scholarly journals The possibilities of a crisis modeling in the cyberspace of the system security

2019 ◽  
Vol 292 ◽  
pp. 01056
Author(s):  
Jiří Dvořák ◽  
Jiří Konečný ◽  
Marek Tomaštík

The paper briefly presents some possibilities of the modern use of cyberspace tools for the theory of artificial intelligence related to the definition of the model and the corresponding possibilities leading to systemic modeling of crises in the modern information and knowledge world and in the area of system security. The modeling process is mainly focused on the specific concept of the virtual model and on the network represented by information and communication systems (ICT) and on the corresponding perspective modeling of the system-based environment used to simulate cyber-attacks and the corresponding levels of cyber-defence. It forms the actual content of the newly conceived modeling with the process of model adaptation in the modern learning environment of artificial intelligence. The paper is based on a scientific task dealing with the possibilities of modeling and adaptation of cybersecurity in a new projected cybersecurity laboratory with the environment of artificial intelligence application in this virtual environment of modern security.

2020 ◽  
Vol 72 (4) ◽  
pp. 162-167
Author(s):  
S.A. Аdiljanova ◽  
◽  
G.A. Тulepberdinova ◽  
M.J. Sakypbekova ◽  
N.A. Тekesbayeva ◽  
...  

The article discusses the possibility of modifying the genetic algorithm (GA) to solve the problems of selection, optimization and management of the dynamic configuration of information security means for the security chain of information and communication systems (ICS). The scientific novelty of the work lies in the fact that GA recommends using the total cost of information loss risks, as well as cost indicators for each class of information security systems as a criterion for optimizing the composition of the information security system. The genetic algorithm is considered as a kind of problem associated with multiple choice when optimizing the choice of information content of information security and solving problems of dynamic management of cybersecurity resources. In this concept, the optimization of the placement of the information security system along the security chain is considered as a modification of the combined backpack problem. The proposed approach allows not only to quickly calculate various versions of software and hardware information systems and their combinations for ICS, but also to dynamically manage the proposed algorithm with existing models and algorithms to optimize the composition of ICS cybersecurity chains and cybersecurity resources of various information objects. It is possible that such a combination of models and algorithms will quickly restore ICS protection by configuring profiles in accordance with the classes of new threats and cyber attacks.


2021 ◽  
Vol 16 (6) ◽  
pp. 21-30
Author(s):  
A. V. Kornev

The paper examines activity as the most important component of human life. The author elucidates the features of activity from the standpoint of various fields of knowledge: philosophy, psychology, sociology. The preference is given to the activity approach, which is based on the category of “substantive activity.” It is substantive in nature and does not simply define the activity as human interaction with the outside world, but reflects the changes that constitute the result of human activity. Various aspects of theoretical and practical activity are touched upon on the example of legal activity, which is of a complex intellectual nature. Legal activity is often characterized through legal practice — one of the varieties of social practices. Some similarities of these categories are reflected, as well as differences between them. The paper gives the author’s definition of legal activity focused on professional legal activity. The definition cannot claim to be universal due to various types of professional legal activity. Nevertheless, it is specified that professional legal activity is always an activity carried out on the basis of law, in legal forms; it is aimed at achieving the goals determined by law. The author demonstrates the impact of digital technologies on various types of legal activities. Especially in the conditions of the pandemic when traditional forms of communication have given way to virtual ones. It is noted that this influence is of a dual nature, that is, on the one hand, it increases the efficiency of communications, and, on the other hand, it leads to some risks and problems, in particular, against the background of the fact that a significant part of our population still does not have access to modern information and communication systems.


2011 ◽  
Vol 1 (3) ◽  
Author(s):  
Nicolas Guelfi

AbstractThe goal of this article is to provide a rigorous conceptual framework for defining the concepts of dependability and resilience. Since the seventies, the terms dependability and resilience have been used in nearly all the scientific and technological fields related to Information and Communication systems. The introduction and use of these concepts in all these fields makes it difficult to have a common and precise definition. Having such a definition is nevertheless mandatory for the software and systems engineering research community that create development processes, languages and tools to support the engineering of products that would be required to be dependable or resilient. For this, we introduce an abstract and generic terminology defined mathematically to be used when speaking about dependability and resiliency. We also provide some abstract semantic descriptions to these terminological elements. This formal framework is defined from a software engineering perspective, which means that we define its components such that they are useful for the development or improvement of analysis, architectural design, detailed design, implementation, verification and maintenance phases. To this aim, we provide the necessary elements in accordance with a model driven engineering perspective that enable the definition of a new modelling language for dependable and resilient systems.


