Author:
,Kovalchuk L.V.,Nelasa H.V.,
Abstract
The article considers the problem of reducing the losses caused by the implementation of threats to the topology of connections. Threats considered may relate to the integrity, confidentiality and availability of the information transmitted by the corresponding connection. At the same time, it is assumed that the amount of total funding allocated to protect against these threats is limited to a certain amount. This amount should be divided into parts, each of which will correspond to the financing of protection against a certain threat. A corresponding mathematical model was created to solve this problem. In this model, we make the reasonable assumption that the more funding is provided to protect against a threat, the less is the probability of its occuring. With this assumption, the problem is reduced to an optimization problem, which, generally speaking, cannot be solved by analytical methods. But for a small number of variables (up to 100 variables), this problem can be solved numerically using the tools of the Mathematica package. The article also provides the program code that implements the solution of this problem, and numerical examples of its solution using this code.
Publisher
National Academy of Sciences of Ukraine (Co. LTD Ukrinformnauka) (Publications)
Reference11 articles.
1. Drahuntsov, R., & Zubok, V. (2023). Modeling of cyber threats related to massive power outages and summary of potential countermeasures. Electronic Modeling, 45(3), 116- https://doi.org/10.15407/emodel.45.03.116
2. Zubok, V., Davydiuk, A., & Klymenko, T. (2023). Electronic Cybersecurity of critical infrastructure in Ukrainian legislation and in directive
3. (EU) 2022/2555. Electronic Modeling, 45(5), 54- https://doi.org/10.15407/emodel.45.05.054
4. Zubok, V., & Mokhor, V. (2022) Cybersecurity of Internet topology: monograph / IPME named after H.E. Pukhov. https://zenodo.org/records/6795229
5. Alsafwani, N., Fazea, Y., & Alnajjar, F. (2024). Strategic Approaches in Network Communication and Information Security Risk Assessment. Information, 15(6:353). https://doi.org/10.3390/info15060353