Cybersecurity: Education, Science, Technique最新文献

筛选
英文 中文
ANALYSIS OF FACTORS AFFECTING CYBER SECURITY OF A HIGHER MILITARY EDUCATIONAL INSTITUTION 某军事高等院校网络安全影响因素分析
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.15.5370
V. Kyva
{"title":"ANALYSIS OF FACTORS AFFECTING CYBER SECURITY OF A HIGHER MILITARY EDUCATIONAL INSTITUTION","authors":"V. Kyva","doi":"10.28925/2663-4023.2022.15.5370","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.15.5370","url":null,"abstract":"The impact of the development and dissemination of information and communication technologies (ICT) in higher military educational institutions (HMEI) is considered in the article, as on the one hand, it increases its efficiency and promotes the training of highly qualified personnel (tactical, operational and strategic level of military education) for the Security Sector and defense of Ukraine, which is extremely necessary in the case of armed aggression by the Russian Federation, and on the other hand, it makes its information space vulnerable to cyberattacks, which the issue of cybersecurity of HMEI raises. At the same time, the author focuses on the analysis of cyber-attacks on educational institutions in recent years, which are due to the development of methods (means) of their implementation and wide access to them by various users, including attackers. In addition, Distributed Denial of Service (DDoS) cyber-attack is the most common cyber threat to international educational institutions, according to an analytical report by Netscout (a developer of ICT solutions to combat DDoS cyberattacks in the United States). It has been analyzed that criminals have recently used DDoS cyberattacks to extort money. Moreover, DDoS cyberattacks were aimed at banks, stock exchanges, travel agencies, currency exchanges and educational institutions. Therefore, the cybersecurity of HMEI needs constant attention from the participants of its provision. In addition, the analysis shows that the cybersecurity of any university is influenced by external and internal factors, which confirm the relevance of the chosen area of research. Therefore, the cybersecurity of HMEI requires an analysis of the factors that affect it, in order to choose the best option for its implementation. Accordingly, the essence and main features of the impact of factors on the cybersecurity of HMEI are identified and their characteristics are presented. The influence of factors on the cybersecurity of HMEI has been decomposed, in particular on the interdependence and criticality of their impact. The necessity of taking into account and constant monitoring of the influence of external and internal factors on the cybersecurity of HMEI is substantiated, which allows to get situational awareness of the current state of cybersecurity and to make appropriate decisions to the management.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133831492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
EXPERIMENTAL STUDY OF THE MODEL FOR CALCULATING THE QUANTITATIVE CRITERIA FOR ASSESSING THE SECURITY LEVEL OF INFORMATION AND TELECOMMUNICATION SYSTEMS IN CRITICAL INFRASTRUCTURE OF THE STATE 国家关键基础设施信息通信系统安全水平评估定量标准计算模型的实验研究
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.16.618
S. Gnatyuk, Oleksiy Yudin, V. Sydorenko, T. Smirnova, Dauriya Zhaksigulova
{"title":"EXPERIMENTAL STUDY OF THE MODEL FOR CALCULATING THE QUANTITATIVE CRITERIA FOR ASSESSING THE SECURITY LEVEL OF INFORMATION AND TELECOMMUNICATION SYSTEMS IN CRITICAL INFRASTRUCTURE OF THE STATE","authors":"S. Gnatyuk, Oleksiy Yudin, V. Sydorenko, T. Smirnova, Dauriya Zhaksigulova","doi":"10.28925/2663-4023.2022.16.618","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.16.618","url":null,"abstract":"Global trends in the number and complexity of cyber-attacks have led to the information and telecommunications systems (ITS) protection, in particular, industry, which are critical to society, socio-economic development and information component of national security. Given the needs of national security and the need to introduce a systematic approach to solving the problem of critical infrastructure protection, at the national level, creating a system of protection of such infrastructure is one of the priorities in reforming the defense and security sector of Ukraine. Thus, there is a need to develop methods and models for classifying ITS as a critical infrastructure to ensure Ukraine's national security. The paper studies the model of calculating the quantitative criterion for assessing the security of ITS based on the method of hierarchy analysis, which allowed the processing of expert assessments to obtain a quantitative indicator of ITS security. This made it possible to simplify the procedure for selecting experts, to avoid the specifics of processing expert data, as well as to assess ITS in a limited amount of statistics. The developed model allows to move from qualitative assessment in the form of an ordered series of alphanumeric combinations denoting the levels of implemented services, to quantitative assessment in the form of the ratio of functional security profiles. In addition, specialized software has been developed that implements the studied model, which allowed to conduct experimental research and verification of this model on the example of ITS of the National Confidential Communications System. In further research, the authors plan to investigate the model for calculating the quantitative criterion for assessing the security of ITS in other areas of critical infrastructure (energy, transport etc.).","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131357468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INSIDERS AND INSIDER INFORMATION: ESSENCE, THREATS, ACTIVITIES AND LEGAL RESPONSIBILITY 内部人与内幕信息:本质、威胁、活动与法律责任
