2019 3rd International Conference on Advanced Information and Communications Technologies (AICT) 2019
DOI: 10.1109/aiact.2019.8847877
|View full text |Cite
|
Sign up to set email alerts
|

The Process of the Critical Infrastructure Cyber Security Management using the Integrated System of the National Cyber Security Sector Management in Ukraine

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 1 publication
0
5
0
Order By: Relevance
“…In work [19], a process model for managing the cybersecurity of critical infrastructure using an integrated system for managing the national cybersecurity sector in Ukraine was developed and presented. The functional components of the CII cybersecurity system were described, and the practical value of the integrated cybersecurity management system for these objects was justified.…”
Section: Methods Of Cyber Protection Of Critical Infrastructure Objectsmentioning
confidence: 99%
“…In work [19], a process model for managing the cybersecurity of critical infrastructure using an integrated system for managing the national cybersecurity sector in Ukraine was developed and presented. The functional components of the CII cybersecurity system were described, and the practical value of the integrated cybersecurity management system for these objects was justified.…”
Section: Methods Of Cyber Protection Of Critical Infrastructure Objectsmentioning
confidence: 99%
“…This cyberattack can be in the form of DDoS on the Power Grid [24], Web attack [31], or attack the point of Sale (POS) [30]. Apart from cyberattacks, there are also External attacks [33,34], Insider Threat [35,36], Unauthorized Access [37,38], Targeted attacks [39,40], Hybrid Threats [41], Hazardous Event [42], Nature Disasters [43], Social Engineering [44], Falsification Attacks [45], Breach Attack [46], Data Theft [47], and Data Tampering [48] commonly found in CIIP. If we quote directly from the literature, vulnerability also has many terms.…”
Section: Data Extractionmentioning
confidence: 99%
“…The security function is also not fully accommodated in the literature reviewed. Only research in the government sector [26][27][28]33], strategic industry [32], dan generic [8,37,56] found a security model with complete security functions. In addition, CIIP standards also accommodate all security functions.…”
Section: Data Extractionmentioning
confidence: 99%
“…The experience of researchers concerning Ukraine is less extensive in this regard, although the issue of crisis management is present in the scientific discourse. In this respect, studies representing various scientific fields can be mentioned: economic, social, political, legal sciences, which analyse, among others, the content and priority directions of a state's anti-crisis policy [Simons, Kapitonenko, Lavrenyuk, et al 2018;Franchuk and Sylkin 2021], the principles and models for implementing the crisis management system in local governments [Akimova, Khomiuk, Bezena, et al 2020], the condition and system of critical infrastructure protection [Sukhodolia et al 2017], the issues of the military conflict in Ukraine [Pankevych and Slovska 2020], state cybersecurity policy [Slipachuk, Toliupa, and Nakonechnyi 2019], and environmental security issues [Radchenko, Kovach, Radchenko, et al 2017].…”
Section: Crisis Management As a Research Problemmentioning
confidence: 99%