2021 ◽  
Vol 17 (3) ◽  
pp. 3-13
Author(s):  
Antonina Yerina ◽  
Ihor Honchar ◽  
Svitlana Zaiets

Introduction. The scale and destructive consequences of the unlawful impact on cyberspace is a key problem of modern geopolitics, and cyber reliability is recognized as one of the most important security priorities by the subjects of international relations.Problem Statement. Monitoring of cyber incidents and anomalies in information and communication systems and prompt response to risks determined by cyber threats require the development of a system of indicators and criteria for cybersecurity assessment.Purpose. Summarize the international experience of assessing the cybersecurity, to position countries by their level of development in the global space, to identify strengths and weaknesses in cybersecurity management, and to ensure effective protection of cyberspace at the national level.Materials and Methods. Used the component indices of the international rankings characterizing the potential of the digital economy (ICT IDI, NRI, EGDI) and the participation of countries in the field of cybersecurity(GCI and NCSI).Results. It has been argued that cybersecurity ratings play the role of a kind of identifier of the relative advantages and vulnerabilities of the national cyber strategies, and indicate the need for their review in order tostrengthen protection against cyber-attacks and improve the cyber risk management system. In countries with a high level of economic development, which is largely based on the contribution of IT technologies to the national production, the cybersecurity potential is significantly higher, regardless of geolocation. The discovered correlation between GCI, information society development indices (IDI, NRI, EGDI) and GDPper capita confirms that the digital transformation of the economy and society acts as a key driver of economicdevelopment if the information- and cyber-security are assured only. The best practices are highlighted, andcritically weak segments of the national cybersecurity are identified.Conclusions. Using the NCSI indicators, the preparedness of Georgia and Ukraine to prevent the implementation of fundamental cyber threats and to manage cyber incidents and large-scale cyber crises is assessed.


Author(s):  
A. V. Sokolov ◽  
O. N. Zhdanov

In recent decades, perfect algebraic constructions are successfully being use to signal systems synthesis, to construct block and stream cryptographic algorithms, to create pseudo-random sequence generators as well as in many other fields of science and technology. Among perfect algebraic constructions a significant place is occupied by bent-sequences and the class of perfect binary arrays associated with them. Bent-sequences are used for development of modern cryptographic primitives, as well as for constructing constant amplitude codes (C-codes) used in code division multiple access technology. In turn, perfect binary arrays are used for constructing correction codes, systems of biphase phase- shifted signals and multi-level cryptographic systems. The development of methods of many-valued logic in modern information and communication systems has attracted the attention of researchers to the improvement of methods for synthesizing many-valued bent-sequences for cryptography and information transmission tasks. The new results obtained in the field of the synthesis of ternary bent-sequences, make actual the problem of researching the class of perfect ternary arrays. In this paper we consider the problem of extending the definition of perfect binary arrays to three-valued logic case, as a result of which the definition of a perfect ternary array was introduced on the basis of the determination of the unbalance of the ternary function. A complete class of perfect ternary arrays of the third order is obtained by a regular method, bypassing the search. Thus, it is established that the class of perfect ternary arrays is a union of four subclasses, in each of which the corresponding methods of reproduction are determined. The paper establishes the relationship between the class of ternary bent-sequences and the class of perfect ternary arrays. The obtained results are the basis for the introduction of perfect ternary arrays into modern cryptographic and telecommunication algorithms.


2021 ◽  
Vol 27 (2) ◽  
pp. 132-138
Author(s):  
V. Ya. Dmitriev ◽  
T. A. Ignat'eva ◽  
V. P. Pilyavskiy

Aim. To analyze the concept of “artificial intelligence”, to justify the effectiveness of using artificial intelligence technologies.Tasks. To study the conceptual apparatus; to propose and justify the author’s definition of the “artificial intelligence” concept; to describe the technology of speech recognition using artificial intelligence.Methodology. The authors used such general scientific methods of cognition as comparison, deduction and induction, analysis, generalization and systematization.Results. Based on a comparative analysis of the existing conceptual apparatus, it is concluded that there is no single concept of “artificial intelligence”. Each author puts his own vision into it. In this regard, the author’s definition of the “artificial intelligence” concept is formulated. It is determined that an important area of applying artificial intelligence technologies in various fields of activity is speech recognition technology. It is shown that the first commercially successful speech recognition prototypes appeared already by the 1990s, and since the beginning of the 21st century. The great interest in “end-to-end” automatic speech recognition has become obvious. While traditional phonetic approaches have requested pronunciation, acoustic, and language model data, end-to-end models simultaneously consider all components of speech recognition, thereby facilitating the stages of self-learning and development. It is established that a significant increase in the” mental “ capabilities of computer technology and the development of new algorithms have led to new achievements in this direction. These advances are driven by the growing demand for speech recognition.Conclusions. According to the authors, artificial intelligence is a complex of computer programs that duplicate the functions of the human brain, opening up the possibility of informal learning based on big data processing, allowing to solve the problems of pattern recognition (text, image, speech) and the formation of management decisions. Currently, the active development of information and communication technologies and artificial intelligence concepts has led to a wide practical application of intelligent technologies, especially in control systems. The impact of these systems can be found in the work of mobile phones and expert systems, in forecasting and other areas. Among the obstacles to the development of this technology is the lack of accuracy in speech and voice recognition systems in the conditions of sound interference, which is always present in the external environment. However, the recent advances overcome this disadvantage.


