Unified data model for defining state critical information infrastructure in civil aviation

Author(s):  
Sergiy Gnatyuk ◽  
Marek Aleksander ◽  
Viktoriia Sydorenko
Author(s):  
Sergiy Gnatyuk ◽  
Zhengbing Hu ◽  
Viktoriia Sydorenko ◽  
Marek Aleksander ◽  
Yuliia Polishchuk ◽  
...  

This chapter is devoted to developing formalization methods for identification and security objects of critical information infrastructure (CII) in civil aviation. The analysis of modern approaches to the CII identification was carried out that gave a possibility to determine weaknesses and to formalize a scientific researches task. As a result, the unified data model was developed for formalizing the process of a list of CII objects forming in certain field and at the state level. Moreover, the specialized technique was developed. Besides, the identification method was proposed, and it gives a possibility to determine elements of CII field, mutual influences, and influence on functional operations of critical aviation information system. Furthermore, special software was developed and implemented that can be useful for CII elements identification and also for determining its influences on functional operations. Also, the basic aspects of cybersecurity ensuring for identified critical aviation information system were described in this chapter.


Author(s):  
Sergiy Gnatyuk ◽  
Zhengbing Hu ◽  
Viktoriia Sydorenko ◽  
Marek Aleksander ◽  
Yuliia Polishchuk ◽  
...  

This chapter is devoted to developing formalization methods for identification and security objects of critical information infrastructure (CII) in civil aviation. The analysis of modern approaches to the CII identification was carried out that gave a possibility to determine weaknesses and to formalize a scientific researches task. As a result, the unified data model was developed for formalizing the process of a list of CII objects forming in certain field and at the state level. Moreover, the specialized technique was developed. Besides, the identification method was proposed, and it gives a possibility to determine elements of CII field, mutual influences, and influence on functional operations of critical aviation information system. Furthermore, special software was developed and implemented that can be useful for CII elements identification and also for determining its influences on functional operations. Also, the basic aspects of cybersecurity ensuring for identified critical aviation information system were described in this chapter.


Author(s):  
Вікторія Миколаївна Сидоренко ◽  
Сергій Олександрович Гнатюк ◽  
Олексій Юрійович Юдін

Author(s):  
Сергій Олександрович Гнатюк ◽  
Вікторія Миколаївна Сидоренко ◽  
Нургуль Абадуллаєвна Сєйлова

Author(s):  
Ilia Pavlovich Mikhnev ◽  
Svetlana Vladimirovna Mikhneva

The article discusses the competences and powers of the state authorities of the Russian Federation within their legal status in the field of ensuring the security of critical information infrastructure. Some functions and authorities in the field of information security have changed in a number of federal executive bodies. In particular, the Federal Security Service, on the basis of a presidential decree, is authorized to create a state system for detecting, preventing and eliminating the consequences of computer attacks on information resources of the Russian Federation. However, not all rights and obligations are enshrined; a number of powers cause the duality of the legal status of certain federal bodies of state power. The clarity and unambiguity of securing the rights and obligations of state bodies authorized in the field of information security are guarantees for effectively ensuring the security of important information infrastructure facilities.


Sign in / Sign up

Export Citation Format

Share Document