Information-telecommunication system, conceptual model of cyberspace and cybersecurity

Ihor Yakoviv


The semantic uncertainties between the basic concepts in the field of cybersecurity significantly narrow the range and reduce the effectiveness of scientific research on methods of analysis and forecasting, for example, APT cyberattacks or the development of security complexes based on formal models of proof their effectiveness. The direction of the possible overcoming of the problem is the development of a conceptual model of cyberspace and cybersecurity, which reduces the level of possible uncertainties in describing various complex situations in cyberspace due to the use of special tools terminology, graphics, and mathematical formalization. The beginning of the research - the selected statement: the physical basis of cyberspace are information and telecommunication systems (ITS). The analysis of the information processes of such systems was carried out on the basis of the attributive-transfer approach to the essence of information. It defines “information” how to get the properties (attributes) of the object, reflecting the properties of another object. Electronic devices and physical environments for signal transmission constitute the technological basis of the ITS. Discrete electronic and electromagnetic signals circulating between electronic devices allow the formation of information, transform it and transmit it in space at different distances. Through various sets of electronic devices and signals in the ITS, various information processing technologies are implemented. They provide ITS users with various information services. Users of ITS can be people or technical systems (devices). According to the results of the analysis, a conceptual model of cyberspace and cybersecurity has been developed. The model consists of: 1) a set of interconnected basic terms that reflect the essence of information processes in the ITS. Due to these terms, synthesized definitions for the terms “cyberspace” and “cybersecurity”; 2) graphic model of cyberspace, which explains the ratio of its components; 3) mathematical model of cyberspace is a collection of mathematical constructions based on the theory of sets that specify the nature of the relationship between components of cyberspace. Cyberspace models have developed mathematical cybersecurity criteria for the cyberspace segment. The model also makes it possible to significantly simplify the process of analyzing APT attacks or complex security processes in cyberspace.


APTs research; information-telecommunication system; cyberspace, cybersecurity; semantic uncertainty of terms; conceptual model of cyberspace; information relations in cyberspace; formal cybersecurity criteria; scenario analysis of APTs.


International Organization for Standardization. (2012, July 16). ISO/IEC 27032:2012. Information technology. Security techniques. Guidelines for cybersecurity.

F. Kramer, S. Starr, and L. Wentz, Сyberpower and National Security. Washington, USA: Potomac Books, 2009.

J.B. Sheldon, “Deciphering cyberpower strategic purpose in peace and war”, Strategic Studies Quarterly, vol. 5, no. 2, pp. 95-112, 2011.

D.V. Dubov, Cyberspace as a new dimension of geopolitical rivalry. Kyiv, Ukraine: NISD, 2014.

Verkhovna Rada of Ukraine. 2nd session. (1994, July 05). Law of Ukraine № 80/94-ВР, On the protection of information in information and telecommunication systems. [Online]. Available: Accessed on: Aug. 21, 2017.

I.B. Yakoviv, “Communication channel from positions of the attributive-transfer entity of information”, Information Technology and Security, vol. 1, iss. 2, pp. 84-96, 2012.

Verkhovna Rada of Ukraine. 7th session. (2017, Okt. 05). Law of Ukraine № 2163-19, About the basic principles of providing cyber security of Ukraine. [Online]. Available: Accessed on: Aug. 21, 2017.

P. Chen, “Chapter 5. A study on Advanced Persistent Threats”, in Communications and Multimedia Security, L. Desmet, and C. Huygens, Eds. Leuven, Belgium: iMinds-DistriNet, 2014, pp. 63-72.

I.B. Yakoviv, “The base model of informational processes of management and safety criteria for cybernetic systems”, Information Technology and Security, vol. 3, iss. 1, pp. 68-73,

D. Schatz, R. Bashroush, and J. Wall, “Towards a More Representative Definition of Cyber Security”, Journal of Digital Forensics, Security and Law, vol. 12 (2). [Online]. Available: Accessed on: Aug. 21, 2017.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

ISSN 2411-1031 (Print), ISSN 2518-1033 (Online)