Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
With the development of information technology (IT) and convergence between IT and operation technology (OT), an important aspect of the stability of critical systems has become the provision of cybersecurity of critical information infrastructure. To protect the information, the legislation of Ukra...
Збережено в:
Дата: | 2021 |
---|---|
Автори: | , |
Формат: | Стаття |
Мова: | Ukrainian |
Опубліковано: |
Інститут проблем реєстрації інформації НАН України
2021
|
Теми: | |
Онлайн доступ: | http://drsp.ipri.kiev.ua/article/view/265714 |
Теги: |
Додати тег
Немає тегів, Будьте першим, хто поставить тег для цього запису!
|
Назва журналу: | Data Recording, Storage & Processing |
Репозитарії
Data Recording, Storage & ProcessingРезюме: | With the development of information technology (IT) and convergence between IT and operation technology (OT), an important aspect of the stability of critical systems has become the provision of cybersecurity of critical information infrastructure. To protect the information, the legislation of Ukraine provides determines for the construction usage of comprehensive complex information security protection systems and information security management systems. However, for critical systems such approaches mostly generalized. When designing critical systems, considerable attention paid to meeting the requirements for reliability and quality at each stage. At the same time, the influence of internal and external factors on the functioning of such systems and their probabilistic characteristics sometimes left without proper attention. The study is devoted to the possible consequences of the failure of such systems (significant tangible and intangible losses), to take into account the possible impact of uncertainty on the results of their work (risk), a method of using predicate logic to create relationships of artifacts. The source of data for the verification of artefacts during modernization are the processes of audit of information security management systems or state examination of complex information security systems. Given that, the logic of predicates used to develop an algorithm for finding common factors, conditions, consequences for many objects, which include single artifacts and create relationships between single and grouped artifacts.The essence of the proposed method of verifying artefacts using predicate logic is that each element of the system (hardware, software and hardware component, etc.) has a certain vulnerability associated with violations of its properties. This will simplify the automation of protection processes and will significantly increase the efficiency of existing information security mechanisms.Therefore, the developed approach to the security artifacts verification using predicate logic can be successfully applied for relaxation the verification process complexity using automation tools. In future studies, expansion and prioritization of existing chains can significantly improve the results of risk analysis and classification of critical information infrastructure facilities by maturity level. |
---|