To effectively protect critical infrastructure facilities (CIF), it is important to understand the focus of cybersecurity efforts. The concept of building security systems based on a variety of models describing various CIF functioning aspects is presented. The development of the concept is presented as a sequence of solving the following tasks. The basic concepts related to cyberattacks on CIF were determined, which make it possible to outline the boundaries of the problem and determine the level of formalization of the modeling processes. The proposed threat model takes into account possible synergistic/emergent features of the integration of modern target threats and their hybridity. A unified threat base that does not depend on CIF was formed. The concept of modeling the CIF security system was developed based on models of various classes and levels. A method to determine attacker's capabilities was developed. A concept for assessing the CIF security was developed, which allows forming a unified threat base, assessing the signs of their synergy and hybridity, identifying critical CIF points, determining compliance with regulatory requirements and the state of the security system. The mathematical tool and a variety of basic models of the concept can be used for all CIFs, which makes it possible to unify preventive measures and increase the security level. It is proposed to use post-quantum cryptography algorithms on crypto-code structures to provide security services. The proposed mechanisms provide the required stability (230–235 group operations), the rate of cryptographic transformation is comparable to block-symmetric ciphers (BSC) and reliability (Perr 10–9–10–12)
The article analyzes the parameters of social networks. The analysis is performed to identify critical threats. Threats may lead to leakage or damage to personal data. The complexity of this issue lies in the ever-increasing volume of data. Analysts note that the main causes of incidents in Internet resources are related to the action of the human factor, the mass hacking of IoT devices and cloud services. This problem is especially exacerbated by the strengthening of the digital humanistic nature of education, the growing role of social networks in human life in general. Therefore, the issue of personal information protection is constantly growing. To address this issue, let’s propose a method of assessing the dependence of personal data protection on the amount of information in the system and trust in social networks. The method is based on a mathematical model to determine the protection of personal data from trust in social networks. Based on the results of the proposed model, modeling was performed for different types of changes in confidence parameters and the amount of information in the system. As a result of mathematical modeling in the MatLab environment, graphical materials were obtained, which showed that the protection of personal data increases with increasing factors of trust in information. The dependence of personal data protection on trust is proportional to other data protection parameters. The protection of personal data is growing from growing factors of trust in information. Mathematical modeling of the proposed models of dependence of personal data protection on trust confirmed the reliability of the developed model and proved that the protection of personal data is proportional to reliability and trust
One of the pressing areas that is developing in the field of information security is associated with the use of Honeypots (virtual decoys, online traps), and the selection of criteria for determining the most effective Honeypots and their further classification is an urgent task. The main products that implement virtual decoy technologies are presented. They are often used to study the behavior, approaches and methods that an unauthorized party uses to gain unauthorized access to information system resources. Online hooks can simulate any resource, but more often they look like real production servers and workstations. A number of fairly effective developments are known that are used to solve the problems of detecting attacks on information system resources, which are based on the apparatus of fuzzy sets. They showed the effectiveness of the appropriate mathematical apparatus, the use of which, for example, to formalize the approach to the formation of a set of reference values that will improve the process of determining the most effective Honeypots. For this purpose, many characteristics have been formed (installation and configuration process, usage and support process, data collection, logging level, simulation level, interaction level) that determine the properties of online traps. These characteristics became the basis for developing a method for the formation of standards of linguistic variables for further selection of the most effective Honeypots. The method is based on the formation of a Honeypots set, subsets of characteristics and identifier values of linguistic estimates of the Honeypot characteristics, a base and derived frequency matrix, as well as on the construction of fuzzy terms and reference fuzzy numbers with their visualization. This will allow classifying and selecting the most effective virtual baits in the future.
Б а с р е д а к т о р ы х. ғ. д., проф., ҚР ҰҒА академигі М. Ж. Жұрынов Р е д а к ц и я а л қ а с ы:Ресей) Абишев М.Е. проф., корр.-мүшесі (Қазақстан) Аврамов К.В. проф. (Украина) Аппель Юрген проф. (Германия) Баймуқанов Д.А. проф., корр.-мүшесі (Қазақстан) Байтулин И.О. проф., академик (Қазақстан) Банас Иозеф проф. (Польша) Берсимбаев Р.И. проф., академик (Қазақстан) Велесько С. проф. (Германия) Велихов Е.П. проф., РҒА академигі (Ресей) Гашимзаде Ф. проф., академик (Әзірбайжан) Гончарук В.В. проф., академик (Украина) Давлетов А.Е. проф., корр.-мүшесі (Қазақстан) Джрбашян Р.Т. проф., академик (Армения) Қалимолдаев М.Н. проф., академик (Қазақстан), бас ред. орынбасары Лаверов Н.П. проф., академик РАН (Россия) Лупашку Ф. проф., корр.-мүшесі (Молдова) Мохд Хасан Селамат проф. (Малайзия) Мырхалықов Ж.У. проф., академик (Қазақстан) Новак Изабелла проф. (Польша) Огарь Н.П. проф., корр.-мүшесі (Қазақстан) Полещук О.Х. проф. (Ресей) Поняев А.И. проф. (Ресей) Сагиян А.С. проф., академик (Армения) Сатубалдин С.С. проф., академик (Қазақстан) Таткеева Г.Г. проф., корр.-мүшесі (Қазақстан) Умбетаев И. проф., академик (Қазақстан) Хрипунов Г.С. проф. (Украина) Юлдашбаев Ю.А. проф., РҒА корр-мүшесі (Ресей) Якубова М.М. проф., академик (Тәжікстан) «Қазақстан Республикасы Ұлттық ғылым академиясының Хабаршысы».
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.