2021
DOI: 10.15587/1729-4061.2021.233533
|View full text |Cite
|
Sign up to set email alerts
|

Development of a concept for building a critical infrastructure facilities security system

Abstract: To effectively protect critical infrastructure facilities (CIF), it is important to understand the focus of cybersecurity efforts. The concept of building security systems based on a variety of models describing various CIF functioning aspects is presented. The development of the concept is presented as a sequence of solving the following tasks. The basic concepts related to cyberattacks on CIF were determined, which make it possible to outline the boundaries of the problem and determine the level of formaliza… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
24
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 14 publications
(24 citation statements)
references
References 81 publications
(88 reference statements)
0
24
0
Order By: Relevance
“…This approach takes into account characteristics and signs of modern threats, minimizes funds to support information security systems (ISS), considering business continuity. To account for the computing resources of attackers, the approach proposed in [26] is used. Simulation of models: "predatorprey" taking into account the computing capabilities and focus of targeted cyberattacks, "predator-prey" taking into account the possible competition of attackers in relation to the "prey", "predator-prey" taking into account relationships between "prey species" and "predator species", "predator-prey" taking into account relationships between "prey species" and "predator species" using a Java Script software package presented on the web resource [27].…”
Section: Research Materials and Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…This approach takes into account characteristics and signs of modern threats, minimizes funds to support information security systems (ISS), considering business continuity. To account for the computing resources of attackers, the approach proposed in [26] is used. Simulation of models: "predatorprey" taking into account the computing capabilities and focus of targeted cyberattacks, "predator-prey" taking into account the possible competition of attackers in relation to the "prey", "predator-prey" taking into account relationships between "prey species" and "predator species", "predator-prey" taking into account relationships between "prey species" and "predator species" using a Java Script software package presented on the web resource [27].…”
Section: Research Materials and Methodsmentioning
confidence: 99%
“…1. Threats are aimed at the corresponding security services, which are represented by the 3rd platform in the threat classifier [26].…”
Section: Development Of Security Models For Developing Cyber-physical Systems Taking Into Account the Computing Capabilities And Focus Ofmentioning
confidence: 99%
See 3 more Smart Citations