Cla
ss
i
fic
a
ti
on
b
y
th
e
level
of
con
trol
o
f
the
abse
n
ce
of
u
ndec
l
are
d
opport
unit
ie
s
,"
Introduce
d
by
Or
der
o
f
the
S
tat
e
Tel
ec
o
mm
unic
ati
ons C
omm
ission of
the R
uss
ian
F
ede
ra
ti
on
,
v
o
l
.
114
,
1
999.
[14]
P.B.
Brand
tzae
g
,
e
t
a
l.,
"A
Mixe
d
-
Methods
Approac
h
to
Mobil
e
App
Privacy
,"
S
oci
al
Scienc
e
C
omputer
Revi
ew
,
v
o
l.
31
,
2018
.
[15]
Dec
ree
of
th
e
Pr
eside
nt
of
the
R
uss
ia
n
Feder
atio
n
of
09.
05
.
2017
No
203
,
"O
n
the
Strat
eg
y
for
th
e
Deve
lopment
of
the
Inform
ation
Socie
t
y
in
the
Russ
ia
n
Feder
at
ion
fo
r
2017
-
2030
,"
Coll
ec
t
i
on
of
Legisla
ti
o
n
of
th
e
Russian
Fe
derat
ion
,
n
o.
20,
A
rt
.
290
1
,
1
5.
05.
2017
.
[16]
Dec
ree
of
th
e
Governm
ent
of
th
e
Russ
ia
n
Feder
at
ion
of
June
30,
2004
No
320
"
On
appr
oval
of
t
he
Regul
a
ti
ons
on
the
Fed
era
l
Com
m
unic
at
ions Age
nc
y
,
"
Col
lecti
on
of
Legislat
ion
o
f the
Russian
F
ed
erati
on
,
no.
27,
Art.
2783
.
[17]
The
Feder
al
Law
of
07.
07.
200
3
N
126
-
FZ
,
"O
n
Comm
unic
a
ti
ons
,"
Coll
ec
t
io
n
of
Legislat
ion
of
the
Russian
Fe
derat
ion,
14.
0
7.
2003.
no.
28,
Art.
2895
,
Jul
20
04
.
[18]
P.
Shos
hin
,
"
W
h
y
is
it
dang
ero
us
to
use
sm
art
phones
(ta
bl
et
s)
with
Android
OS
for
remote
banki
ng
servi
ces
?
,
"
[Online
]
,
Avai
lable:
htt
p
:/
/www
.
banki
.
ru
/bl
og/k
a
m
o4/7400.
php
.
[19]
The
La
w
of
the
Russ
ia
n
Feder
at
i
on
"O
n
Stat
e
Secr
et
s
,
"
n
o.
5485
-
1,
1993.
Coll
e
ct
i
on
of
Legislat
io
n
of
the
Russian
Fe
derat
ion
,
n
o
.
41,
pp
.
8220
-
82
35
,
1997
.
[20]
H.F.
Ti
p
ton and M
.
Krause,
"
Info
rm
at
ion
Secur
ity Mana
gement
,
"
Handbook,
si
xt
h
ed
.
,
2007
.
[21]
R.
Solm
s,
"
Inform
at
ion
sec
uri
t
y
m
ana
gement
:
wh
y
standa
rds
a
re
important
,"
Computer
Sec
urity
,
vol.
7
,
no.
1,
pp.
50
–
57
,
1999
.
doi: 10.
1108
/09
685229910255223
.
[22]
Revi
ew
of
judi
cial
pra
c
ti
c
e
,
"In
c
ase
s
rel
ated
to
the
resolut
ion
of
dispute
s
on
the
prote
c
ti
on
o
f
intellect
u
al
prope
r
t
y
right
s
,"
Approve
d
b
y
th
e
Presid
iu
m
of
the Supreme
Court
of the
R
uss
ia
n
Feder
a
ti
o
n
on
Sep
.
23
,
20
15.
[23]
Gl
y
n
Mood
y
,
"
Should
Software
Deve
l
o
per
s
B
e
Li
able
for
th
ei
r
Code
?
,
"
Linux
J
ournal
,
2009.
