Abstract
To effectively protect critical infrastructure facilities (CIF), it is important to understand the focus of cybersecurity efforts. The concept of building security systems based on a variety of models describing various CIF functioning aspects is presented.
The development of the concept is presented as a sequence of solving the following tasks. The basic concepts related to cyberattacks on CIF were determined, which make it possible to outline the boundaries of the problem and determine the level of formalization of the modeling processes. The proposed threat model takes into account possible synergistic/emergent features of the integration of modern target threats and their hybridity. A unified threat base that does not depend on CIF was formed. The concept of modeling the CIF security system was developed based on models of various classes and levels. A method to determine attacker's capabilities was developed. A concept for assessing the CIF security was developed, which allows forming a unified threat base, assessing the signs of their synergy and hybridity, identifying critical CIF points, determining compliance with regulatory requirements and the state of the security system. The mathematical tool and a variety of basic models of the concept can be used for all CIFs, which makes it possible to unify preventive measures and increase the security level. It is proposed to use post-quantum cryptography algorithms on crypto-code structures to provide security services. The proposed mechanisms provide the required stability (230–235 group operations), the rate of cryptographic transformation is comparable to block-symmetric ciphers (BSC) and reliability (Perr 10–9–10–12)
Publisher
Private Company Technology Center
Subject
Applied Mathematics,Electrical and Electronic Engineering,Management of Technology and Innovation,Industrial and Manufacturing Engineering,Computer Science Applications,Mechanical Engineering,Energy Engineering and Power Technology,Control and Systems Engineering
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. ADVANCED INFORMATION TECHNOLOGIES FOR THE TRAINING OF CYBER DEFENCE SPECIALISTS OF THE SECURITY AND DEFENCE SECTOR OF UKRAINE;Scientific Notes of Junior Academy of Sciences of Ukraine;2024
2. Sociocyberphysical Security Systems Synthesis Models;2023 7th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT);2023-10-26
3. Development of a Sociocyberphysical Systems Cyber Threats Classifier;2023 7th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT);2023-10-26
4. Security Models and Methods of Socio-Cyberphysical Systems;2023 7th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT);2023-10-26
5. Design basis for Arctic infrastructure facilities;AIMS Geosciences;2023