Conceptual model of information protection of critical information infrastructure objects of Ukraine

Authors

  • Yuliia Kozhedub Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv, Ukraine https://orcid.org/0000-0001-6181-5519
  • Serhii Vasylenko Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv, Ukraine https://orcid.org/0000-0001-6779-8246
  • Andrii Maksymets Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv, Ukraine https://orcid.org/0000-0003-3551-0628
  • Vira Hyrda Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv, Ukraine https://orcid.org/0000-0002-3858-4086

DOI:

https://doi.org/10.20535/2411-1031.2021.9.2.249889

Keywords:

information security model, object of critical information structure, information security threats, protection measures, information security status assessment matrix

Abstract

The problem of the information protection sphere – the choice of the information protection model at the critical information infrastructure objects of Ukraine is investigated. An analysis of modern models for the protection of computer systems and networks that form the basis of critical information infrastructure objects was carried out. These models consider the specific features of their operation. They make it possible to assess different scenarios of information security events, to analyze the state of computer systems and networks that are part of the critical information infrastructure objects. They are designed to simulate the actions of the attacker. The presented models of protection with reservations can be used during the development of the architecture for the protection system of critical information infrastructure objects. The schemes which can be used to design the information protection model architecture of critical information infrastructure objects have resulted. Particular attention is paid to issues related to the peculiarities of information security threats and shows the ways of their formation This analysis is appropriate for choosing the means of information protection circulating in computer systems and networks of critical information infrastructure objects. The reasons and conditions for the formation of information security threats are important, they are a source of valuable information for establishing a basic and additional set of information security tools. The main and additional means of protection are established unconditionally for the information protection models of critical information infrastructure objects. The basis for their implementation is the matrix of information security assessment for objects of critical information infrastructure, compiled with the help of expert assessment. The components of the objects of the critical information infrastructure information protection model are determined. It consists of three components: information security threats, information infrastructure elements, and protection measures, which in turn are divided into basic and additional. The relationship of the model components is formalized with the help of a matrix. The formulaic form of the model is presented, where its elements are the probabilities arising from the influential effect of information security threats on the elements of the information infrastructure. These probabilities are established by an expert method. Sets of conditions for the influence of (external and internal) factors, states (working and emergency) functioning, the structure of elements of critical information infrastructure objects are formulated. This important information is ultimately a linguistic description of the requirements for creating an information protection model of critical information infrastructure objects.

Author Biographies

Yuliia Kozhedub, Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv

candidate of technical sciences, senior researcher of the scientific-organizational department of the scientific-research center

Serhii Vasylenko, Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv

candidate of technical sciences, head of the scientific-research laboratory of the scientific-research center

Andrii Maksymets, Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv

senior engineer of the scientific-research laboratory of the scientific-research center

Vira Hyrda, Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv

senior engineer of the scientific-organizational department of the scientific-research center

References

KPI and two other Kyiv universities have joined the USAID Cyber Security Project. [Online]. Available: https://kpi.ua/2021-05-21. Accessed on: Sept. 4, 2021.

A. Wenger, V. Mauer and M. Cavelty, International critical information infrastructure protection handbook 2008–2009, Eds. Center for Security Studies, ETH Zurich, 2009.

National Institute of Standards and Technology. (2018, Apr. 16). Framework for Improving Critical Infrastructure Cybersecurity. Ver. 1.1. [Online]. Available: https://doi.org/10.6028/NIST.CSWP.04162018. Accessed on: Sept. 4, 2021.

Ukraine’s national security strategy in the context of the experience of the world community. Coll. art. for mater. int. conf. Kyiv: SATSANGA, 2001.

O. Dovhan, “Critical infrastructure as an object of protection against cyber-attacks”, on scientific-practical conf. Information security: challenges and threats of modernity. Kyiv, 2013, pp. 17-20.

S. Honchar, G. Leonenko, and O. Yudin, “Theoretical and methodological aspect of information security of critical infrastructure facilities”, Bulletin of Lviv Polytechnic National University. Computer Systems and Networks, № 806, 2014, pp. 34-39.

E. Galkova, “Dynamic model of information protection in an attempt to raid a credit and financial institution”, dis. cand. sciences, St. Pet. nat. res. un. of inform. tech. mechanics and optics, 2014.

D. Korolev, and M. Korolev, Information systems in banking. Belgorod: BelSU Publ. House, 2004.

J.-S. Chang, Y.-H. Jeon, and S. Sim, “Information Security Modeling for the Operation of a Novel Highly Trusted Network in a Virtualization Environment”. [Online]. Available: https://doi.org/10.1155/2015/359170. Accessed on: Sept. 4, 2021.

Y. Lee, “Information Security Investment Model and Level in Incomplete Information”, [Online]. Available: https://doi.org/10.13089/JKIISC.2017.27.4.855. Accessed on: Sept. 4, 2021.

C. K. Wong, S. B. Maynard, A. Ahmad, and H. Naseer, “Information Security Governance: A Process Model and Pilot Case Study”. [Online]. Available: https://aisel.aisnet.org/icis2020/cyber_security_privacy/cyber_security_privacy/3/. Accessed on: Sept. 4, 2021.

Department of Homeland Security. (2002, Nov. 25). The Critical Infrastructure Information Act of 2002. [Online]. Available: https://www.dhs.gov/publication/critical-infrastructure-information-act/. Accessed on: Sept. 4, 2021.

National Institute of Standards and Technology (NIST). Computer Security Resource Center (CSRC). (2008, July 25). SP 800-123, Guide to General Server Security. [Online]. Available: https://csrc.nist.gov/publications/detail/sp/800-123/final. Accessed on: Sept. 4, 2021.

T. Dalzell, The Routledge Dictionary of Modern American Slang and Unconventional English, 2009. [Online]. Available: https://books.google.com.ua/books?id=5F-YNZRv-VMC&pg=PA595&redir_esc=y#v=onepage&q&f=false. Accessed on: Sept. 4, 2021.

E. Partridge, T. Dalzell, T. Victor, The Concise New Partridge Dictionary of Slang, Psychology Press, 2007.

E. Derbin, and S. Klimov, Organizational framework for information security of the enterprise. Moscow: Fin. Un., 2013.

A. Nosarev, “Models in Information Security” [Online]. Available: https://habr.com/ru/post/467269/. Accessed on: Sept. 4, 2021.

A. Vozniuk, A. Krieger, and G. Tumurov, “Model of organization of information protection at the enterprise”. [Online]. Available: https://storage.tusur.ru/files/36680. Accessed on: Sept. 4, 2021.

A. Zagorodnikov, and S. Kozlov, “Information Protection Model”, in Proc. Conf. participation GPO TUSUR, 2014. [Online]. Available: https://gpoconference.tusur.ru/conference/2014/themes/99/projects/571/discourses/653. Accessed on: Sept. 4, 2021.

Published

2021-12-30

How to Cite

Kozhedub, Y., Vasylenko, S., Maksymets, A., & Hyrda, V. (2021). Conceptual model of information protection of critical information infrastructure objects of Ukraine. Collection "Information Technology and Security", 9(2), 151–164. https://doi.org/10.20535/2411-1031.2021.9.2.249889

Issue

Section

INFORMATION SECURITY