一种评估关键信息基础设施重要对象免遭未经授权访问安全性的综合方法

Viktor M. Belov, Evgeniy N. Pivkin, Anastasia A. Ardaeva
{"title":"一种评估关键信息基础设施重要对象免遭未经授权访问安全性的综合方法","authors":"Viktor M. Belov, Evgeniy N. Pivkin, Anastasia A. Ardaeva","doi":"10.17212/2782-2230-2022-1-9-26","DOIUrl":null,"url":null,"abstract":"The number of cybersecurity events in the modern world has increased significantly, of which a significant number fall on objects of critical information infrastructure. This paper discusses the main requirements for models for assessing the security of significant objects of critical information infrastructure from unauthorized access, classification of ambiguous source information, a generalized algorithm for assessing the level of security of significant objects of critical information infrastructure from unauthorized access, a fuzzy model for assessing the level of security using point and linguistic scales. It also determines the procedure for assessing the security of significant objects of critical information infrastructure from unauthorized access. Among the main requirements for models for assessing the security of significant objects of critical information infrastructure from unauthorized access are the following: versatility, extensibility, formalizability, simplicity, multifactoriality. The generalized algorithm for assessing the level of security of significant objects of critical information infrastructure from unauthorized access includes four computational blocks: in block 1, the collection and primary processing of information is carried out; in block 2, calculations using fuzzy evaluation algorithms with linguistic and point scales are used; in block 3, the effectiveness of information security employees is evaluated; in block 4, the levels of security of significant objects of critical information infrastructure from unauthorized access are predicted using fuzzy time series; in block 5, the estimates obtained at previous stages of calculations are examined using data processing techniques and draw appropriate conclusions for decision-making.","PeriodicalId":207311,"journal":{"name":"Digital Technology Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An integrated approach to assessing the security of significant objects of critical information infrastructure from unauthorized access\",\"authors\":\"Viktor M. Belov, Evgeniy N. Pivkin, Anastasia A. Ardaeva\",\"doi\":\"10.17212/2782-2230-2022-1-9-26\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The number of cybersecurity events in the modern world has increased significantly, of which a significant number fall on objects of critical information infrastructure. This paper discusses the main requirements for models for assessing the security of significant objects of critical information infrastructure from unauthorized access, classification of ambiguous source information, a generalized algorithm for assessing the level of security of significant objects of critical information infrastructure from unauthorized access, a fuzzy model for assessing the level of security using point and linguistic scales. It also determines the procedure for assessing the security of significant objects of critical information infrastructure from unauthorized access. Among the main requirements for models for assessing the security of significant objects of critical information infrastructure from unauthorized access are the following: versatility, extensibility, formalizability, simplicity, multifactoriality. The generalized algorithm for assessing the level of security of significant objects of critical information infrastructure from unauthorized access includes four computational blocks: in block 1, the collection and primary processing of information is carried out; in block 2, calculations using fuzzy evaluation algorithms with linguistic and point scales are used; in block 3, the effectiveness of information security employees is evaluated; in block 4, the levels of security of significant objects of critical information infrastructure from unauthorized access are predicted using fuzzy time series; in block 5, the estimates obtained at previous stages of calculations are examined using data processing techniques and draw appropriate conclusions for decision-making.\",\"PeriodicalId\":207311,\"journal\":{\"name\":\"Digital Technology Security\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-03-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Digital Technology Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.17212/2782-2230-2022-1-9-26\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Digital Technology Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17212/2782-2230-2022-1-9-26","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

现代世界的网络安全事件数量显著增加,其中很大一部分落在关键信息基础设施的对象上。本文讨论了关键信息基础设施重要对象未经授权访问安全评估模型的主要要求、模糊源信息的分类、关键信息基础设施重要对象未经授权访问安全评估的广义算法、使用点尺度和语言尺度的安全评估模糊模型。它还确定了评估关键信息基础设施重要对象免遭未经授权访问的安全性的程序。评估关键信息基础设施的重要对象免受未经授权访问的安全性的模型的主要需求如下:多功能性、可扩展性、形式化、简单性和多因素性。关键信息基础设施重要对象免遭未经授权访问安全等级评估的广义算法包括四个计算块:第一块进行信息的收集和初步处理;在block 2中,使用带有语言和点尺度的模糊评价算法进行计算;在区块3中,评估信息安全员工的有效性;在block 4中,使用模糊时间序列预测关键信息基础设施的重要对象免受未经授权访问的安全级别;在第5块,使用数据处理技术审查在前几个计算阶段获得的估计数,并为决策得出适当的结论。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An integrated approach to assessing the security of significant objects of critical information infrastructure from unauthorized access
The number of cybersecurity events in the modern world has increased significantly, of which a significant number fall on objects of critical information infrastructure. This paper discusses the main requirements for models for assessing the security of significant objects of critical information infrastructure from unauthorized access, classification of ambiguous source information, a generalized algorithm for assessing the level of security of significant objects of critical information infrastructure from unauthorized access, a fuzzy model for assessing the level of security using point and linguistic scales. It also determines the procedure for assessing the security of significant objects of critical information infrastructure from unauthorized access. Among the main requirements for models for assessing the security of significant objects of critical information infrastructure from unauthorized access are the following: versatility, extensibility, formalizability, simplicity, multifactoriality. The generalized algorithm for assessing the level of security of significant objects of critical information infrastructure from unauthorized access includes four computational blocks: in block 1, the collection and primary processing of information is carried out; in block 2, calculations using fuzzy evaluation algorithms with linguistic and point scales are used; in block 3, the effectiveness of information security employees is evaluated; in block 4, the levels of security of significant objects of critical information infrastructure from unauthorized access are predicted using fuzzy time series; in block 5, the estimates obtained at previous stages of calculations are examined using data processing techniques and draw appropriate conclusions for decision-making.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信