Modeling Cyber Security of Information Systems Smart City Based on the Theory of Games and Markov Processes

Author(s):  
Valeriy Lakhno ◽  
Dmytro Kasatkin ◽  
Andriy Blozva
Author(s):  
Mykhailo Strelbitskyi

The article analyzes the functions of the Border Guard Service of Ukraine and its information systems. It is determined that the modernization of the components of the integrated information system causes a violation of the existing system of cyber defense. The analysis of existing approaches to ensuring the protection of information in information systems has shown a sufficiently deep study of research separately for each information system. However, unexperienced features of the interaction of these systems remain, in particular, with the modernization of certain information systems in terms of providing cyber defense in general. The process of modernization of information systems is carried out according to individual components of the system or complex and requires their coordination in the process of joint operation. The article gives the justification of modernization strategies according to the groups of criteria: the level of cyber security, the peculiarities of the functioning of information systems. It is noted that the value of the probability of violating the properties of the information resource varies over the entire period of modernization. Therefore, to choose the strategy of modernization at the value of probability at any time is not correct. It is necessary to take into account the general tendency of the function of changing this probability. The most expedient is the distribution of this group of criteria into three components of the criteria for the level of cyber security: the normative - the criterion in which the current value of the probability of violating cybersecurity does not exceed the given; average - the criterion for which the average probability of a violation of cybersecurity does not exceed the prescribed; weighted - a criterion for which the average weighted probability of cybersecurity violation will not exceed the given. The article presents functional dependencies for determining the probability of cyber security violations for each of the groups. As a result of the study, it was determined that the priority indicator of the effectiveness of the process of modernizing the information systems of the border agency is the maximum value of the probability of violating the properties of information in the process of modernization


2020 ◽  
Vol 60 (11) ◽  
pp. 16-20
Author(s):  
Vugar Hajimahmud Abdullayev ◽  
◽  
Vusala Alyag Abuzarova ◽  

The article is devoted to the study of cyber security problems in the Smart Cities system. The development of the IT industry has led to the introduction of new technologies into our lives. One of these technologies is the Internet of Things technology. The application of IoT technology has increased in recent years. One of the most important areas in which Internet of Things technology is applied is the Smart Cities system. The main difference between smart cities and other cities is that their components are connected to each other via the Internet. All these smart devices create a smart city system in general. One of the biggest and most important problems in many areas where the Internet is used is security. The article looks at possible security problems in the system of smart cities and solutions to ensure cyber security. Key words: Smart city; Internet of Things; Information technologies; Security; Cyber security


Crowdsourcing ◽  
2019 ◽  
pp. 489-516
Author(s):  
Jennifer Minner ◽  
Andrea Roberts ◽  
Michael Holleran ◽  
Joshua Conrad

Integral to some conceptualizations of the “smart city” is the adoption of web-based technology to support civic engagement and improve information systems for local government decision support. Yet there is little to no literature on the “smartness” of gathering information about historic places within municipal information systems. This chapter provides three case studies of technologically augmented planning processes that incorporated citizens as sensors of data about historic places. The first case study is of SurveyLA, a massive effort of the city of Los Angeles to comprehensively survey over 880,000 parcels for historic resources. A second case study involves Motor City Mapping, an effort to identify the condition of buildings in Detroit, Michigan and a parallel historical survey conducted by volunteers. In Austin, Texas, a university-based research team designed a municipal web tool called the Austin Historical Survey Wiki. This chapter offers insights into these prior efforts to augment planning processes with “digitized memory,” web-based technology, and public engagement.


Author(s):  
Amtul Waheed ◽  
Jana Shafi

Smart cities are established on some smart components such as smart governances, smart economy, science and technology, smart politics, smart transportation, and smart life. Each and every smart object is interconnected through the internet, challenging the security and privacy of citizen's sensitive information. A secure framework for smart cities is the only solution for better and smart living. This can be achieved through IoT infrastructure and cloud computing. The combination of IoT and Cloud also increases the storage capacity and computational power and make services pervasive, cost-effective, and accessed from anywhere and any device. This chapter will discuss security issues and challenges of smart city along with cyber security framework and architecture of smart cities for smart infrastructures and smart applications. It also presents a general study about security mechanism for smart city applications and security protection methodology using IOT service to stand against cyber-attacks.


