2025-02-22T10:26:16-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: Query fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22drspiprikievua-article-211279%22&qt=morelikethis&rows=5
2025-02-22T10:26:16-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: => GET http://localhost:8983/solr/biblio/select?fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22drspiprikievua-article-211279%22&qt=morelikethis&rows=5
2025-02-22T10:26:16-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: <= 200 OK
2025-02-22T10:26:16-05:00 DEBUG: Deserialized SOLR response

Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats

The rapid introduction of information technology in all spheres of public activity creates many risks associated with different types of threats to information security. At the same time, special attention should be paid to ensuring protection from potential threats of critical infrastructure facili...

Full description

Saved in:
Bibliographic Details
Main Authors: Saliieva, O. V., Yaremchuk, Yu. Eu.
Format: Article
Language:Ukrainian
Published: Інститут проблем реєстрації інформації НАН України 2020
Subjects:
Online Access:http://drsp.ipri.kiev.ua/article/view/211279
Tags: Add Tag
No Tags, Be the first to tag this record!
id drspiprikievua-article-211279
record_format ojs
spelling drspiprikievua-article-2112792020-09-09T22:40:48Z Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats Визначення допустимої інтенсивності зниження рівня захищеності об’єкта критичної інфраструктури ранжуванням загроз Saliieva, O. V. Yaremchuk, Yu. Eu. інформаційна безпека загрози безпеці об’єкт критичної інфраструктури нечітке відношення нечітке транзитивне замикання information security security threats critical infrastructure object fuzzy relationship fuzzy transient circuit The rapid introduction of information technology in all spheres of public activity creates many risks associated with different types of threats to information security. At the same time, special attention should be paid to ensuring protection from potential threats of critical infrastructure facilities (CI), which provide vital services to the population, society and the state. Given the importance of this issue, a study was conducted to determine the l-characteristics of threats in relation to the allowable intensity of the reduction of the level of protection of the object of CI. Since this problem has a high degree of uncertainty and is subjective, the method of ranking threats based on the theory of fuzzy relations is used to solve it. To achieve this goal, a set of threats to the CI object was identified and the criteria in violation of which the corresponding threats are expressed. In addition, the degree of influence of these threats on certain criteria is established. This information was formalized in the form of a fuzzy relation of influence, which turns into a fuzzy relation of similarity and its transitive closure. As a result, the set of threats of the CI object was divided into classes that do not intersect and contain elements similar in degree of influence. A decomposition tree is constructed, which at each a-level the number of classes and the list of threats belonging to this class at each level. In proportion to the ranks, the l-characteristics of the threats of the object of CI in relation to the allowable intensity of the reduction of its level of protection are determined. The results of this study provide an opportunity to form requirements for the protection of the CI object in the probable implementation of threats with certain characteristics, which, in turn, will contribute to the implementation of necessary mechanisms to protect the studied objects with sufficient infrastructure capacity and resources threats to quickly recover lost features. Tabl.: 3. Fig.: 1. Refs: 10 titles. Здійснено ранжування загроз об’єкта критичної інфраструктури на основі транзитивного замикання нечіткого відношення схожості. Ступені впливу загроз на забезпечення доступності, цілісності, конфіденційності та достовірності інформації розраховані шляхом порівняння з найменшим впливом за шкалою Сааті. На основі визначених рангів здійснено розбиття множини загроз на класи еквівалентні за вагомістю, відповідно до яких побудовано дерево декомпозиції. Визначено -характеристики загроз відносно допустимої інтенсивності зниження рівня захищеності об’єкта критичної інфраструктури. Інститут проблем реєстрації інформації НАН України 2020-08-25 Article Article application/pdf http://drsp.ipri.kiev.ua/article/view/211279 10.35681/1560-9189.2020.22.2.211279 Data Recording, Storage & Processing; Vol. 22 No. 2 (2020); 63-76 Регистрация, хранение и обработка данных; Том 22 № 2 (2020); 63-76 Реєстрація, зберігання і обробка даних; Том 22 № 2 (2020); 63-76 1560-9189 uk http://drsp.ipri.kiev.ua/article/view/211279/211642 Авторське право (c) 2021 Реєстрація, зберігання і обробка даних
