Cyber Security Risk Modeling in Distributed Information Systems

Author:

Palko Dmytro1ORCID,Babenko Tetiana1ORCID,Bigdan Andrii1,Kiktev Nikolay23ORCID,Hutsol Taras4ORCID,Kuboń Maciej56ORCID,Hnatiienko Hryhorii2,Tabor Sylwester5ORCID,Gorbovy Oleg7,Borusiewicz Andrzej8ORCID

Affiliation:

1. Department of Cybersecurity and Information Protection, Taras Shevchenko National University of Kyiv, 01-601 Kyiv, Ukraine

2. Department of Intelligent Technologies, Taras Shevchenko National University of Kyiv, 01-601 Kyiv, Ukraine

3. Department of Automation and Robotic Systems, National University of Life and Environmental Sciences of Ukraine, 03-041 Kyiv, Ukraine

4. Department of Mechanics and Agroecosystems Engineering, Polissia National University, 10-008 Zhytomyr, Ukraine

5. Department of Production Engineering, Logistics and Applied Computer Science, University of Agriculture in Krakow, 30-149 Krakow, Poland

6. National Academy of Applied Sciences in Przemyśl, 37-700 Przemysl, Poland

7. Department of Energy Saving Tehnologies and Energy Menagement, Educational and Scientific Institute of Energy, Higher Educational Institution “Podillia State University”, 32-316 Kamianets-Podilskyi, Ukraine

8. Department of Agronomy, Modern Technologies and Informatics, International University of Applied Sciences in Lomza, 18-402 Lomza, Poland

Abstract

This paper deals with problems of the development and security of distributed information systems. It explores the challenges of risk modeling in such systems and suggests a risk-modeling approach that is responsive to the requirements of complex, distributed, and large-scale systems. This article provides aggregate information on various risk assessment methodologies; such as quantitative, qualitative, and hybrid methods; a comparison of their advantages and disadvantages; as well as an analysis of the possibility of application in distributed information systems. It also presents research on a comprehensive, dynamic, and multilevel approach to cyber risk assessment and modeling in distributed information systems based on security metrics and techniques for their calculation, which provides sufficient accuracy and reliability of risk assessment and demonstrates an ability to solve problems of intelligent classification and risk assessment modeling for large arrays of distributed data. The paper considers the main issues and recommendations for using risk assessment techniques based on the suggested approach.

Funder

subsidy of the Ministry of Education and Science for the Hugo Kołłątaj Agricultural University in Kraków

Publisher

MDPI AG

Subject

Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science

Reference82 articles.

1. Information Security Risk Management in IT Outsourcing—A Quarter-century Systematic Literature Review;Bhatti;J. Glob. Inf. Technol. Manag.,2021

2. A systematic review of information security risk assessment;Pan;Int. J. Saf. Secur. Eng.,2016

3. Semin, V.G., Shmakova, E.G., and Los, A.B. (2017, January 24–30). The information security risk management. Proceedings of the 2017 International Conference “Quality Management, Transport and Information Security, Information Technologies” (IT&QM&IS), St. Petersburg, Russia.

4. Statistics Based Information Security Risk Management Methodology;Saluja;IJCSNS Int. J. Comput. Sci. Netw. Secur.,2015

5. ISRAM: Information security risk analysis method;Karabacak;Comput. Secur.,2005

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Decision Support Method and Risk Analysis Based on Merged-Cyber Security Risk Management;2024 Second International Conference on Data Science and Information System (ICDSIS);2024-05-17

2. Airport security: the impact of AI on safety, efficiency, and the passenger experience;Journal of Transportation Security;2024-04-08

3. Assessment of Dependent Performance Shaping Factors in SPAR-H Based on Pearson Correlation Coefficient;Computer Modeling in Engineering & Sciences;2024

4. An Exploratory Research Analysis of Four Cyber Security Trends in Mobile Technology Using the ISO 270K Framework;Advances in Human Resources Management and Organizational Development;2023-09-11

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3