scholarly journals METHODOLOGY FOR RISK ASSESSMENT OF CYBER SECURITY OF INFORMATION SYSTEMS OF OBJECTS OF CRITICAL INFRASTRUCTURE

Author(s):  
S.F. Honchar ◽  
2021 ◽  
Author(s):  
Ramaz Shamugia

This article is dedicated to the development of a software model with a Graphical User Interface (GUI) to simulate the process of ensuring information and cyber security of information systems (IS) of Critical Infrastructure objects (CI) based on the analytical model developed by the author of this article. The specified software model with a GUI makes it possible, using the controls located on the main panel, to set the input parameters of the simulated object and observe its output characteristics using appropriate visualization elements such as special windows for displaying calculated numerical values of the main characteristics of the systems under study.


Electronics ◽  
2021 ◽  
Vol 10 (15) ◽  
pp. 1819
Author(s):  
Rasa Bruzgiene ◽  
Konstantinas Jurgilas

Information systems of critical infrastructure provide services on which the core functions of a state and its economy depend as well as welfare of society. Such systems are becoming an increasingly common target for crimes and attacks in cyberspace, as their vulnerabilities can be exploited for malicious activities seeking financial or political gain. One of the main reasons that threatens the security of these systems is the weak control of remote access, otherwise defined as management of a system’s user identity. Management of user identity depends on user authentication, authorization and the assignment of certain rights in the digital space. This paper provides the proposed two-factor (2FA) digital authentication method for remote access to an information system of a critical infrastructure. Results of testing the method’s usability and resilience to cyber threats have shown that the system, in which the method was implemented, is protected from dangerous HTTP requests and publicly available system’s endpoints are protected from threatening inputs that could cause malicious activities on the critical infrastructure. Additionally, the implementation of the authentication API application ensures the rapidity of the method for less than 500 ms for 100 users working in parallel with the system at the same time.


Sign in / Sign up

Export Citation Format

Share Document