Critical Aviation Information Systems

Author(s):  
Sergiy Gnatyuk ◽  
Zhengbing Hu ◽  
Viktoriia Sydorenko ◽  
Marek Aleksander ◽  
Yuliia Polishchuk ◽  
...  

This chapter is devoted to developing formalization methods for identification and security objects of critical information infrastructure (CII) in civil aviation. The analysis of modern approaches to the CII identification was carried out that gave a possibility to determine weaknesses and to formalize a scientific researches task. As a result, the unified data model was developed for formalizing the process of a list of CII objects forming in certain field and at the state level. Moreover, the specialized technique was developed. Besides, the identification method was proposed, and it gives a possibility to determine elements of CII field, mutual influences, and influence on functional operations of critical aviation information system. Furthermore, special software was developed and implemented that can be useful for CII elements identification and also for determining its influences on functional operations. Also, the basic aspects of cybersecurity ensuring for identified critical aviation information system were described in this chapter.

Author(s):  
Sergiy Gnatyuk ◽  
Zhengbing Hu ◽  
Viktoriia Sydorenko ◽  
Marek Aleksander ◽  
Yuliia Polishchuk ◽  
...  

This chapter is devoted to developing formalization methods for identification and security objects of critical information infrastructure (CII) in civil aviation. The analysis of modern approaches to the CII identification was carried out that gave a possibility to determine weaknesses and to formalize a scientific researches task. As a result, the unified data model was developed for formalizing the process of a list of CII objects forming in certain field and at the state level. Moreover, the specialized technique was developed. Besides, the identification method was proposed, and it gives a possibility to determine elements of CII field, mutual influences, and influence on functional operations of critical aviation information system. Furthermore, special software was developed and implemented that can be useful for CII elements identification and also for determining its influences on functional operations. Also, the basic aspects of cybersecurity ensuring for identified critical aviation information system were described in this chapter.


2020 ◽  
Vol 2 (10) ◽  
pp. 184-196
Author(s):  
Sergiy Gnatyuk ◽  
Yuliia Polishchuk ◽  
Yuliia Sotnichenko ◽  
Dauriya Zhaksigulova

According to the large number of cyber incidents that occur every day, the process of critical infrastructure protection is an important not only technical but also scientific task. However, not all states in the world have an opportunity to provide high-quality protection of such infrastructure at a high level. Based on the fact that the critical information infrastructure protection should be managed at the state level, states need to develop a regulatory framework to address the above issue. Considering the legal framework of Ukraine, as in most post-Soviet countries, there is no effective approach to the protection of critical information infrastructure, such as in the USA or in the EU. The legislation of Ukraine identifies only certain objects of the socio-economic sphere, emergencies where they can lead to socially dangerous consequences, while a single procedure for identification and classification of critical infrastructure is not developed. A number of basic terms in the field of critical infrastructure protection from cyber threats, including “critical infrastructure” term, remain normatively vague. The mechanism of organization of activity and interaction of state and private structures in the process of critical infrastructure protection needs scientific substantiation. In this paper, the analysis of the world’s best practices concerning critical information infrastructure protection was carried out, that allows to improve qualitatively, at the state legislative level and practice, process of critical information infrastructure protection of Ukraine.


Author(s):  
Сергій Олександрович Гнатюк ◽  
Вікторія Миколаївна Сидоренко ◽  
Нургуль Абадуллаєвна Сєйлова

Author(s):  
N Yarushkina ◽  
A Romanov ◽  
A Filippov ◽  
A Dolganovskaya ◽  
M Grigoricheva

This article describes the method of integrating information systems of an aircraft factory with the production capacity planning system based on the ontology merging. The ontological representation is formed for each relational database (RDB) of integrated information systems. The ontological representation is formed in the process of analyzing the structure of the relational database of the information system (IS). Based on the ontological representations merging the integrating data model is formed. The integrating data model is a mechanism for semantic integration of data sources.


Author(s):  
Miroslav Brožek

The aim of this work is creation conception proposal of information system. It is processed on the example of the firm making business on the czech market in the area of selling personal car of premium segment. On the basic of analysis external and internal environment was discovered a need of application of the new information communication technologies (ICT) and related reengineering changes. Submitted model ICT contains account modul, instore modul, servis modul, sales modul, special software of car company and modul e-commerce. Within the framework conception proposal of ICT arised modular arrangement of new environment to new built strategy, thereby this approach is new by classic concept, where exist strategy of firm and management of firm and to them is added as accelerating instrument of these processes information systems.


Author(s):  
Олександр Григорович Корченко ◽  
Юрій Олександрович Дрейс ◽  
Ольга Олександрівна Романенко ◽  
Володимир Вячеславович Бичков

Author(s):  
Sergiy O. Gnatyuk ◽  
Vitaliy V. Kishchenko ◽  
Vitaliy V. Kotelianets ◽  
Madina Bauyrzhan

Information and communication technologies implementation in most areas of human life is aimed at improving the efficiency of business processes, but the emergence of new vulnerabilities and cyberthreats generates cybersecurity incidents. To localize and neutralize incidents effective management techniques are necessary. These processes are very actual for critical information infrastructure of the state, because destructive influences on objects of critical information infrastructure can cause big losses for the state (human life, material and status losses). Known methods for incidents management are not oriented on some special components and parameters of the cyberspace. It complicates implementation of these methods in real information and communication systems. From this viewpoint, in this paper the concept of network-centric incident management was developed. It allows to identify the most important (real) objects of critical information infrastructure protection and cybersecurity incidents to predict the categories that arise as a result of specific cyberattacks and their risk level. Further research study consists in instrumental tools based on mentioned concept. These tools can be useful for incidents prediction (character and level of losses) in information and communication systems of state critical infrastructure objects.


Author(s):  
Yu. S. Mazepa ◽  
N.V. Shestak

The aim is to analyze the advantages of introducing medical information systems in the healthcare institution in order to improve work on the prevention of NCDs through the example of the State Institution of Science “Scientific and Practical Center of Preventive and Clinical Medicine” of the State Administrative Department (hereinafter referred to as SIS “SPC PCM” of the SAD). Materials and methods. The method of structural and logical analysis and the bibliosemantic method of research have been used in the work. The bibliosemantic method was used to examine the state of studying the problems of NCDs, modern medical information systems both in Ukraine and in the world, and the ways to solve them through the analysis of WHO data, sources of literature, and electronic resources. The method of structural and logical analysis made it possible to distinguish, to logically structure and to create links between the introduction of the unified medical information system and the results from working with patients with NCDs, established a modern analysis and information system for monitoring the health status of the population, created information and reference system to ensure the educational process on specific issues and approaches, including the prevention of NCDs, regulated a synthesis of the results, that ensured a library and patent and licensing work in the scientific institution. Research results and their discussion. The use of the unified medical information system in the healthcare institution is an effective way to disseminate, control, and make available the information, and also to ensure long-term communication between the patient and the doctor on issues related to the prevention of NCDs.


Sign in / Sign up

Export Citation Format

Share Document