Cybersecurity Risk Assessments within Critical Infrastructure Social Networks

Author:

Aktayeva Alimbubi1,Makatov Yerkhan2,Tulegenovna Akku Kubigenova3ORCID,Dautov Aibek1ORCID,Niyazova Rozamgul4,Zhamankarin Maxud1,Khan Sergey5

Affiliation:

1. Department of Information Systems and Informatics, Abay Myrzakhmetov Kokshetau University, Kokshetau 000002, Kazakhstan

2. Department of Information Security, L. N. Gumilyov Eurasian National University, Astana 010000, Kazakhstan

3. Department of Information Systems, S. Seifullin Kazakh Agrotechnical University, Astana 010000, Kazakhstan

4. Department of Artificial Intelligence Technologies, L. N. Gumilyov Eurasian National University, Astana 010000, Kazakhstan

5. Department of Information and Communication Technologies, Sh. Ualikhanov Kokshetau University, Kokshetau 000002, Kazakhstan

Abstract

Cybersecurity social networking is a new scientific and engineering discipline that was interdisciplinary in its early days, but is now transdisciplinary. The issues of reviewing and analyzing of principal tasks related to information collection, monitoring of social networks, assessment methods, and preventing and combating cybersecurity threats are, therefore, essential and pending. There is a need to design certain methods, models, and program complexes aimed at estimating risks related to the cyberspace of social networks and the support of their activities. This study considers a risk to be the combination of consequences of a given event (or incident) with a probable occurrence (likelihood of occurrence) involved, while risk assessment is a general issue of identification, estimation, and evaluation of risk. The findings of the study made it possible to elucidate that the technique of cognitive modeling for risk assessment is part of a comprehensive cybersecurity approach included in the requirements of basic IT standards, including IT security risk management. The study presents a comprehensive approach in the field of cybersecurity in social networks that allows for consideration of all the elements that constitute cybersecurity as a complex, interconnected system. The ultimate goal of this approach to cybersecurity is the organization of an uninterrupted scheme of protection against any impacts related to physical, hardware, software, network, and human objects or resources of the critical infrastructure of social networks, as well as the integration of various levels and means of protection.

Publisher

MDPI AG

Subject

Information Systems and Management,Computer Science Applications,Information Systems

Reference24 articles.

1. (2023, October 16). Council Directive 2008/114/EC of 8 December 2008 on the Identification and Designation of European Critical Infrastructures and the Assessment of the Need to Improve Their Protection. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32008L0114&qid=1697471770811.

2. Challenges in the vulnerability and risk analysis of critical infrastructures;Zio;Reliab. Eng. Syst. Saf.,2016

3. Haimes, Y.Y. (2008). Systems-Based Risk Analysis: Global Catastrophic Risks, Oxford University Press.

4. (2012). Information technology—Security Techniques—Guidelines for Cybersecurity. Standard No. ISO/IEC 27032:2012. Available online: https://www.iso.org/ru/standard/44375.html.

5. (2012). Information Technology: Security Methods. Standard No. ISO/IES 27032:2012.

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3