[
Online
]
,
Avai
la
b
le
:
htt
ps://
ww
w.goo
gle
.
ru
/url?
sa
=t&
rct
=
j&
q=
&e
src
=
s&source
=we
b&
cd=
3&v
ed=
0ah
UK
Ewjm4Y
Lg
m
bDTAhX
iA5o
K
HRoN
C3YQFgg
y
MA
I&url
=h
tt
p
%3A%2F
%2Fwww.l
inuxj
ourna
l
.
com%2F
cont
ent%2F
should
-
software
-
d
eve
lop
ers
-
be
-
liable
-
the
ir
-
code&usg=AF
QjCN
GM
sLb9SM
kr
G
QH
YCvem
veZ
4nYB9K
w
[24]
"
Eva
luation
and
fit
ness
check
(FC)
roa
dm
ap,
"
Eur
opean
Comm
ision
,
[Online
]
,
Ava
il
able:
h
tt
p:
//
e
c.e
uropa
.
eu
/sm
art
-
reg
ulation/
ro
ad
m
aps/doc
s/2016_grow_027_eva
l
uat
ion_d
efe
c
ti
v
e
_produc
ts_en.
pd
f
.
[25]
The
officia
l
website
of
the
Eu
rasia
n
Ec
onom
i
c
Union.
Dec
is
ion
of
the
Cou
nci
l
of
th
e
Eur
asia
n
Ec
onom
i
c
Com
m
is
sion
"O
n
Approval
of
the
Gene
r
al
R
e
quire
m
ent
s
for
the
Safe
t
y
and
Eff
iciency
o
f
Medic
a
l
Produc
ts,
Requi
rement
s
f
or
the
ir
Marki
ng
and
Opera
t
iona
l
Docum
en
ta
ti
on
for
th
e
m
,"
(2016)
[O
nli
ne]
Avail
able:
htt
p://ww
w.e
ae
u
nion.
org/
,
17
.
05.
2016.
[26]
Dec
la
r
at
ion
of
Secur
ity
"TRUS
T
,"
Secur
ity
for
Inform
at
ion,
[
Online
]
,
Available
:
htt
p://ww
w.t
rust
.
ru/upl
o
ad/
docu
m
ent
s/about
/do
c
s/secur
ity
/s
ec
uri
t
y
_de
clara
t
ion.
pd
f
.
[27]
ISO
/IE
C
19770
-
2:2009
Inform
ation
technolog
y
-
Software
asset
m
ana
gement
-
Part
2:
Softwar
e
i
dent
ifica
ti
on
t
ag
(IDT)
GO
ST
R
ISO
/IE
C
1977
0
-
2
-
2014
appr
oved
and
put
into
eff
ec
t
b
y
the
Order
of
the
Feder
al
Agenc
y
f
or
Te
chn
ic
a
l
R
egulati
on
and
Metrolog
y
of
Novem
be
r
19
,
no.
1684
-
st
,
2014
.
[28]
"
The
Feder
al
L
a
w
o
f
On
th
e
pro
te
c
ti
on
of
consum
er
right
s,"
Col
le
c
ti
on
of
Leg
isl
ati
on
of
the
Russian
Fe
derat
ion
,
vol
.
3
,
Art
.
140
,
1996.
[29]
The
Feder
al
Law
,
"O
n
Comm
unic
a
ti
ons
,
"
Coll
e
ct
ion
of
Legi
slati
on
of
the
Russian
Fe
dera
ti
on
,
v
o
l
.
4383
,
Art.
2066
,
2016
.
[30]
Acc
eptanc
e
o
f
th
e
"Y
aro
vo
y
-
Oze
rov
pac
k
age
,
"
ht
t
ps://
gee
k
ti
m
es.
r
u/post/
278532/
.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
10
, No
.
3
,
J
une
2020
:
31
84
-
319
2
3192
[31]
P.
Shasi
,
et
al.
,
"
Mobile
cl
oud
se
cur
ity
:
An a
dver
sar
y
m
odel
for
lightweight
brows
er
sec
urity
,"
Computer
Standards
&
I
nte
rface
s
,
v
o
l.
49
,
pp
.
71
–
78
,
2016
[32]
M.
Aldwairi
an
d
L.
Ta
wa
lbe
h,
"S
ec
urity
tech
nique
s
for
int
ellige
nt
spam
sensing
and
anomal
y
d
etec
t
ion
in
onli
ne
soc
ia
l
p
latform
s
,"
Inte
rnational
Journal
o
f
Elec
tri
cal
and
Computer
Enginee
ring
(
IJE
CE)
,
vol
.