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.15.175185
Svitlana Shevchenko, Yuliia Zhdanovа, P. Skladannyi, Sofia Boiko
{"title":"INSIDERS AND INSIDER INFORMATION: ESSENCE, THREATS, ACTIVITIES AND LEGAL RESPONSIBILITY","authors":"Svitlana Shevchenko, Yuliia Zhdanovа, P. Skladannyi, Sofia Boiko","doi":"10.28925/2663-4023.2022.15.175185","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.15.175185","url":null,"abstract":"The constant development of information technologies, the growing role at the present stage of human potential create new internal threats to the information security of enterprises. The article investigates and analyzes the problems of information security associated with internal violators of companies and their insider activity. Economic reports and analytical materials allowed to determine the relevance and importance of this work. Based on scientific literature, a review of various approaches to the definition of \"insider\" and \"insider information\" was carried out. The main key indicators of the insider and signs of insider information are described. The classification of data sources for the study of insider threats is presented, among which real data of the system journal and data from social networks are allocated; analytical information with synthetic anomalies; simulated data due to the formation of stochastic models; theoretical and gaming approach. Insider threat detection algorithms are described depending on intentions, behavior, capabilities of insiders, how resources are used, as well as models involving several algorithms. The normative issues of protection of insider information from unauthorized disclosure and legal responsibility for illegal use of insider information in Ukrainian legislation are covered.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132220898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
RANDOMIZATION OF CSIDH ALGORITHM ON QUADRATIC AND TWISTED EDWARDS CURVES 二次和扭转Edwards曲线上csidh算法的随机化
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.17.128144
A. Bessalov, Ludmila Kovalchuk, Sergey Abramov
{"title":"RANDOMIZATION OF CSIDH ALGORITHM ON QUADRATIC AND TWISTED EDWARDS CURVES","authors":"A. Bessalov, Ludmila Kovalchuk, Sergey Abramov","doi":"10.28925/2663-4023.2022.17.128144","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.17.128144","url":null,"abstract":"The properties of quadratic and twisted supersingular Edwards curves that form pairs of quadratic twist with order over a prime field are considered. A modification of the CSIDH algorithm based on odd degree isogenies of these curves is considered. A simple model for the implementation of the CSIDH algorithm in 3 minimal odd isogeny degrees 3, 5, 7, with the prime field modulus and the order of supersingular curves is constructed. At the precipitation stage, the parameters of isogenic chains of all degrees for these two classes of supersingular Edwards curves are calculated and tabulated. An example of the implementation of the CSIDH algorithm as a non-interactive secret sharing scheme based on the secret and public keys of Alice and Bob is given. A new randomized CSIDH algorithm with a random equiprobable choice of one of the curves of these two classes at each step of the isogeny chain is proposed. The choice of the degree of each isogeny is randomized. The operation of the randomized algorithm by an example is illustrated. This algorithm as a possible alternative to \"CSIDH with constant time\" is considered. A combination of the two approaches is possible to counter side channel attacks. Estimates of the probability of a successful side-channel attack in a randomized algorithm are given. It is noted that all calculations in the CSIDH algorithm necessary to calculate the shared secret are reduced only to calculating the parameter of the isogenic curve and are performed by field and group operations, in particular, scalar point multiplications and doubling points of the isogeny kernel. In the new algorithm we propose to abandon the calculation of the isogenic function of random point , which significantly speeds up the algorithm.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130758007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
OPTIMIZATION OF PLACEMENT OF INFORMATION PROTECTION MEANS BASED ON THE APPLICATION OF A GENETIC ALGORITHM 基于应用遗传算法的信息保护手段布局优化
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.17.620
V. Lakhno, Volodimir Maliukov, Larysa Komarova, D. Kasatkin, T.Yu. Osypova, Y. Chasnovskyi
