scholarly journals DETERMINING THE PRIORITY OF CYBER SECURITY MEASURES FOR INCOMPLETE EXPERT RANKING

Author(s):  
Hryhoriy Hnatienko ◽  
Natalia Tmenova

High-quality functioning of the information security system and solving problems that arise in the information protection, is currently a topical trend in various areas of human life. Successful cyber protection consist in creating and implementing a multi-level system of measures that cover various aspects with complex interact and complement each other. These measures have a different nature, and their priorities may differ significantly in terms of different services of the organization, so it is logical to formalize the sequence of cybersecurity implementation in a class of group choice tasks. The paper proposes a flexible mathematical apparatus for modeling information security problems and adequate application of the opinion analysis of experts’ team in practice. The approach to finding the resultant ranking of measures priority is described as a solution to the problem of multicriteria optimization, where the sequence of measures implementation may involve the interaction of performers and require regulation of the actions sequence of all elements and subsystems of the organizational system. This approach allows to combine different information security measures proposed by the experts of various departments; to find a compromise solution for a diverse group of experts; not to violate any expert's preferences under calculating the compromise ranking of cyber security measures. The proposed approach can be useful in developing appropriate cybersecurity measures and favorable in developing and implementing of rapid response procedures to threats, as well as it can be indispensable in the overall building or improving organization security system and it can contain elements of training, coordination, and complexity of expert team members, who are the heads of units of a single organizational system.

2017 ◽  
Vol 4 (2) ◽  
pp. 1-7
Author(s):  
Penny Hart

This article contends that there are two increasingly important phenomena for organisations: the existence of virtual teams and the realisation that information needs to be protected more effectively. On-line communication methods expose organisations to issues regarding security of their ICT infrastructure, systems and data. At the same time, making possible virtual teams able to be unconstrained in purpose, time or location. While security measures are built into the teams' communication channels and processes, the perceptions, practices and organizational background of team members are equally important to the security of information being exchanged. A socio-technical approach is called for when investigating different perceptions of information security by individual team members, how they negotiate a common understanding for the team and what complexities and practices are introduced in multi-organisation teams. The article sets out issues which may need to be considered and proposes a course of research to increase understanding of the situation.


Author(s):  
Oleh Kozlenko

Article explores application methods for systems structural analysis to use in study of security in information systems, which is based on variants of general attack scenarios, features of cybersecurity culture, q-analysis, which is part of MCQA . General security system analysis usually is based on different factors, which include  technical means, human-related mistakes in different ways and respond to security incidents. Q-analysis presents the basic principles of constructing model of information security systems elements connectivity on the example of two sets: set of threats and sets of security measures for information security and calculated numerical values. Elements of the two sets of are interconnected and form the basis of a system for ensuring their security. These calculations can be used to further determine overall formal assessment of security of the organization.


Artificial Intelligence (AI) is a buzz word in the cyber world. It is still a developing science in multiple facets according to the challenges thrown by 21st century. Use of AI has become inseparable from human life. In this day and age one cannot imagine a world without AI as it has much significant impact on human life. The main objective of AI is to develop the technology based activities which represents the human knowledge in order to solve problems. Simply AI is study of how an individual think, work, learn and decide in any scenario of life, whether it may be related to problem solving or learning new things or thinking rationally or to arrive at a solution etc. AI is in every area of human life, naming a few it is into gaming, language processing, speech recognition, expert system, vision system, hand writing recognition, intelligence robots, financial transactions and what not, every activity of human life has become a subset of AI. In spite of numerous uses, AI can also used for destroying the human life, that is the reason human inference is required to monitor the AI activities. Cyber crimes has become quite common and become a daily news item. It is not just a problem faced in one country, it is across the world. Without strong security measures, AI is meaningless as it can be easily accessible by others. It has become a big threat for governments, banks, multinational companies through online attacks by hackers. Lot of individual and organizational data is exploited by hackers and it becomes a big threat to the cyber world. In this connection research in the area of AI and cyber security has gained more importance in the recent times and it is ever lasting also as it is a dynamic and sensitive issue linked to human life.


