The base model of informational processes of management and safety criteria for cybernetic systems

Authors

  • Igor Yakoviv Institute of Special Communication and Information Protection of National Technical University of Ukraine «Kyiv Polytechnic Institute», Kyiv,

DOI:

https://doi.org/10.20535/2411-1031.2015.3.1.57735

Abstract

Actual is the task of the development of universal tools formalized analysis of complex vulnerabilities of information systems processes of different physical nature. The article proposed a model of the information processes of a cybernetic system. The article also presents mathematical expressions that describe the essence of security of cyber systems and formal criteria for this security.

Keywords: security of cyber systems, information process, vulnerability analysis, security criteria.

Author Biography

Igor Yakoviv, Institute of Special Communication and Information Protection of National Technical University of Ukraine «Kyiv Polytechnic Institute», Kyiv,

Candidate of technical sciences,
assistant professor, department
of cyber security and automated
systems and technology

References

National Security Strategy of Ukraine (2007), available at : http://zakon4.rada.gov.ua/ laws/show/105/2007 (accessed 20 March 2015).

Yakoviv, I. B. (2012), The communication channel from the positions of attributive-transfer nature of the information [Kanal sviazi s pozitcii atributivno-transfertnoi sushchnosti informatcii], Information technology and security, No. 2 (2), pp. 84-96.

National Institute of Standards and Technology (2013), NIST Special Publication 800-82. Revision 1, Guide to Industrial Control Systems (ICS) Security, available at : http://dx.doi.org/ 10.6028/NIST.SP.800-82r1 (accessed 13 January 2015).

Published

2015-06-30

How to Cite

Yakoviv, I. (2015). The base model of informational processes of management and safety criteria for cybernetic systems. Information Technology and Security, 3(1), 68–74. https://doi.org/10.20535/2411-1031.2015.3.1.57735

Issue

Section

CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION