2025-02-22T10:26:16-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: Query fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22drspiprikievua-article-211279%22&qt=morelikethis&rows=5
2025-02-22T10:26:16-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: => GET http://localhost:8983/solr/biblio/select?fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22drspiprikievua-article-211279%22&qt=morelikethis&rows=5
2025-02-22T10:26:16-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: <= 200 OK
2025-02-22T10:26:16-05:00 DEBUG: Deserialized SOLR response
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
The rapid introduction of information technology in all spheres of public activity creates many risks associated with different types of threats to information security. At the same time, special attention should be paid to ensuring protection from potential threats of critical infrastructure facili...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | Ukrainian |
Published: |
Інститут проблем реєстрації інформації НАН України
2020
|
Subjects: | |
Online Access: | http://drsp.ipri.kiev.ua/article/view/211279 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
drspiprikievua-article-211279 |
---|---|
record_format |
ojs |
spelling |
drspiprikievua-article-2112792020-09-09T22:40:48Z Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats Визначення допустимої інтенсивності зниження рівня захищеності об’єкта критичної інфраструктури ранжуванням загроз Saliieva, O. V. Yaremchuk, Yu. Eu. інформаційна безпека загрози безпеці об’єкт критичної інфраструктури нечітке відношення нечітке транзитивне замикання information security security threats critical infrastructure object fuzzy relationship fuzzy transient circuit The rapid introduction of information technology in all spheres of public activity creates many risks associated with different types of threats to information security. At the same time, special attention should be paid to ensuring protection from potential threats of critical infrastructure facilities (CI), which provide vital services to the population, society and the state. Given the importance of this issue, a study was conducted to determine the l-characteristics of threats in relation to the allowable intensity of the reduction of the level of protection of the object of CI. Since this problem has a high degree of uncertainty and is subjective, the method of ranking threats based on the theory of fuzzy relations is used to solve it. To achieve this goal, a set of threats to the CI object was identified and the criteria in violation of which the corresponding threats are expressed. In addition, the degree of influence of these threats on certain criteria is established. This information was formalized in the form of a fuzzy relation of influence, which turns into a fuzzy relation of similarity and its transitive closure. As a result, the set of threats of the CI object was divided into classes that do not intersect and contain elements similar in degree of influence. A decomposition tree is constructed, which at each a-level the number of classes and the list of threats belonging to this class at each level. In proportion to the ranks, the l-characteristics of the threats of the object of CI in relation to the allowable intensity of the reduction of its level of protection are determined. The results of this study provide an opportunity to form requirements for the protection of the CI object in the probable implementation of threats with certain characteristics, which, in turn, will contribute to the implementation of necessary mechanisms to protect the studied objects with sufficient infrastructure capacity and resources threats to quickly recover lost features. Tabl.: 3. Fig.: 1. Refs: 10 titles. Здійснено ранжування загроз об’єкта критичної інфраструктури на основі транзитивного замикання нечіткого відношення схожості. Ступені впливу загроз на забезпечення доступності, цілісності, конфіденційності та достовірності інформації розраховані шляхом порівняння з найменшим впливом за шкалою Сааті. На основі визначених рангів здійснено розбиття множини загроз на класи еквівалентні за вагомістю, відповідно до яких побудовано дерево декомпозиції. Визначено -характеристики загроз відносно допустимої інтенсивності зниження рівня захищеності об’єкта критичної інфраструктури. Інститут проблем реєстрації інформації НАН України 2020-08-25 Article Article application/pdf http://drsp.ipri.kiev.ua/article/view/211279 10.35681/1560-9189.2020.22.2.211279 Data Recording, Storage & Processing; Vol. 22 No. 2 (2020); 63-76 Регистрация, хранение и обработка данных; Том 22 № 2 (2020); 63-76 Реєстрація, зберігання і обробка даних; Том 22 № 2 (2020); 63-76 1560-9189 uk http://drsp.ipri.kiev.ua/article/view/211279/211642 Авторське право (c) 2021 Реєстрація, зберігання і обробка даних |