10
,
no
.
1,
pp.
275
-
287
,
20
20.
[33]
R.
He,
et
al.,
"A
P
K
-
SIM
ca
rd
b
ase
d
end
-
to
-
end
sec
urity
fra
m
ew
ork
for
S
MS
,"
C
omputer
Standards
&
Inte
rface
s
v
o
l.
31
,
pp
.
629
–
641,
2009
.
[34]
M.
Badra
and
P
.
Urien
,
"S
SL
in
te
gra
ti
on
in
SIM
Sm
art
Cards
,"
IEE
E
Wire
le
ss
Comm
unic
ati
ons
and
Net
work
in
g
Confe
renc
e, I
EEEWCNC,
At
lan
t
a,
GA
,
USA
,
200
4.
[35]
M.
Vid
y
a,
C
.
M
.
Pati
l
,
"Revi
ewi
ng
eff
ectivit
y
in
sec
urity
appr
oa
che
s
towar
ds
str
engt
hen
ing
inter
net
ar
chi
t
ecture
,"
Inte
rnational
Jo
urnal
of El
e
ct
r
i
c
al
and
Comput
er
Engi
n
ee
ring
(
IJE
CE)
,
vol
.
9
,
no
.
5,
pp.
3862
-
387
1,
2019
.
BIOGR
AP
H
Y
O
F
AU
TH
OR
An
na
Z
h
arova
was
born
in
Ta
shkent
20/09/
1
972.
On
1989
–
1994,
she
was
in
the
Facult
y
o
f
Autom
at
ed
Con
trol
S
y
st
ems
:
Software
and
au
tomati
on
s
y
s
tem
s
of
Ta
shkent
State
T
ec
hni
c
al
Univer
sit
y
n
amed
after
A.R
.
Be
r
uni.
Also
on
20
01
–
2002,
she
s
tudi
ed
in
the
Ins
t
it
ut
e
of
State
an
d
La
w
of
the
Russ
ia
n
Aca
dem
y
o
f
Scie
nce
s,
Mos
cow,
and
on
the
y
ea
r
of
2013
-
2
015,
she
took
La
w
fac
ul
t
y
of
Ac
a
demic
Int
ern
ati
onal
Insti
tute,
Quali
fi
ca
t
ion:
Master
of
La
w.
Mos
cow.
She
got
Aca
demic
d
egr
e
e
of
Cand
ida
t
e
o
f
Scie
nc
es
and
Aca
demic
t
itle
o
f
Doce
nt
.
For
th
e
pre
sen
t
positi
o
n,
she
bec
om
es
a
Dire
ct
or
of
C
y
b
erspa
ce
Rese
arch
Cent
e
r
of
Na
t
iona
l
R
ese
ar
ch
Univer
sit
y
High
er
School
of
Ec
onom
ic
s
(since
Ju
ne
2017).
In
the
working
fie
ld
,
she
te
ac
hs
in
the
Fa
cul
t
y
of
Business
an
d
Mana
geme
nt/
School
o
f
Business
Inform
a
ti
cs/De
p
art
m
ent
of
Innova
ti
on
and
Business
in
Inform
at
ion
Tec
hnolog
y
,
Higher
School
of
Ec
o
nom
ic
s.
Courses:
Inform
at
ion
l
a
w;
Le
ga
l
basis
of
high
-
tech
busine
ss
;
Inte
ll
e
ct
ua
l
ri
ght
(2007
-
to
the
pre
sent).
She
E
xper
ts
of
expe
rt
advi
sor
y
group
a
t
the
Nati
on
al
An
ti
-
T
err
orism
Com
m
it
te
e
"O
n
the
le
ga
l
reg
ul
at
io
n
of
the
restr
ict
ion
of
the
use
of
cr
y
p
togra
ph
ic
to
ols
and
anon
y
m
i
za
t
ion
tool
s
for
te
rrori
st
purposes
in
the
Inte
rne
t
.
"
She
get
s
15
y
e
ars
of
le
g
al c
onsult
i
ng
expe
r
ie
n
ce i
n
the a
r
ea of
l
egal
a
spec
ts of
computing;
cop
y
righ
t and
IT
.
Evaluation Warning : The document was created with Spire.PDF for Python.