Research of the Training Ground for the Protection of Critical Information Resources by iRisk Method

Author(s):  
L. Galata ◽  
B. Korniyenko
Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


2019 ◽  
Vol 43 (3) ◽  
Author(s):  
Лілія Павлівна Галата ◽  
Богдан Ярославович Корнієнко ◽  
Владислав Валерійович Заболотний

2021 ◽  
pp. 114-122
Author(s):  
S. GRIBOIEDOV

The main principles of state strategic planning in the sphere of cybersecurity are considered. The directions of improvement of public administration in the field of cyber protection of a critical information infrastructure and state information resources are identified. The shortcomings of the Cyber Security Strategy of Ukraine in 2016 are analyzed and summarized. The draft of Cyber Security Strategy of Ukraine for 2021 – 2025 is considered and directions for its improvement are proposed. The prospects of strategic state planning in the sphere of cybersecurity in the context of the spread of hybrid threats are outlined.


2020 ◽  
Vol 38 (38) ◽  
pp. 57-65
Author(s):  
Yurii Kohut

The article deals with protective measures against cyberattacks of information systems of the critical infrastructures and highlights some features of the cyberattacks against the information resources of national authorities. The main objective of the article is to define the characteristics of cyberattacks and the elements of a plan to counter cyberattacks of the critical information facilities. It has been found that a professionally organized cyberattack consists of several phases related to targeting, intelligence, access to the system, direct execution of the attack, and destruction of evidence of unauthorized interference. The results show that to protect the critical infrastructure facilities from cyberattacks, developed and implemented national cybersecurity standards must be developed in Ukraine, in particular for automated control systems of critical infrastructure facilities.


2021 ◽  
Vol 28 (1) ◽  
pp. 84-94
Author(s):  
Sergey V. Skryl' ◽  
Victor V. Gaifulin ◽  
Dmitry V. Domrachev ◽  
Vladimir M. Sychev ◽  
Yulia V. Gracheva

2020 ◽  
Vol 1 (7) ◽  
pp. 41-46
Author(s):  
S. G. Puzinovskaya ◽  
O. A. Schesnovich

The article substantiates the advantages of using educational traveling when studying the unit "Internet Information Resources" at the lessons of "Informatics" in the 9th grade. The authors analyzes the approaches that are the basis for teaching students to informatics: systemic, activitybased and competence-based. Special attention is paid to the formation of metasubject competencies, which include the ability to use the mastered intersubject concepts and universal educational actions in educational activities, the independence of planning and implementing educational activities based on personal priorities, and the organization of educational cooperation with students and teachers. These competencies will be needed by students both in everyday life and in their future profession. Tasks for small groups of students and a range of questions for their solution are given, criteria for the success of assignments are developed, examples of the results of the work of groups are given.


Sign in / Sign up

Export Citation Format

Share Document