2022 ◽  
pp. 1459-1480
Author(s):  
Anand Nayyar ◽  
Rachna Jain ◽  
Bandana Mahapatra ◽  
Anubhav Singh

Smart cities are composed of interlinked components with constant data transfer and services targeted at increasing the life style of the people. The chapter focuses on diverged smart city components as well as the security models designed to be implemented. The four major paradigms discussed in this chapter are smart grids, building automation system (BAS), unmanned aerial vehicle (UAV), and smart vehicles. Apart from addressing the security concerns of every component, the major highlights of this chapter are architecture, smart environment, industry, lifestyle, services, and digital lifestyle quality. Finally, the chapter focuses on privacy preserving mechanisms, its essence over smart cities, strong architecture related to privacy, preserving mechanism, and various approaches available that can retaliate these issues in a smart city environment.


Author(s):  
Fenio Annansingh

The concept of a smart city as a means to enhance the life quality of citizens has been gaining increasing importance in recent years globally. A smart city consists of city infrastructure, which includes smart services, devices, and institutions. Every second, these components of the smart city infrastructure are generating data. The vast amount of data is called big data. This chapter explores the possibilities of using big data analytics to prevent cybersecurity threats in a smart city. It also analyzed how big data tools and concepts can solve cybersecurity challenges and detect and prevent attacks. Using interviews and an extensive review of the literature have developed the data analytics and cyber prevention model. The chapter concludes by indicating that big data analytics allow a smart city to identify and solve cybersecurity challenges quickly and efficiently.


Author(s):  
Otobong Inieke

Data security in the information age is a critical facet in the integrity and reliability of the various information systems making up value structures of businesses, organizations etc. Aside from professionals directly involved with securing data within these systems, the importance of data security is not readily apparent to the everyday user of devices in the information systems. The purpose of this literature review is to highlight challenges related to data security and business information systems in conjunction with digital literacy. An extensive literature review was conducted with the aim of identifying and describing scenarios of technology misuse as well as vulnerabilities in vital business information systems. A gap in awareness continues to plague those who leverage information systems for its myriad uses because everyday users will in most cases dismiss data security advice as alarmist or jargon-laden. This falls in line with a 2018 cyber security survey from Statista which showed that 22% of data security tasks was preventing malware while 17% of tasks were dedicated to preventing social engineering and phishing attacks. This literature review will describe possible data insecurity solutions as well as potential areas of further research. The paper will point out the importance of digital literacy as well as recommendations for its improvement in society and also ongoing research in that regard. The essence of this literature review is to identify certain everyday information systems such as decision support systems and transaction processing systems; while pointing out vulnerabilities and threat nature i.e. technical or non-technical and also demonstrating the importance of digital literacy and lack thereof.


2018 ◽  
Vol 9 (1) ◽  
pp. 32 ◽  
Author(s):  
Paola Espinoza-Arias ◽  
María Poveda-Villalón ◽  
Raúl García-Castro ◽  
Oscar  Corcho

Existing smart city ontologies allow representing different types of city-related data from cities. They have been developed according to different ontological commitments and hence do not share a minimum core model that would facilitate interoperability among smart city information systems. In this work, a survey has been carried out in order to study available smart city ontologies and to identify the domains they are representing. Taking into account the findings of the survey and a set of ontological requirements for smart city data, a list of ontology design patterns is proposed. These patterns aim to be easily replicated and provide a minimum set of core concepts in order to guide the development of smart city ontologies.


2019 ◽  
Vol 71 ◽  
pp. 04017
Author(s):  
E.V. Pogorelova ◽  
T.B. Efimova ◽  
V.A. Haitbaev

The main challenges facing modern cities initiate review of approaches to management of city development. Combining of information systems and “smart” equipment used in various spheres of activity is analyzed. It causes digitization of social and economic processes which are not the optimal ones, and management mistakes are transferred to the sphere of digital transformation. In this research it is proposed to consider the development of digital platforms of a “smart city” according to systematic transformation of social and economic processes into the view optimal for management whilst taking into account psychological and cognitive characteristics of city dwellers. This issue may be solved by creating digital platforms of a new class which are based on neural management of knowledge and artificial intellect.


Sign in / Sign up

Export Citation Format

Share Document