{"title":"关键基础设施中计算机网络固有的风险评估","authors":"S. V. Balakin, B. Dolintse","doi":"10.18372/2073-4751.70.16840","DOIUrl":null,"url":null,"abstract":"This work is devoted to the problem of risk assessment in computer networks that are inherent in critical infrastructures. The work shows the place of the risk assessment process in the global risk management process, as well as its goals, content and objectives. The most important infrastructure nodes and their interrelations are considered. The system of security indicators proposed for risk assessment in computer networks of critical infrastructures. Aspects of risk management of exceeding critical state variables of the threshold values of the crisis range for the object's information technology infrastructure are considered. The main research methods included structural and system analysis. The authors identified the main security threats in automated control systems, and also proposed methods for calculating their stability.","PeriodicalId":315156,"journal":{"name":"Problems of Informatization and Management","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Risk assessment in computer networks inherent in critical infrastructures\",\"authors\":\"S. V. Balakin, B. Dolintse\",\"doi\":\"10.18372/2073-4751.70.16840\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This work is devoted to the problem of risk assessment in computer networks that are inherent in critical infrastructures. The work shows the place of the risk assessment process in the global risk management process, as well as its goals, content and objectives. The most important infrastructure nodes and their interrelations are considered. The system of security indicators proposed for risk assessment in computer networks of critical infrastructures. Aspects of risk management of exceeding critical state variables of the threshold values of the crisis range for the object's information technology infrastructure are considered. The main research methods included structural and system analysis. The authors identified the main security threats in automated control systems, and also proposed methods for calculating their stability.\",\"PeriodicalId\":315156,\"journal\":{\"name\":\"Problems of Informatization and Management\",\"volume\":\"53 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Problems of Informatization and Management\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.18372/2073-4751.70.16840\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Problems of Informatization and Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18372/2073-4751.70.16840","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Risk assessment in computer networks inherent in critical infrastructures
This work is devoted to the problem of risk assessment in computer networks that are inherent in critical infrastructures. The work shows the place of the risk assessment process in the global risk management process, as well as its goals, content and objectives. The most important infrastructure nodes and their interrelations are considered. The system of security indicators proposed for risk assessment in computer networks of critical infrastructures. Aspects of risk management of exceeding critical state variables of the threshold values of the crisis range for the object's information technology infrastructure are considered. The main research methods included structural and system analysis. The authors identified the main security threats in automated control systems, and also proposed methods for calculating their stability.