2018 ◽  
Vol 3 (2) ◽  
pp. 248
Author(s):  
Azernikov A. D. ◽  
Norkina A. N. ◽  
Myseva E. R. ◽  
Chicherov K. A.

So far, development and enhancement of global communication networks, distribution of software, and upgrading of computer systems are accompanied by the evolution of criminal environment, with the latter evolving not only within one particular nation but throughout the international community. New opportunities in cyber crime translate into new threats for global information networks and community as a whole, which in terms of preventing and combating cyber crime requires substantial strengthening of information security measures and an approach that is completely different from that applied to combating common crime. The article presents innovative technologies in combating cyber crime and an ever-increasing significance of information security as a system of protecting private, public and state interests. Keywords: cyber crime, cyber security, Internet, information security, innovative technologies, computer systems, information technologies (IT), cyber threats, cyber space.


2019 ◽  
Vol 8 (4) ◽  
pp. 8643-8645

Artificial Intelligence (AI) is a buzz word in the cyber world. It is still a developing science in multiple facets according to the challenges thrown by 21st century. Use of AI has become inseparable from human life. In this day and age one cannot imagine a world without AI as it has much significant impact on human life. The main objective of AI is to develop the technology based activities which represents the human knowledge in order to solve problems. Simply AI is study of how an individual think, work, learn and decide in any scenario of life, whether it may be related to problem solving or learning new things or thinking rationally or to arrive at a solution etc. AI is in every area of human life, naming a few it is into gaming, language processing, speech recognition, expert system, vision system, hand writing recognition, intelligence robots, financial transactions and what not, every activity of human life has become a subset of AI. In spite of numerous uses, AI can also used for destroying the human life, that is the reason human inference is required to monitor the AI activities. Cyber crimes has become quite common and become a daily news item. It is not just a problem faced in one country, it is across the world. Without strong security measures, AI is meaningless as it can be easily accessible by others. It has become a big threat for governments, banks, multinational companies through online attacks by hackers. Lot of individual and organizational data is exploited by hackers and it becomes a big threat to the cyber world. In this connection research in the area of AI and cyber security has gained more importance in the recent times and it is ever lasting also as it is a dynamic and sensitive issue linked to human life.


2020 ◽  
Author(s):  
Pranav C

Abstract: With rapid computerisation of all walks of life, cyber security has become a major challenge to the mankind. Cyber security is all about security of anything in cyber realm, while information security is all about security of information regardless of the realm. Cybercrimes are perpetrated by using computers and related devices / networks by individuals with sophisticated knowledge in the field of computers. Cybercrime is an evil having its origin in the growing dependence on computers in modern life. In a day and age when everything from microwave ovens and refrigerators to nuclear power plants is being run on computers, cybercrime has assumed rather sinister implications. Cybercrime perpetrators are keeping pace with innovations in technology and are way ahead of security measures taken to curb them. With huge money involved in cybercrimes, it has become a major concern. This research paper briefly defines cyber security and deals in detail with cybercrime and five major cyber security threats currently plaguing the world.


2021 ◽  
Vol 25 (5) ◽  
pp. 41-49
Author(s):  
А. V. Gavrilov ◽  
V. A. Sizov ◽  
E. V. Yaroshenko

Purpose of the study. Creating an effective information security system of an enterprise is impossible without an adequate assessment of the risks to which its assets are exposed. The results of such an assessment should become the basis for making decisions in the field of information security of the enterprise. Identification of information assets and assessment of their value, determination of the level of threats to the security of assets allow planning measures to create an enterprise information security system.This paper discusses a methodology for assessing the risks of information security of an enterprise, a distinctive feature and novelty of which is the use of modern tools and methods for constructing and analyzing business processes in order to identify the information assets of an enterprise to be protected.Materials and methods. It is proposed to identify information assets based on the model of business processes of the enterprise, performed using the IDEF0 methodology. Modeling of business processes was carried out in the Business Studio environment of the “Modern Management Technologies” company.The activity of a typical IT-industry company was considered as an example for the risk analysis.Results. The methodology for assessing the risks of information security of an enterprise described in the article has been successfully tested in the educational process. Its use in conducting laboratory classes in the discipline “Designing the information security system of enterprises and organizations” for masters studying in the direction of “Information security” allowed, according to the authors of the article, to increase the effectiveness of the formation of students’ professional competencies.Conclusion. The paper proposes a methodology for assessing information security risks for objects of an enterprise’s information infrastructure, which makes it possible to identify priority areas of information security at an enterprise. As a result of the application of the technique, a loss matrix is formed, showing the problem areas in the organization of information protection, which should be given priority attention when planning information security measures. Based on the data obtained, it is possible to form an economically justified strategy and tactics for the development of an enterprise information security system.