{"title":"OPTIMIZATION OF PLACEMENT OF INFORMATION PROTECTION MEANS BASED ON THE APPLICATION OF A GENETIC ALGORITHM","authors":"V. Lakhno, Volodimir Maliukov, Larysa Komarova, D. Kasatkin, T.Yu. Osypova, Y. Chasnovskyi","doi":"10.28925/2663-4023.2022.17.620","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.17.620","url":null,"abstract":"the article considers the possibilities of modifying the genetic algorithm (GA) for solving the problem of selecting and optimizing the configurations of information protection means (IPR) for security circuits of information and communication systems (ICS). The scientific novelty of the work lies in the fact that in GA, as criteria for optimizing the composition of IPR, it is proposed to use the total value of risks from loss of information, as well as the integral indicator of IPR and cost indicators for each class of IPR. The genetic algorithm in the task of optimizing the selection of the composition of the IPR for ICS is considered as a variation of the problem associated with multiple selection. In such a statement, the optimization of the placement of IPR along the contours of ICS protection is considered as a modification of the combinatorial problem about the backpack. The GA used in the computing core of the decision support system (DSS) differs from the standard GA. As part of the GA modification, chromosomes are presented in the form of matrices, the elements of which are numbers that correspond to the numbers of the IPR in the ICS nodes. In the process of GA modification, k-point crossover was applied. The fitness function is represented as the sum of efficiency coefficients. At the same time, in addition to the traditional absolute indicators of the effectiveness of IPR, the total value of risks from loss of information, as well as cost indicators for each class of IPR are taken into account. The practical value of the research lies in the implementation of the DSS based on the proposed modification of the GA. Computational experiments on the selection of a rational software algorithm for the implementation of the model were performed. It is shown that the implementation of GA in DSS allows to speed up the search for optimal options for the placement of cyber security means (CS) for ICS by more than 25 times. This advantage allows not only to perform a quick review of various options of hardware and software IPR and their combinations for ICS, but also to further combine the proposed algorithm with existing models and algorithms for optimizing the composition of ICS cyber security circuits. Potentially, such a combination of models and algorithms will provide an opportunity to quickly rebuild ICS protection, adjusting its profiles in accordance with new threats and classes of cyberattacks.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":" 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113946133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STUDY OF APPLIED ASPECTS OF CONFLICT THEORY IN SECURITY SYSTEMS 安全系统中冲突理论应用方面的研究
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.18.150162
Svitlana Shevchenko, P. Skladannyi, O. Nehodenko, Vitalii Nehodenko
{"title":"STUDY OF APPLIED ASPECTS OF CONFLICT THEORY IN SECURITY SYSTEMS","authors":"Svitlana Shevchenko, P. Skladannyi, O. Nehodenko, Vitalii Nehodenko","doi":"10.28925/2663-4023.2022.18.150162","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.18.150162","url":null,"abstract":"The problem of conflicts and conflict situations has always been in the center of attention of scientists, first of all, sociologists. However, the current state of these theories includes a large number of currents in various fields of knowledge. We meet them in history, philosophy, psychology, jurisprudence, biology, medicine, pedagogy, cultural studies, economics, military affairs, technical systems, in particular in security and cyber security systems. In addition, there are attempts to apply a mathematical apparatus for modeling and solving certain issues in the decision-making process. This determines the relevance of this study, which is devoted to the analysis of ways of introducing the theoretical foundations of the theory of conflicts into the information security system. The article analyzes the views of scientists regarding the application of conflict theory in various sciences and disciplines. A review of literary sources in the context of the theory of conflicts in information systems was carried out, the definition of \"information conflict\" and its characteristics were highlighted. It is justified to carry out research through the interaction of the planes of the theory of conflict theory and the theory of information and cybernetic security in three perspectives: \"subject - subject\" or \"person - person\"; \"subject - object\" or \"man - machine\"; \"object - object\" or \"machine - machine\". To determine the main characteristics of conflicts in security systems, the general structure and stages of conflicts were highlighted. The structure of conflicts in security systems includes the definition of boundaries; state and activity variables; causal relationships and feedback; several interconnected subsystems; conflict delay (or conflict resolution). The following stages are distinguished in the dynamics of the conflict: emergence of a conflict situation; latent stage; active stage; stage of ending the conflict. In the process of conflict management in information security, the opportunity to apply analytical methods is outlined: differential equations, decision-making theory, operations research, and game theory.\u0000\u0000This study is an introduction to the theory of conflicts in security systems and can be used in the educational process of students of the specialty 125 Cybersecurity.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117232253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
COMPARATIVE ANALYSIS OF SOLUTIONS TO PROVIDE CONTROL AND MANAGEMENT OF PRIVILEGED ACCESS IN THE IT ENVIRONMENT 在it环境中提供特权访问控制和管理的解决方案的比较分析
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.16.98112
O. Romaniuk, P. Skladannyi, Svitlana Shevchenko
