Improved method of diagnostics of cybernetic protection of the information system taking into account destructive cybernetic influences.
Keywords:
methodology, assessment, cybernetic security, special-purpose information system, destructive cybernetic influence.
Abstract
The article analyzes well-known attempts to solve the scientific problem of calculating the cybernetic security of a special-purpose information system. It is established that currently existing solutions do not take into account destructive information influence in the calculation, and the result is static. The proposed mathematical apparatus of the method provides the calculation of cybernetic security of a special-purpose information system for the model of the worst-case scenario of a zero-day threat event.
References
Kozubov I. M., Kozubova L. M. (2019) Statement of the problem to develop methods for the assessment of cyber security in information and telecommunication systems. International scientific and practical conference "Joint actions of military formations and law enforcement agencies of the state: problems and prospects" (Odessa, September 12-13, 2019) Military Academy, Pp. 228 – 229.
Khusainov P. V. (2015) Indicator of cybernetic security of an automated system in time. Collection of scientific works of VITI. Kiev. Vol. # 1. Pp. 101 – 111.
Kudinov V. A. (2016) Methodology for assessing the level of cybersecurity in Ukraine. Materials of the all-Ukrainian scientific and practical conference "Cybersecurity in Ukraine: legal and organizational issues"(Odessa, October 21, 2016). Odessa. Pp. 151 – 152.
Chernonog O. O., Kozubtsov I. M., Kutsaev V. V., Kozubtsova L. M., Tereshchenko T. P. (2018) Discussion of a unified approach to the construction of a methodology for evaluating the cybernetic security of an organization's its. International scientific and practical conference " application of information technologies in the training and activities of law enforcement forces” (March 14-15, 2018). – Kharkov. National Academy of the National guard of Ukraine. Pp. 15 – 16.
Kozubtsov I. M., Kozubtsova L. M., Kutsaev V. V., Tereshchenko T. P. (2018) Methods for evaluating the cybernetic security of the organization's communication system. Modern information technologies in the field of security and defense. No. 1 (31). Pp. 43 – 46.
Kutsaev V. V., Radchenko M. M., Kozubtsova L. M., Tereshchenko T. P. (2018) Methods for evaluating cybernetic security of an information and telecommunications node. Collection of scientific works of VITI. K: VITE. Vol. # 2. Pp. 67 – 76.
Rotshtein A. p. Intelligent identification technologies: fuzzy sets, genetic algorithm, neural networks. Vinnytsia: UNIVERSUM, 1999. 320 p.
Khusainov P. V. (2006) Method of determining the rational sequence of providing information messages to the operator of the protection system. Collection of scientific works of VITI NTUU "KPI". Kiev. Vol. # 3. Pp. 148 – 155.
Khusainov P. V. (2015) Indicator of cybernetic security of an automated system in time. Collection of scientific works of VITI. Kiev. Vol. # 1. Pp. 101 – 111.
Kudinov V. A. (2016) Methodology for assessing the level of cybersecurity in Ukraine. Materials of the all-Ukrainian scientific and practical conference "Cybersecurity in Ukraine: legal and organizational issues"(Odessa, October 21, 2016). Odessa. Pp. 151 – 152.
Chernonog O. O., Kozubtsov I. M., Kutsaev V. V., Kozubtsova L. M., Tereshchenko T. P. (2018) Discussion of a unified approach to the construction of a methodology for evaluating the cybernetic security of an organization's its. International scientific and practical conference " application of information technologies in the training and activities of law enforcement forces” (March 14-15, 2018). – Kharkov. National Academy of the National guard of Ukraine. Pp. 15 – 16.
Kozubtsov I. M., Kozubtsova L. M., Kutsaev V. V., Tereshchenko T. P. (2018) Methods for evaluating the cybernetic security of the organization's communication system. Modern information technologies in the field of security and defense. No. 1 (31). Pp. 43 – 46.
Kutsaev V. V., Radchenko M. M., Kozubtsova L. M., Tereshchenko T. P. (2018) Methods for evaluating cybernetic security of an information and telecommunications node. Collection of scientific works of VITI. K: VITE. Vol. # 2. Pp. 67 – 76.
Rotshtein A. p. Intelligent identification technologies: fuzzy sets, genetic algorithm, neural networks. Vinnytsia: UNIVERSUM, 1999. 320 p.
Khusainov P. V. (2006) Method of determining the rational sequence of providing information messages to the operator of the protection system. Collection of scientific works of VITI NTUU "KPI". Kiev. Vol. # 3. Pp. 148 – 155.
Abstract views: 153 PDF Downloads: 228
Published
2020-05-19
How to Cite
Kozubtsova, L. (2020). Improved method of diagnostics of cybernetic protection of the information system taking into account destructive cybernetic influences. COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (39), 127-135. https://doi.org/10.36910/6775-2524-0560-2020-39-22
Section
Computer science and computer engineering