Author(s):  
Sh.R. Akobirov

Ushbu maqolada Hayot faoliyati xavfsizligi mazmuni, inson hayoti hamda faoliyati mobaynida xavfsizlik choralarining ahamiyati tushuntirilgan.Shu bilan birga, hayot faoliyati xavfsizligi fan sifatida o’qitilishi, uning vazifasi , maqsadi hamda oldiga qo’yilgan xavfsizlik chora –tadbirlari bilan ta’minlash haqida so’z boradi.Xavfsizlik, faoliyat, hayot faoliyati xavfsizligini taminlash usullari va ularni rivojlanish kabi atamalar aniq tariflangan. Mamlakatimiz O’zbekistonda xavfsizlik chora-tadbirlarining barcha texnogen, iqtisodiy, siyosiy va axborot turlari bo’yicha qabul qilingan qarorlar hamda amalga oshirilgan islohotlar maqolada o’z aksini topgan. Inson hayotida xavfsizlik tushunchasini bugungi kunda yoshlarga tushuntirish, tashqi ta’sir etuvchilarning ijobiy va salbiy tomonlarini yoshlar tarbiya jarayonida yosh avlodga singdirish, xavf-xatardan holi muhitni tashkil etish yo’llari , usullari hamda mavjud sharoitlarni rivojlantirish usullari keng ko’lamda tahlil qilingan. Umumiy tahlil etilgan ma’lumotlardan foydalanib xulosa sifatida qo’shimcha takliflar bildirilgan. В этой статье разъясняется содержание безопасности жизнедеятельности, важность мер безопасности в жизни и деятельности человека. Четко определены такие термины, как безопасность, деятельность, методы обеспечения безопасности жизнедеятельности и их развитие. В статье отражены принятые решения и реформы по всем видам техногенных, экономических, политических и информационных мер безопасности в Узбекистане. Концепция безопасности в жизни человека сегодня широко разъясняется молодежи, положительные и отрицательные аспекты внешних воздействий передаются молодому поколению в процессе обучения молодых людей, способов и средств создания безопасной среды и способов развития. существующие условия широко анализируются. Дополнительные предложения были внесены в результате общего анализа. This article explains the content of life safety, the importance of safety measures in human life and activity. Terms such as safety, activities, methods of ensuring the safety of life activities and their development are clearly defined. The article reflects the decisions taken and reforms in all types of man-made, economic, political and information security measures in Uzbekistan. The concept of security in human life is widely explained to young people today, the positive and negative aspects of external influences are passed on to the younger generation in the process of educating young people, ways and means of creating a safe environment and ways to develop existing conditions. Additional suggestions were given as a result of the overall analysis about our consept.


Author(s):  
Curtis G. Northcutt

The recent proliferation of embedded cyber components in modern physical systems [1] has generated a variety of new security risks which threaten not only cyberspace, but our physical environment as well. Whereas earlier security threats resided primarily in cyberspace, the increasing marriage of digital technology with mechanical systems in cyber-physical systems (CPS), suggests the need for more advanced generalized CPS security measures. To address this problem, in this paper we consider the first step toward an improved security model: detecting the security attack. Using logical truth tables, we have developed a generalized algorithm for intrusion detection in CPS for systems which can be defined over discrete set of valued states. Additionally, a robustness algorithm is given which determines the level of security of a discrete-valued CPS against varying combinations of multiple signal alterations. These algorithms, when coupled with encryption keys which disallow multiple signal alteration, provide for a generalized security methodology for both cyber-security and cyber-physical systems.


Sign in / Sign up

Export Citation Format

Share Document