METHODS OF CYBER SECURITY ASSESSMENT IN THE SPECIAL PURPOSE INFORMATION AND TELECOMMUNICATIONS SYSTEM
DOI:
https://doi.org/10.26906/SUNZ.2020.4.109Keywords:
cyberspace, cyberattacks, protection, cybersecurity, state security, information and telecommunication networks, artificial intelligenceAbstract
To increase the effectiveness of the fight against cybercrime, developed countries have begun the relevant work to increase the security of their own information and telecommunications networks of general and special purpose. Current global trends in the spread of cybercrime and the intensification of cyberattacks indicate the growing importance of combating it for the further development of society, which in turn leads to the attribution of certain groups of public relations of the cybersphere to the competence of legal regulation. The current situation with cybercrime requires constant improvement of methods of combating cybercrime, development of information systems and methods aimed at ensuring cybersecurity in the country. That is why the authors of this article developed a method for assessing cybersecurity in a special purpose information and telecommunications system. During the research, the authors used the main provisions of communication theory, queuing theory, artificial intelligence, as well as general scientific methods of analysis and synthesis. The difference between the proposed method from the known ones, which determines its novelty, is the possibility of: detection and qualitative interpretation of cyber threats; modeling scenarios of extreme situations caused by the implementation of cyber threats; assessment of risks that have the characteristics of several classes and ranking of assets of the information and telecommunications system according to the degree of their criticality; perform an assessment of the number of critically vulnerable assets of the information and telecommunications system; substantiate the composition and probability of cyber threats that can cause extreme situations in the information and telecommunications system; conducting risk assessment of their implementation in the information and telecommunications system. The practical significance of the proposed method is fatigue, that its application allows to automate the process of analysis of cyber threats and risk assessment of cybersecurity of information and telecommunications system
Downloads
References
Shyshatskiy, A.V., Bashkirov, O.M. and Kostina, O.M (2015). “Development of integrated systems and data for Armed Forces”, Arms and military equipment, No 1(5), pp. 35-40. available at : http://journals.uran.ua/index.php/2414-0651/issue/view/1%285%29%202015 (last accessed november 5, 2019).
Zhuk, O.G., Shyshatskiy, A.V., Zhuk, P.V. and Zhyvotovskyi, R.M (2017). “Methodological substances of management of the radio-resource managing systems of military radio communication”, Information Processing Systems, Vol. 5(151), pp. 16-25. https://doi.org/10.30748/soi.2017.151.02.
Romanenko, I. and Shyshatskyi, A (2017). “Analysis of modern condition of military radiocommunication system”, Advanced Information Systems, Vol. 1, No. 1, pp. 28-33, DOI: https://doi.org/10.20998/2522-9052.2017.1.05.
AJP-6: Allied Joint Doctrine for Communication and Information System [Electronic Resource]. – Mode of access: https://www.gov.uk/goverment/uploads/system/uploads/attachment_data/file/200016/20110401-ajp6_cis_secured.pdf.
AAP-31: NATO Glossary of Communication and Information Systems Terms and Definitions (November 2001). – 119 p.
AJP-5: Allied Joint Doctrine for Operational-level Planning – 2013. – 299p.
NATO Glossary of Terms and Definitions: AAP-6 [Edition 2018]. – NATO Standardization Agency, 2018. – 2019 р.
Electronic Warfare Planning and Management Tool (EWPMT). United States Army Acquisition Support Center. 2016. available at: http://asc.army.mil/web/portfolio-item/iews-electronic-warfare-planning-and-manage ment-tool-ewpmt/ (last accessed august 25, 2020).
Pоpоv, А.О. and Tverdokhlibov, V.V(2014). “General tendencies of development of means of electronic warfare ”, Arms and military equipment, No. 4 (4), pp. 4-10.
Shyshatskiy, A., Kalantaievska, S., Malyk, O., Tiurnikov, M., Zhuk, P. and Pikul, R(2019). “Foundation the ways of radio electronic warfare devices development”. Advanced information systems. No. 3(2). pp. 98-103.
Romanenko, І. О., Shyshatskyi, A.V., Zhyvotovskyi, R. M. and Petruk, S.M (2017). “The concept of the organization of interaction of elements of military radio communication systems”. Science and Technology of the Air Force of the Armed Forces of Ukraine. No 1. pp. 97-100.
Salnik, S.V., Salnik, V.V., Sova, O. Ya. and Stampkovskaya, Ya.A (2016). “Model of invasion of mobile radio networks of the class MANET”. Proceedings of Kharkiv National University of the Air Force. No.(46). pp. 79-84.
Salnik, S.V., Salnik, V.V., Simonenko, O.A. and Sova, O. Ya(2015). “A method for detecting intrusions into mobile radio networks based on neural networks”. Science and Technology of the Air Force of the Armed Forces of Ukraine. No. 4(21). Pp. 82-90.
Kravchuk, S.A., Minochkin, D.A. and Sova, O. Ya(2013). “Analysis of directions of increasing the efficiency of functioning of modern satellite communication systems”. Science and Technology of the Air Force of the Armed Forces of Ukraine. No. 2(11). Pp. 140-147.