Complex approach for state critical information infrastructure cyber defence system constructing

I.P. Synitsyn, P.P. Ignatenko, О.A. Slabospitskaya, A.V. Artemenko

Abstract


Complex Approach for problems solving to enable Cyber Defence for State Critical Information Infrastructure Objects through best world and home practices, and also approved hardware and software and only software Cyber Defence Tools is presented. Cyber Security Guidance Intellectual Information Technology to effectively implement of this Approach is proposed. The Technology combines authors’ developments for Organizational Decisions (both expert-analytical and business) Making Support with advanced approaches for due Cyber Security Benefits and its violation Risks Management. Applying the Approach will help to improve Cyber Defence of State Critical Information Infrastructure.

Problems in programming 2017; 3: 128-148


Keywords


cyberspace; cyber attack; cyber security; complex information defence system; cyber defence; intellectual information technology; organizational decision

References


Cybersecurity strategy of Ukraine. Approved by Presidential Decree of Ukraine No. 96/2016 dated 15 March 2016. [Electronic resource]. Mode of access: http://www.president.gov.ua/documents/962016-19836.

On Basic Principles of Ensuring the Cybersecurity of Ukraine. Draft Law N2126a. [Electronic resource]. Mode of access: http://w1.c1.rada.gov.ua/pls/zweb2/webproc4_1?pf3511=55657.

Andon F.I., Ignatenko O.P. Denial of servise attacks on the Internet survey of problems and solutions. Draft Inst. of Softvare Systems of NASU. Kyiv, 2008. 50 p.

Andon F.I., Ignatenko O.P. Modeling conflict processes on the internet. Cybernetics and Systems Analysis. 2013. Vol. 49. N 4. P. 616-623. CrossRef

Definitions and terminology relating to building confidence and security in the use of information and communication technologies. Resolution 181. Plenipotentiary Conf. of the Int. Telecom. Union. Guadalajara, 2010. 4 p.

ISO/IEC 27032:2012 Information technology - Security techniques - Guidelines for cybersecurity. [Electronic resource]. - Mode of access: http://www.iso27001security.com/ html/27032.html.

Zagorodniy A.G., Borovskaya O.M., Svistunov S.Ya., Sinitsyn I.P., Rodin Ye.S. Complex System Creation for Information Resources Defense over National Grid Infrastructure of Ukraine. «Stal» ed. Kyiv. 2014. 374 p.

Ilina E.P., Sinitsyn I.P. Models and Methods for Automated Analytic Support of the organization decisions field. Problems of Programming. 2017. N 3. P. 93-107. CrossRef

Page of Computer Emergency Response Team of Ukraine. [Electronic resource]. Mode of access: http://cert.gov.ua/.

Page of ITIL. [Electronic resource]. Mode of access: https://ru.wikipedia.org/wiki/ITIL

Elliot B., Fernandez M.M. Single-Vendor or Multivendor UCC: Which Approach Is Best for You? Gartner Report

ID: G00247556. 2013, march 7. [Electronic resource]. Mode of access: https://www.gartner.com/doc/2363015/ sing¬levendor-multivendor-ucc-approach-best.

[Electronic resource]. Mode of access: http://www.information-age.com/how-internet-things-will-forever-change-data-centre-123458414.

[Electronic resource]. Mode of access: https://www.slideshare.net/SeanLeslie1/debunking-the-myth-of-the-singlevendor-network-gartner-white-paper-2-58388315.

Page "Information Security of Ukraine". [Electronic resource]. Mode of access: https://uk.wikipedia.org/wiki/Інформаційна безпека_України. [Electronic resource]. Mode of access: https://www.anti-malware.ru/analytics/ Technology_Analysis.

Shangin V.F. Information Security. M.: DMK Press, 2014. 702 p.

[Electronic resource]. Mode of access: http://www.dsszzi.gov.ua/dsszzi/control/uk/publish/article?art_id=89740&cat_id=89734.

[Electronic resource]. Mode of access: http://libraryno.ru/ekspluataciya-informacionnyh-sistem-infmen/.

[Electronic resource]. Mode of access: http://onlanta.ru/services/appmanagement/.

[Electronic resource]. Mode of access: https://ru.wikipedia.org/wiki/ISO_20000.

[Electronic resource]. Mode of access: https://technet.microsoft.com/en-us/library/ cc543224.aspx.

[Electronic resource]. Mode of access: https://saas.hpe.com/en-us/software/it-service-management-itsm.

Donaldson S.E., Siegel S., Williams C.K., Aslam A. Enterprise Cybersecurity. How to Build a Successful Cyberdefense Program Against Advanced Threats. Apress, 2015.

Jenner S. Managing Benefits. The new Guidance and Certification Scheme from. APMG-International. The Stationery Office, 2012. 297 p.

Renn O. Risk Governance: Coping with Uncertainty in a Complex World.

Ilyina E.P., Sinitsyn I.P., Slabospitskaya O.A. Creating Corporate Decision Engi-neering as a Concept for Complex Organi-zational Management. Proc. Tenth Int. Sci.-Pr. Conf. MODS'2015. Chernigov, 2015. P. 248-262.

Decision Model and Notation (DMN). Version 1.1. Object Management Group, Inc, 2016. 182 p. [Electronic resourse]. Mode of access: http://www.omg.org/spec/DMN/1.1. DMN 1.1.

Business Process Model and Notation (BPMN). Version 2.0. Object Management Group, 2011. 538 p. [Electronic resourse]. Mode of access: http://www.omg.org/ spec/BPMN/2.0/PDF.

Renn O. Coping with complexity, uncertainty and ambiguity:The risk governance approach NSF-DFG Joint Risk Meeting, Washington, D.C., Oct. 3-5, 2012. 33 p.

Slabospitskaya O.A. Portfolio model for decision process concerning organizational change management. Problems in Program-ming. 2015. N 1. P. 72-80.




DOI: https://doi.org/10.15407/pp2017.03.128

Refbacks

  • There are currently no refbacks.