scholarly journals Conceptual model of the empirical data multidimensional presentation on the state of forming critical information infrastructure

Author(s):  
A V Kalach ◽  
K O Burkova ◽  
T N Kulikova ◽  
E O Buharov ◽  
A N Scherbin
Author(s):  
Олександр Григорович Корченко ◽  
Юрій Олександрович Дрейс ◽  
Ольга Олександрівна Романенко ◽  
Володимир Вячеславович Бичков

Author(s):  
Sergiy O. Gnatyuk ◽  
Vitaliy V. Kishchenko ◽  
Vitaliy V. Kotelianets ◽  
Madina Bauyrzhan

Information and communication technologies implementation in most areas of human life is aimed at improving the efficiency of business processes, but the emergence of new vulnerabilities and cyberthreats generates cybersecurity incidents. To localize and neutralize incidents effective management techniques are necessary. These processes are very actual for critical information infrastructure of the state, because destructive influences on objects of critical information infrastructure can cause big losses for the state (human life, material and status losses). Known methods for incidents management are not oriented on some special components and parameters of the cyberspace. It complicates implementation of these methods in real information and communication systems. From this viewpoint, in this paper the concept of network-centric incident management was developed. It allows to identify the most important (real) objects of critical information infrastructure protection and cybersecurity incidents to predict the categories that arise as a result of specific cyberattacks and their risk level. Further research study consists in instrumental tools based on mentioned concept. These tools can be useful for incidents prediction (character and level of losses) in information and communication systems of state critical infrastructure objects.


Author(s):  
Sergiy Gnatyuk ◽  
Zhengbing Hu ◽  
Viktoriia Sydorenko ◽  
Marek Aleksander ◽  
Yuliia Polishchuk ◽  
...  

This chapter is devoted to developing formalization methods for identification and security objects of critical information infrastructure (CII) in civil aviation. The analysis of modern approaches to the CII identification was carried out that gave a possibility to determine weaknesses and to formalize a scientific researches task. As a result, the unified data model was developed for formalizing the process of a list of CII objects forming in certain field and at the state level. Moreover, the specialized technique was developed. Besides, the identification method was proposed, and it gives a possibility to determine elements of CII field, mutual influences, and influence on functional operations of critical aviation information system. Furthermore, special software was developed and implemented that can be useful for CII elements identification and also for determining its influences on functional operations. Also, the basic aspects of cybersecurity ensuring for identified critical aviation information system were described in this chapter.


2021 ◽  
pp. 58-67
Author(s):  
Aleksey Kubarev ◽  
◽  
Aleksey Lapsar’ ◽  
Sergey Nazaryan ◽  
◽  
...  

The purpose of the study: development of a method for obtaining parameterized values of local characteristics of a diffusion Markov process. It is used to simulate the state of a critical information infrastructure object under off-normal operating conditions caused by a destructive information impact. Methods: synthesis of local characteristics of evolutionary equations which describe the state of a critical information infrastructure object, using the Markov theory for estimating multidimensional diffusion processes as well as the apparatus for studying moment functions. Results: the problems of parametric modeling of the state of critical information infrastructure objects are analyzed on the basis of diffusion Markov processes in the process of synthesis of evolutionary equations which describe the behavior of such objects. The study reveals features of the functioning of objects, which implement the management of complex technical systems in the conditions of normal operation as well as off-normal operation, caused by destructive information impact. A method has been developed for the synthesis of local characteristics of the diffusion process, which simulates the behavior of critical information infrastructure objects during off-normal operation. An example of the formation of a domain for determining the characteristics of a destructive information impact, used as a parameter of synthesized models for assessing the state of objects of critical information infrastructure, is given. The proposed method can be used as the basis for specifying technical requirements for critical information infrastructure objects that perform the functions of automated control at promising and modernized complex technical facilities.


Author(s):  
Vincenzo Fioriti ◽  
Gregorio D’Agostino ◽  
Antonio Scala

The chapter starts with the description of the state-of-the-art and the literature review, while introducing the general context of the simulative and complexity science methodologies applied to the critical information infrastructure protection. While introducing the general context, the authors illustrate the methodologies and their applications. The major objective is to investigate the pros and cons to facilitate the choice between the mainstream lines of research in critical information infrastructure protection. Theoretical and practical issues are balanced in order to provide the reader with a wider understanding of the problems at hand and with the appropriate methodological tools to face them. This discussion on the state-of-the-art by no means can be considered exhaustive, depending on the personal views of the authors and on the room available, nevertheless it is meant to explain the trends and the relevant points in the field. It is also worth mentioning, moreover, that with respect to other CI (oil, gas, power grid, etc.), only a small number of CII modelling case studies are available. The reader should be aware that the intention of the authors is not to provide a deep, theoretical, or philosophical analysis of the issue under consideration, rather to help from a practical point of view.


Author(s):  
Sergiy Gnatyuk ◽  
Zhengbing Hu ◽  
Viktoriia Sydorenko ◽  
Marek Aleksander ◽  
Yuliia Polishchuk ◽  
...  

This chapter is devoted to developing formalization methods for identification and security objects of critical information infrastructure (CII) in civil aviation. The analysis of modern approaches to the CII identification was carried out that gave a possibility to determine weaknesses and to formalize a scientific researches task. As a result, the unified data model was developed for formalizing the process of a list of CII objects forming in certain field and at the state level. Moreover, the specialized technique was developed. Besides, the identification method was proposed, and it gives a possibility to determine elements of CII field, mutual influences, and influence on functional operations of critical aviation information system. Furthermore, special software was developed and implemented that can be useful for CII elements identification and also for determining its influences on functional operations. Also, the basic aspects of cybersecurity ensuring for identified critical aviation information system were described in this chapter.


2021 ◽  
pp. 93-102
Author(s):  
O. HORUN

The priorities of the state cybersecurity policy are considered. Modern challenges and threatening trends in the sphere of cybersecurity have been identified. The main principles of formation and implementation of the state cybersecurity policy are detailed. Some acts of domestic legislation devoted to the topical issues of cybersecurity are analyzed. The expediency of strengthening the capabilities of the national cybersecurity system of Ukraine is substantiated. The priority directions of development of the critical information infrastructure are outlined. The tasks and directions of improvement regulatory framework of state cybersecurity policy have been identified.


2020 ◽  
Vol 2 (10) ◽  
pp. 184-196
Author(s):  
Sergiy Gnatyuk ◽  
Yuliia Polishchuk ◽  
Yuliia Sotnichenko ◽  
Dauriya Zhaksigulova

According to the large number of cyber incidents that occur every day, the process of critical infrastructure protection is an important not only technical but also scientific task. However, not all states in the world have an opportunity to provide high-quality protection of such infrastructure at a high level. Based on the fact that the critical information infrastructure protection should be managed at the state level, states need to develop a regulatory framework to address the above issue. Considering the legal framework of Ukraine, as in most post-Soviet countries, there is no effective approach to the protection of critical information infrastructure, such as in the USA or in the EU. The legislation of Ukraine identifies only certain objects of the socio-economic sphere, emergencies where they can lead to socially dangerous consequences, while a single procedure for identification and classification of critical infrastructure is not developed. A number of basic terms in the field of critical infrastructure protection from cyber threats, including “critical infrastructure” term, remain normatively vague. The mechanism of organization of activity and interaction of state and private structures in the process of critical infrastructure protection needs scientific substantiation. In this paper, the analysis of the world’s best practices concerning critical information infrastructure protection was carried out, that allows to improve qualitatively, at the state legislative level and practice, process of critical information infrastructure protection of Ukraine.


Sign in / Sign up

Export Citation Format

Share Document