Author(s):  
Stephan Zelewski ◽  
Adina Silvia Bruns ◽  
Martin Kowalski

For e-business, the computer-based processing of value-creation, especially for knowledge-intensive business processes, plays a prominent role with the help of modern information and communication techniques. At least since the further development of the classical Internet for the Semantic Web, the content-based knowledge processing and knowledge transfer have gained more importance. In this chapter it is shown that ontologies represent an auspicious instrument to ensure the interoperability of information and communication systems that have to work together on the work-sharing development of knowledge-intensive business processes. Ontologies become important when agents with heterogeneous knowledge backgrounds co-operate on such business processes. Firstly, the complex and often ill-considered use of the definition of ontology will be discussed critically and its meaning specified. Thereupon it will be shown (with the help of two application areas) how ontologies can be used effectively to support knowledge-intensive business processes in e-business. On the one hand, the chapter is concerned with the management of knowledge of competences, which agents have to have a command of for successful process execution. On the other hand, it is about the management of know-how, which has already been collected from completed projects and should be reused in new projects.


2020 ◽  
Vol 2 (10) ◽  
pp. 113-122
Author(s):  
Valeriy Lakhno ◽  
Andriy Blozva ◽  
Maksym Misiura ◽  
Dmytrо Kasatkin ◽  
Borys Gusev

The article proposes a model for estimating the quantitative indicator of current risks of threats and cyber attacks on transport information and communication systems (TICS). The model differs from the existing one in taking into account the degree of impact of each threat or cyber attack within the class on the probability of an accident that occurs during cyberattacks on components of transport information and communication systems, which in many cases can be attributed to critical computer systems. It is shown that the current risks may be insignificant if all potentially dangerous parameters of transport information and communication systems are maintained within the established limits, or increase, becoming threatening, when such parameters deviate from the norm. The necessity to describe the degree of current danger of risks of threats and cyberattacks with the help of some quantitative indicator is substantiated. The value of this indicator may depend on the deviations of the parameters related to the cyber security of information and communication systems of transport. An appropriate calculation formula is proposed to determine the current risk of the threat to information and communication systems of transport. To test the proposed model, a simulation experiment was conducted, the results of which are also presented in the article. Simulation modeling was also performed to verify the adequacy of the proposed model and the algorithm for estimating the current risk indicator for components of transport information and communication systems. It is taken into account that many components of transport information and communication systems work in real time. It is shown that the proposed model takes into account the current values of information security metrics and new classes of cyber threats for transport information and communication systems.


2020 ◽  
Vol 23 (1-2) ◽  
pp. 40-48
Author(s):  
Sergey Dovgal ◽  
Oksana Buturlina

The article analyzes the main socio-philosophical problems of the transformation of modern global media in the development of information and communication technologies, which involves the active emergence of new generation communication channels. The main factors substantiating the process of intensive structural and functional transformation of the entire media system are disclosed. Various approaches to the definition of the concept of "media space" are analyzed. The main features of modern media space as such and media space in its connection with social space are determined. It is proved that the development and transformation of media is carried out under the influence of new technological trends, which determine the main vector of development of society as a whole. Analyzing the main technological trends of the near future, a forecast is provided on how the media space and society are being transformed, in particular, attention is focused on the emergence of cyberspace with elements of virtual and augmented reality, as well as artificial intelligence as new interactive types of media.Particular attention in this publication is given to the problem of the creation and functioning of artificial intelligence. It is considered that the problem of artificial intelligence in modern science has embraced a wide range of studies. Modern philosophical reflections on artificial intelligence represent a wide problem field that is constantly changing and refined, and in the context of artificial intelligence, not only problems such as the prospects of self-organizing computer systems are studied, but also the ethical aspects of the application of artificial intelligence technologies. It is noted that an understanding of the concept of artificial intelligence does not exist today, and therefore further reflections on it can not only specify these areas of research, but also radically change the currently prevailing idea of the possibility and potential of artificial intelligence.


Sign in / Sign up

Export Citation Format

Share Document