<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">bricslawjournal</journal-id><journal-title-group><journal-title xml:lang="en">BRICS Law Journal</journal-title><trans-title-group xml:lang="ru"><trans-title>Юридический журнал БРИКС</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">2409-9058</issn><issn pub-type="epub">2412-2343</issn><publisher><publisher-name>Publishing House V.Ема</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.21684/2412-2343-2023-10-4-35-52</article-id><article-id custom-type="elpub" pub-id-type="custom">bricslawjournal-914</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>ARTICLE</subject></subj-group></article-categories><title-group><article-title>Countering Cyberattacks on the Energy Sector in the Russian Federation and the USA</article-title><trans-title-group xml:lang="ru"><trans-title></trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="western" xml:lang="en"><surname>Shestak</surname><given-names>V.</given-names></name></name-alternatives><bio xml:lang="en"><p>Victor Shestak – Professor, Department of Criminal Procedure</p><p>12 Vrubelya St., Moscow, 125080 </p></bio><email xlink:type="simple">viktor_shestak@mail.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="western" xml:lang="en"><surname>Tsyplakova</surname><given-names>A.</given-names></name></name-alternatives><bio xml:lang="en"><p>Alyona Tsyplakova – Lecturer, Department of Criminal Law, Criminal Procedure and Criminology</p><p>76 Vernadskogo Ave., Moscow, 119454 </p></bio><email xlink:type="simple">tsyplakova.a.d@my.mgimo.ru</email><xref ref-type="aff" rid="aff-2"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="en">Moscow Academy of the Investigative Committee of the Russian Federation<country>Russian Federation</country></aff></aff-alternatives><aff-alternatives id="aff-2"><aff xml:lang="en">MGIMO University<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2023</year></pub-date><pub-date pub-type="epub"><day>06</day><month>12</month><year>2023</year></pub-date><volume>10</volume><issue>4</issue><fpage>35</fpage><lpage>52</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Shestak V., Tsyplakova A., 2023</copyright-statement><copyright-year>2023</copyright-year><copyright-holder xml:lang="ru">Shestak V., Tsyplakova A.</copyright-holder><copyright-holder xml:lang="en">Shestak V., Tsyplakova A.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://www.bricslawjournal.com/jour/article/view/914">https://www.bricslawjournal.com/jour/article/view/914</self-uri><abstract><p>The USA leads the way in the Global Cybersecurity Index, in particular 1st place in 2015, 2020 and 2nd in 2017, 2018. Researchers are interested in examining their prevention of cyberattacks as one of the main cybersecurity threats, since Russia takes only 5th place since 2020. Provided the authors underline neglecting the principle of organized response to crime, the paper examines the pros and cons of countering cyberattacks in the U.S. energy sector and compares it with the Russian Federation. The researchers have found the American strategy is based on standardization and various platforms on the grounds of so-called security in depth, while Russian approach is wider, but demands for more details and miscellaneous mechanisms to share experience. Comparing the cybersecurity plans and strategies for U.S. energy facilities, the authors note that the U.S. specialists neglect physical safety in comparison to Russia. The diversity of bodies with vague powers is a con of the American system that the Russian Federation is trying to avoid, but the interaction between government and private representatives is stronger in the United States of America.</p></abstract><kwd-group xml:lang="en"><kwd>USA</kwd><kwd>Russian Federation</kwd><kwd>cyberattacks</kwd><kwd>preventive measures</kwd><kwd>energy sector</kwd><kwd>response</kwd></kwd-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Ballou T.M. et al. U.S. Energy Sector Cybersecurity: Hands-Off Approach or Effective Partnership?, 15(1) Journal of Information Warfare 44 (2016).</mixed-citation><mixed-citation xml:lang="en">Ballou T.M. et al. U.S. Energy Sector Cybersecurity: Hands-Off Approach or Effective Partnership?, 15(1) Journal of Information Warfare 44 (2016).</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Carr M. Public-Private Partnerships in National Cyber-Security Strategies, 92(1) International Affairs 43 (2016). https://doi.org/10.1111/1468-2346.12504</mixed-citation><mixed-citation xml:lang="en">Carr M. Public-Private Partnerships in National Cyber-Security Strategies, 92(1) International Affairs 43 (2016). https://doi.org/10.1111/1468-2346.12504</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Denileon G.P. The Who, What, Why, and How of Counter Terrorism Issues, 93(5) American Water Works Association Journal 78 (2001). https://doi.org/10.1002/j.1551-8833.2001.tb09208.x</mixed-citation><mixed-citation xml:lang="en">Denileon G.P. The Who, What, Why, and How of Counter Terrorism Issues, 93(5) American Water Works Association Journal 78 (2001). https://doi.org/10.1002/j.1551-8833.2001.tb09208.x</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Krause T. et al. Cybersecurity in Power Grids: Challenges and Opportunities, 21(18) Sensors 6225 (2021). https://doi.org/10.3390/s21186225</mixed-citation><mixed-citation xml:lang="en">Krause T. et al. Cybersecurity in Power Grids: Challenges and Opportunities, 21(18) Sensors 6225 (2021). https://doi.org/10.3390/s21186225</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Mukherjee S. Implementing Cybersecurity in the Energy Sector (2019). https://doi.org/10.6084/m9.figshare.9728051</mixed-citation><mixed-citation xml:lang="en">Mukherjee S. Implementing Cybersecurity in the Energy Sector (2019). https://doi.org/10.6084/m9.figshare.9728051</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Powell B.A. &amp; Chipman J.C. Getting the Deal Through: Cybersecurity 2021 (2021).</mixed-citation><mixed-citation xml:lang="en">Powell B.A. &amp; Chipman J.C. Getting the Deal Through: Cybersecurity 2021 (2021).</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Sklavidis I. et al. Enhancing SIEM Technology for Protecting Electrical Power and Energy Sector, in 2021 IEEE International Conference on Cyber Security and Resilience (CSR) (2021). https://doi.org/10.1109/CSR51186.2021.9527944</mixed-citation><mixed-citation xml:lang="en">Sklavidis I. et al. Enhancing SIEM Technology for Protecting Electrical Power and Energy Sector, in 2021 IEEE International Conference on Cyber Security and Resilience (CSR) (2021). https://doi.org/10.1109/CSR51186.2021.9527944</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Белоус А.И. Кибербезопасность объектов топливно-энергетического комплекса. Концепции, методы и средства обеспечения: практическое пособие [Belous A.I. Cybersecurity of Fuel and Energy Complex Facilities. Concepts, Methods and Tools for Ensuring] (2020).</mixed-citation><mixed-citation xml:lang="en">Белоус А.И. Кибербезопасность объектов топливно-энергетического комплекса. Концепции, методы и средства обеспечения: практическое пособие [Belous A.I. Cybersecurity of Fuel and Energy Complex Facilities. Concepts, Methods and Tools for Ensuring] (2020).</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
