CYBER SECURITY CULTURE LEVEL ASSESSMENT MODEL IN THE INFORMATION SYSTEM

Author:

Skiter Ihor1ORCID

Affiliation:

1. The Institute for Safety Problems of Nuclear Power Plants

Abstract

The paper sets the task of formalizing the processes of assessing the culture of cybersecurity of the information system of the organization. The basis is a comprehensive model that takes into account the technical and organizational parameters of the information system and the risks associated with them. The level of security culture of the information system is assessed on the basis of building an additive model. The model includes the characteristics of system state clusters. Clusters are formed on the basis of arrays of factors that correspond to different classes of information security culture. Classes are formed on the basis of sets of factors. Their impact is assessed using the severity of the consequences for the level of cybersecurity of the information system. In addition, the probability of manifestation of this factor in a particular information system is determined. The value of coefficients and probability distributions for each cluster and set of factors is estimated by expert methods and on the basis of a survey. A feature of the formation of arrays of factors is the inclusion in each cluster of a factor that reflects the passive behavior of the user to negative factors. Thus, the model introduces the probability of rejection of negative factors and the probability of ideal behavior for the formation of the appropriate class of threats. It is proposed to determine the average weights of the factors of the level of influence on the cybersecurity of the information system on the basis of the weighted average indicator. A method of estimating weights based on the equally probable distribution of negative factors within the cluster

Publisher

Borys Grinchenko Kyiv University

Subject

General Medicine

Reference12 articles.

1. Pro Nacionalnu bezpeku Ukrayiny. Zakon Ukraiyiny #2469-V111 (2018, 1 lypnua) (Ukrayina) [On National Security of Ukraine, Law of Ukraine № 2469-VIII (2018, July 1) (Ukraine)]. Відомості Верховної Ради України - Information of the Verkhovna Rada of Ukraine, 31. [In Ukraine]

2. Technical Committee for Standardization "Information Technology" (TC 20). (2014). Informatsiini tekhnolohii. Metody bezpeky. Systemy menedzhmentu informatsiinoiu bezpekoiu. Vymohy [Information Technology. Security methods. Information security of the management systems. Requirements] (DSTU ISO/IEC 27001:2013). DP «UkrNDNTs». [In Ukraine]

3. Baylon, C., Brunt, R., & Livingstone, D. (2015). Cyber Security at Civil Nuclear Facilities Understanding the Risks (Charity Registration No. 208223). The Royal Institute of International Affairs.

4. Measuring the security culture in organizations: a systematic overview of existing tools;Sas;Security Journal (34),2021

5. Seeba, M., Matuleviˇcius, R., & Toom, I. (2021). Development of the Information Security Management System Standard for Public Sector Organisationsin Estonia. У 24th International Conference on Business Information Systems (BIS2021) (с. 355-366). Technische Informationsbibliothek.

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. The Impact of Communication Technologies on the Adaptation Process of Ukrainian Refugees in Slovakia;Ethnic History of European Nations;2024

2. Cyber Security Compliance Among Remote Workers;Advanced Sciences and Technologies for Security Applications;2023

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3