Аnalysis of the factors influencing condition cybersecurity of information system of object of the critical infrastructure
DOI:
https://doi.org/10.20535/2411-1031.2016.4.2.110098Keywords:
Cybersecurity, cyber protection, critical infrastructure, analysis, factors.Abstract
The analysis of the factors influencing condition cybersecurity of information system of object of a critical infrastructure is made. Integral parts of systems of cyber protection of information systems of objects of a critical infrastructure are considered. The model of interaction of elements of information system of object of a critical infrastructure is resulted, and also the analysis of their influence on a condition of cybersecurity the given system is made. Functions which the system of cyber protection of information system of objects of a critical infrastructure necessarily should possess are resulted. Research of the factors which influence can induce insider to possible performance of destructive actions is carried out, and also recommendations about minimization of probability of realization by insider such actions are given. The concept of internal destabilizing factors is opened. Directions on which it should be considered cyber protection of information systems of objects of a critical infrastructure are formulated. The question of is standard-legal maintenance cybersecurity of information systems of objects of a critical infrastructure is considered. Some features in actions of insider information systems of objects of a critical infrastructure are considered. Results of the spent analysis can be used by working out of offers and actions on cyber protection of information systems of objects of a critical infrastructure.
References
Cabinet of Ministers of Ukraine. (2016, Aug. 23). Resolution number 563, Approval the order of formation of the list of information and telecommunication systems акщь from the objects of critical infrastructure of the government [Online]. Available: http://zakon.rada.gov.ua/ laws/ show/563-2016-%D0%BF. Accessed on: Aug. 02, 2016.
V.V. Domarev, Safety of information technologies. Methodology of creation of systems of protection. Kyiv, Ukraine: ООО “TYD “DS”, 2002.
S.F. Honchar, H.P. Leonenko, and O.Y. Yudin, “Analysis of threats and vulnerabilities of industrial control systems”, Legal, regulatory and metrological support of information security in Ukraine, iss. 2 (26), pp. 9-14, 2013.
International Electrotechnical Commission. 2009. IEC 62443-1-1, Industrial communication network – Network and system security. Part 1-1: Terminology, concepts and models. [Online]. Available: https://webstore.iec.ch/publication/7029. Accessed on: Aug. 02, 2016.
D.A. Lovtsov, and N.A. Sergeev, Control of ergasystems security. Moscow, Russia: RAU-Universitet, 2001.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 Collection "Information technology and security"
This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors that are published in this collection, agree to the following terms:
- The authors reserve the right to authorship of their work and pass the collection right of first publication this work is licensed under the Creative Commons Attribution License, which allows others to freely distribute the published work with the obligatory reference to the authors of the original work and the first publication of the work in this collection.
- The authors have the right to conclude an agreement on exclusive distribution of the work in the form in which it was published this anthology (for example, to place the work in a digital repository institution or to publish in the structure of the monograph), provided that references to the first publication of the work in this collection.
- Policy of the journal allows and encourages the placement of authors on the Internet (for example, in storage facilities or on personal web sites) the manuscript of the work, prior to the submission of the manuscript to the editor, and during its editorial processing, as it contributes to productive scientific discussion and positive effect on the efficiency and dynamics of citations of published work (see The Effect of Open Access).