METHOD FOR FORMING THE FUNCTIONAL SECURITY PROFILES OF SECTORAL INFORMATION AND TELECOMMUNICATION SYSTEMS

Author:

Gnatyuk Sergiy1ORCID,Yudin Oleksiy2ORCID,Sydorenko Viktoriia1ORCID,Yevchenko Yaroslav3ORCID

Affiliation:

1. National Aviation University

2. State Scientific and Research Institute of Cybersecurity Technologies and Information Protection

3. NTU of Ukraine “Igor Sikorsky Kyiv Polytechnic University”

Abstract

Global trends to increase and improve the quality of cyber attacks have led to the actualization of the protection of information and telecommunications systems (ITS), in particular, sectoral, which are critical for the functioning of society, socio-economic development and ensuring the information component of national security. Taking into account the needs of national security and the need to introduce a systematic approach to solving problems of critical infrastructure protection, at the national level, the creation of protection systems for such infrastructure is one of the priorities in reforming the defense and security sector of Ukraine. Thus, there is a need to develop methods and models for classifying ITS as critical infrastructure to ensure the national security of Ukraine. The paper proposes a structural-functional method for determining the functional security profile of the subsystem of the sectoral ITS, which allows to determine the basic functional security profile of the sectoral ITS by determining the sectoral requirements for confidentiality, integrity, accessibility and observability and more fully formulate criteria for assessing the security of information circulating in critical ITS. The study was followed by an experimental study on the example of ITS of the National System of Confidential Communication, which tested the adequacy of the method's response to changes in input data.

Publisher

Borys Grinchenko Kyiv University

Subject

General Medicine

Reference24 articles.

1. On the main ambush of the cybersecurity of Ukraine, Law of Ukraine No. 2163-VIII (2020) (Ukraine). https://zakon.rada.gov.ua/laws/show/2163-19

2. About the Strategy of the Cybersecurity of Ukraine, Decision for the sake of the National Security and Defense of Ukraine (2016) (Ukraine). https://zakon.rada.gov.ua/laws/show/n0003525-16

3. On the seizure of information in information and telecommunication systems, Law of Ukraine No. 80/94-VR (2020) (Ukraine). https://zakon.rada.gov.ua/laws/show/80/94-vr

4. On the seizure of personal tributes, Law of Ukraine No. 2297-VI (2020) (Ukraine). https://zakon.rada.gov.ua/laws/show/2297-17

5. About the consolidation of Zagalnyh vimog to the cyber defense of critical infrastructure, Resolution of the Cabinet of the Ministry of Ukraine No. 518 (2019) (Ukraine). https://zakon.rada.gov.ua/laws/show/518-2019-п

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3