Features of creating a multi-level model of cyber security of critical infrastructure data: an interdisciplinary approach
Abstract
The article examines the model of ensuring cyber security of Ukraine and documents the organizational and legal support for the protection of critical infrastructure objects from cyber attacks. The main concepts are described: multi-level data model, identification of cyber security, and critical infrastructure facilities. The levels of protection of critical infrastructure objects and measures at each level that ensure cyber security are highlighted and described. The stability of the critical infrastructure object is substantiated, and the formula for determining risks in critical infrastructure objects is described. The developed basic tuple model for the classification of critical information infrastructure objects by multi-level data models is highlighted. The prospects and risks of implementing multi-level data models in critical infrastructure facilities have been identified. It was concluded that multi-level data models are an important tool for ensuring cyber security in today's digital world and critical infrastructure enterprises in private. They allow for the effective protection of confidential information by isolating and controlling different levels of data access
References
2. Ten, C.-W., Govindarasu, M., & Liu, C.-C. (2010) Cybersecurity for critical infrastructures: Attack and defense modeling. IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 40(4), P.853-865.
3. Sarker, I. H., Janicke, H., Ferrag, M. A., & Abuadbba, A. (2024) Multi-aspect rule-based AI: Methods, taxonomy, challenges, and directions towards automation, intelligence, and transparent cybersecurity modeling for critical infrastructures. Internet of Things, 25, 101110.
4. Hnatyuk, S.O. (2013) Cyberterrorism: History of development, current trends, and countermeasures. Information Security, 19(2), P. 118-129.
5. Ivanyuta, S.P. (2018) Priority areas of legislative and organizational support for certification of critical infrastructure objects.
Abstract views: 56 PDF Downloads: 32