institution Data Recording, Storage & Processing
collection OJS
language Ukrainian
topic інформаційна безпека
загрози безпеці
об’єкт критичної інфраструктури
нечітке відношення
нечітке транзитивне замикання
information security
security threats
critical infrastructure object
fuzzy relationship
fuzzy transient circuit
spellingShingle інформаційна безпека
загрози безпеці
об’єкт критичної інфраструктури
нечітке відношення
нечітке транзитивне замикання
information security
security threats
critical infrastructure object
fuzzy relationship
fuzzy transient circuit
Saliieva, O. V.
Yaremchuk, Yu. Eu.
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
topic_facet інформаційна безпека
загрози безпеці
об’єкт критичної інфраструктури
нечітке відношення
нечітке транзитивне замикання
information security
security threats
critical infrastructure object
fuzzy relationship
fuzzy transient circuit
format Article
author Saliieva, O. V.
Yaremchuk, Yu. Eu.
author_facet Saliieva, O. V.
Yaremchuk, Yu. Eu.
author_sort Saliieva, O. V.
title Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
title_short Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
title_full Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
title_fullStr Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
title_full_unstemmed Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
title_sort determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
title_alt Визначення допустимої інтенсивності зниження рівня захищеності об’єкта критичної інфраструктури ранжуванням загроз
description The rapid introduction of information technology in all spheres of public activity creates many risks associated with different types of threats to information security. At the same time, special attention should be paid to ensuring protection from potential threats of critical infrastructure facilities (CI), which provide vital services to the population, society and the state. Given the importance of this issue, a study was conducted to determine the l-characteristics of threats in relation to the allowable intensity of the reduction of the level of protection of the object of CI. Since this problem has a high degree of uncertainty and is subjective, the method of ranking threats based on the theory of fuzzy relations is used to solve it. To achieve this goal, a set of threats to the CI object was identified and the criteria in violation of which the corresponding threats are expressed. In addition, the degree of influence of these threats on certain criteria is established. This information was formalized in the form of a fuzzy relation of influence, which turns into a fuzzy relation of similarity and its transitive closure. As a result, the set of threats of the CI object was divided into classes that do not intersect and contain elements similar in degree of influence. A decomposition tree is constructed, which at each a-level the number of classes and the list of threats belonging to this class at each level. In proportion to the ranks, the l-characteristics of the threats of the object of CI in relation to the allowable intensity of the reduction of its level of protection are determined. The results of this study provide an opportunity to form requirements for the protection of the CI object in the probable implementation of threats with certain characteristics, which, in turn, will contribute to the implementation of necessary mechanisms to protect the studied objects with sufficient infrastructure capacity and resources threats to quickly recover lost features. Tabl.: 3. Fig.: 1. Refs: 10 titles.
publisher Інститут проблем реєстрації інформації НАН України
publishDate 2020
url http://drsp.ipri.kiev.ua/article/view/211279
work_keys_str_mv AT saliievaov determinationofpermissiblereductionintensityofthelevelofsecurityforanobjectofcriticalinfrastructurebyrankingofthreats
AT yaremchukyueu determinationofpermissiblereductionintensityofthelevelofsecurityforanobjectofcriticalinfrastructurebyrankingofthreats
AT saliievaov viznačennâdopustimoííntensivnostíznižennârívnâzahiŝenostíobêktakritičnoíínfrastrukturiranžuvannâmzagroz
AT yaremchukyueu viznačennâdopustimoííntensivnostíznižennârívnâzahiŝenostíobêktakritičnoíínfrastrukturiranžuvannâmzagroz
first_indexed 2024-04-21T19:34:14Z
last_indexed 2024-04-21T19:34:14Z
_version_ 1796974109118169088