{"title":"COMPARATIVE ANALYSIS OF SOLUTIONS TO PROVIDE CONTROL AND MANAGEMENT OF PRIVILEGED ACCESS IN THE IT ENVIRONMENT","authors":"O. Romaniuk, P. Skladannyi, Svitlana Shevchenko","doi":"10.28925/2663-4023.2022.16.98112","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.16.98112","url":null,"abstract":"Abuse of privileges in the IT environment is defined as one of the threats to the information assets of the business at the present stage. The article examines and analyzes these problems, which are closely related to the leakage of information due to legitimate access to it and / or unauthorized access to it. Reports, research, acts, surveys at various enterprises contain a large amount of analytical and statistical materials that confirm the relevance and importance of this work. Based on the scientific literature, a review of key definitions on this issue, namely: characterized the definition of \"privileged access\"; the main examples of privileged access in the IT environment are considered; describes the risks and threats of information from attack vectors associated with privileged access to the IT environment. The mechanism for control and management of privileged access - RAM is presented, the steps of this process are highlighted and its expediency is substantiated. Experimental techniques allowed to choose the most applicable solutions of RAM: WALLIX Bastion PAM, One Identity Safeguard PAM, CyberArk PAM. The essence and functionality of each of these solutions are revealed. The advantages and disadvantages of each technology are established. As a result of research of technical and functional characteristics the comparative analysis of data of three decisions is carried out: obligatory components of the decision on control and management of privileged access are the manager of passwords and the manager of sessions (sessions), and additional - the module with analytics of privileged sessions and the access manager. use a VPN to access privileged assets. It can also be noted that the functionality of all products is very similar, so the implementation plays a big role, namely the practical approach during operation, internal algorithms, additional opportunities for integration and innovation. PAM solutions are recommended for organizations as a means to mitigate information security risks and threats due to insider activities of company employees who have privileged access to the IT environment.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114673872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
USE OF PSEUDO NOISE CODING SEQUENCE CYCLIC SHIFTS FOR TELECOMMUNICATION CHANNEL PERFORMANCE IMPROVEMENT 利用伪噪声编码序列循环移位改善电信信道性能
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2020.9.126139
O. Pliushch
{"title":"USE OF PSEUDO NOISE CODING SEQUENCE CYCLIC SHIFTS FOR TELECOMMUNICATION CHANNEL PERFORMANCE IMPROVEMENT","authors":"O. Pliushch","doi":"10.28925/2663-4023.2020.9.126139","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.9.126139","url":null,"abstract":"An approach is proposed to design of noise immune and concealed data transfer channel for telecommunication networks. Attention is paid to securing hidden information transmission, as well as its protection from interception by rogue actors. The approach is based on the desired bits spectrum spreading and their additional scrambling by using pseudo noise coding sequences derived from primitive polynomials of eighth and fifteenth orders, which possess good auto and inter correlation properties. It is studied performance of the telecommunication channel that includes frames of 128 bit length, each of which is spectrally spread 256 times with the help of a synthesized pseudo noise coding sequence. The second 32768 chip-long pseudo noise coding sequence is used to mark the frame duration and perform additional information scrambling.\u0000\u0000Computer simulation is used to study performance of the designed telecommunication channel. The computer simulation helped to establish that the processing of the additive mixture of the desired signal and interfering ones, which surpass the desired signal two times in terms of power, by the matched filters permits to confidently reveal the information frame structure being transmitted by determining frame beginning pulse and establish the bit values of the desired information. Further improvement of information protection from interception is proposed to achieve by using cyclic shifts of 32768 chip-long pseudo noise coding sequence. Computer simulation helped to find out that ignorance of the cyclic shift leads to inability of information interception by the rogue elements. Research results, obtained in this paper, permit to claim that the designed telecommunication channel, with cyclic shifts according to a secret rule, could be successfully used in practical implementations of noise immune and concealed telecommunication networks.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117187480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
APPROACH TO INFORMATION SECURITY RISK ASSESSMENT FOR A CLASS «1» AUTOMATED SYSTEM 一类自动化系统的信息安全风险评估方法
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2020.10.98112
I. Litvinchuk, Ruslan Korchomnyi, Nataliia Korshun, Maksym Vorokhob