institution |
Data Recording, Storage & Processing |
collection |
OJS |
language |
Ukrainian |
topic |
інформаційна безпека загрози безпеці об’єкт критичної інфраструктури нечітке відношення нечітке транзитивне замикання information security security threats critical infrastructure object fuzzy relationship fuzzy transient circuit |
spellingShingle |
інформаційна безпека загрози безпеці об’єкт критичної інфраструктури нечітке відношення нечітке транзитивне замикання information security security threats critical infrastructure object fuzzy relationship fuzzy transient circuit Saliieva, O. V. Yaremchuk, Yu. Eu. Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats |
topic_facet |
інформаційна безпека загрози безпеці об’єкт критичної інфраструктури нечітке відношення нечітке транзитивне замикання information security security threats critical infrastructure object fuzzy relationship fuzzy transient circuit |
format |
Article |
author |
Saliieva, O. V. Yaremchuk, Yu. Eu. |
author_facet |
Saliieva, O. V. Yaremchuk, Yu. Eu. |
author_sort |
Saliieva, O. V. |
title |
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats |
title_short |
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats |
title_full |
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats |
title_fullStr |
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats |
title_full_unstemmed |
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats |
title_sort |
determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats |
title_alt |
Визначення допустимої інтенсивності зниження рівня захищеності об’єкта критичної інфраструктури ранжуванням загроз |
description |
The rapid introduction of information technology in all spheres of public activity creates many risks associated with different types of threats to information security. At the same time, special attention should be paid to ensuring protection from potential threats of critical infrastructure facilities (CI), which provide vital services to the population, society and the state. Given the importance of this issue, a study was conducted to determine the l-characteristics of threats in relation to the allowable intensity of the reduction of the level of protection of the object of CI. Since this problem has a high degree of uncertainty and is subjective, the method of ranking threats based on the theory of fuzzy relations is used to solve it. To achieve this goal, a set of threats to the CI object was identified and the criteria in violation of which the corresponding threats are expressed. In addition, the degree of influence of these threats on certain criteria is established. This information was formalized in the form of a fuzzy relation of influence, which turns into a fuzzy relation of similarity and its transitive closure. As a result, the set of threats of the CI object was divided into classes that do not intersect and contain elements similar in degree of influence. A decomposition tree is constructed, which at each a-level the number of classes and the list of threats belonging to this class at each level. In proportion to the ranks, the l-characteristics of the threats of the object of CI in relation to the allowable intensity of the reduction of its level of protection are determined. The results of this study provide an opportunity to form requirements for the protection of the CI object in the probable implementation of threats with certain characteristics, which, in turn, will contribute to the implementation of necessary mechanisms to protect the studied objects with sufficient infrastructure capacity and resources threats to quickly recover lost features. Tabl.: 3. Fig.: 1. Refs: 10 titles. |
publisher |
Інститут проблем реєстрації інформації НАН України |
publishDate |
2020 |
url |
http://drsp.ipri.kiev.ua/article/view/211279 |
work_keys_str_mv |
AT saliievaov determinationofpermissiblereductionintensityofthelevelofsecurityforanobjectofcriticalinfrastructurebyrankingofthreats AT yaremchukyueu determinationofpermissiblereductionintensityofthelevelofsecurityforanobjectofcriticalinfrastructurebyrankingofthreats AT saliievaov viznačennâdopustimoííntensivnostíznižennârívnâzahiŝenostíobêktakritičnoíínfrastrukturiranžuvannâmzagroz AT yaremchukyueu viznačennâdopustimoííntensivnostíznižennârívnâzahiŝenostíobêktakritičnoíínfrastrukturiranžuvannâmzagroz |
first_indexed |
2024-04-21T19:34:14Z |
last_indexed |
2024-04-21T19:34:14Z |
_version_ |
1796974109118169088 |