Affiliation:
1. Faculty of Security, Tomsk State University of Control Systems and Radioelectronics, 40 Lenina Prospect, 634000 Tomsk, Russia
Abstract
Depending on their motivation, offenders have different goals, and disclosure of information is not always such a goal. It often happens that the purpose of the offender is to disrupt the normal operation of the system. This can be achieved both by acting directly on the information and by acting on the elements of the system. Actions of this kind lead to a violation of integrity and availability, but not confidentiality. It follows that the process of forming a threat model for the integrity and availability of information differs from a similar process for confidentiality threats. The purpose of this study is to develop an information integrity threat model that focuses on threats disrupting the normal operation of the system. The research methodology is based on the methods of system analysis, graph theory, discrete mathematics, and automata theory. As a result of the research, we proposed a model of threats to the integrity and availability of information. The proposed threat model differs from analogues by a high level of abstraction without reference to the subject area and identification of threats to the availability of information as a subset of threats to the integrity of the information transmission channel.
Funder
the Ministry of Science and Higher Education of Russia
Subject
Physics and Astronomy (miscellaneous),General Mathematics,Chemistry (miscellaneous),Computer Science (miscellaneous)
Reference41 articles.
1. Shelupanov, A., Evsyutin, O., Konev, A., Kostyuchenko, E., Kruchinin, D., and Nikiforov, D. (2019). Information Security Methods—Modern Research Directions. Symmetry, 11.
2. Computer network threat modelling;Novokhrestov;J. Phys. Conf. Ser.,2020
3. Novokhrestov, A., Konev, A., and Shelupanov, A. (2019). Model of Threats to Computer Network Software. Symmetry, 11.
4. Analysis of information flow security in cyber-physical systems;Akella;Int. J. Crit. Infrastruct. Prot.,2010
5. Modeling security in cyber-physical systems;Burmester;Int. J. Crit. Infrastruct. Prot.,2012
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献