{"title":"APPROACH TO INFORMATION SECURITY RISK ASSESSMENT FOR A CLASS «1» AUTOMATED SYSTEM","authors":"I. Litvinchuk, Ruslan Korchomnyi, Nataliia Korshun, Maksym Vorokhob","doi":"10.28925/2663-4023.2020.10.98112","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.10.98112","url":null,"abstract":"The article is devoted to the assessment of information security risks in automated systems of class \"1\". An adapted approach to the assessment of information security risks in such automated systems using the Methodology and requirements of the standards of GSTU SUIB 1.0 / ISO / IEC 27001: 2010 and GSTU SUIB 2.0 / ISO / IEC 27002: 2010 is proposed. The efficiency and methods of implementation of the approach are proved on the example of consideration of real threats and vulnerabilities of class 1 automated systems. The main requirement for the creation of information security management system in the organization is risk assessment and identification of threats to information resources that are processed in information and telecommunications systems and speakers. The basic standards on information security in Ukraine are considered, which give general recommendations for the construction and assessment of information security risks within the ISMS. The most common methods and methodologies for assessing information security risks of international standard are analyzed, their advantages and disadvantages are identified. The order of carrying out of works on an estimation of risks of information security of the AS of a class \"1\" is defined. The vulnerabilities considered by the expert according to the standard ISO/IEC 27002:2005 and the Methodology are given. A conditional scale for determining the impact on the implementation of threats to integrity, accessibility, observation is given. Measures and means of counteracting the emergence of threats are proposed. This approach can be used both for direct information risk assessment and for educational purposes. It allows to get the final result regardless of the experience and qualifications of the specialist who conducts risk assessment, with the subsequent implementation and improvement of the existing risk management system in the organization.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115253291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
APPROACHES TO THE CLASSIFICATION OF CYBERSOCIALITY OF MILITARY PERSONNEL ACCORDING TO THE DEGREE OF INTEGRATION IN CYBERSPACE AND POSSIBLE CONSEQUENCES 根据网络空间整合程度及可能后果分类军事人员网络社会性的方法
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2023.19.8395
I. Kozubtsov, L. Kozubtsova, O. Saenko, T. Tereshchenko
{"title":"APPROACHES TO THE CLASSIFICATION OF CYBERSOCIALITY OF MILITARY PERSONNEL ACCORDING TO THE DEGREE OF INTEGRATION IN CYBERSPACE AND POSSIBLE CONSEQUENCES","authors":"I. Kozubtsov, L. Kozubtsova, O. Saenko, T. Tereshchenko","doi":"10.28925/2663-4023.2023.19.8395","DOIUrl":"https://doi.org/10.28925/2663-4023.2023.19.8395","url":null,"abstract":"Modern achievements of science and technology have allowed a person to create not only computing equipment, but also to build a new virtual space \"cyberspace\". With the emergence of cyberspace, the process of cyber socialization of the individual began at the same time, complementing this property with the interaction and communication of a person with other people with the help of modern information and communication, computer, electronic and Internet technologies, which significantly expands the area of social relations and methods of joint activity, promotes direct mobile cooperation , significantly increasing the number of transactions over time, allows you to satisfy the need for communication, while ensuring relative psychophysical safety and comfort. The purpose of the article is to review the formation of the classification of cybersociality of servicemen according to the degree of integration of the individual in the cybersociety and the most likely consequences. Materials and methods. A collection of theoretical research methods is used to solve the tasks: analysis and generalization of scientific literature on the research problem: the method of going from the abstract to the concrete; the method of comparative analysis when evaluating the novelty of research results; synthesis and generalization – formulation of conclusions and recommendations regarding the continuation of further research. Research result. Known approaches to the classification of cybersociality of people according to the degree of integration of the individual in the cybersociety are considered. The most recognized classifications of people's cybersociality by the degree of integration of the individual in the cybersociety have been determined. Their semantic content is clarified. Based on the results of the analysis, the most likely classification of cyber-sociality of servicemen according to the degree of integration of the individual in the cyber-society is proposed. Probable levels of the greatest propensity of military personnel to violations in cyberspace are proposed. It has been established that cyber-socialized servicemen, depending on their internal motivational characteristics, can move from the category of defenders to the category of insiders. National security and cyber defense fundamentally depend on this. The scientific novelty lies in the fact that for the first time one of the possible classifications of cyber-sociality of military personnel has been proposed according to the degree of integration of the individual in cyber-society and cyberspace with the aim of further predicting probable cyber-security violations in the Armed Forces of Ukraine. The practical value of the study is the accumulation of statistical data on the grouping of military personnel according to the criteria of propensity for cyber socialization. Together with the possible consequences, predict the development of events in cyberspace. Prospects for further research. Theoretic","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126531199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信