PECULIARITIES OF ENSURING THE SECURITY OF CRITICAL INFRASTRUCTURES
DOI:
https://doi.org/10.17721/ISTS.2024.7.11-23Keywords:
cyber security, critical infrastructure facilities, information systems, resilience, cyber powerAbstract
Background. The rapid development of information technologies over the past two decades has impacted the functioning of critical infrastructure facilities. These technologies have begun to be used not only for the exchange and processing of information, but also as a tool for reducing harm. The protection of sovereign interests in the political context is the primary basis for ensuring the national security of the country, which explains the need for the creation and constant development of strong cyber security. Critical infrastructure facilities are foldable, spaciously distributed, rich in component systems, the stability of the robot is critical for the functioning of the economy and the livelihood of the household. They have a rich structure, which includes: a range of technical components; social rheum; organizational level and level of state governance.
Мethods. For monitoring information systems and methods for assessing the security of systems.
Results. The investigation of critical infrastructures as socio-technical systems will require an assessment of the complex interactions between the technical, social and organizational levels of the system. Therefore, it is important to look at critical infrastructure as a whole. In this case, it is necessary to speak at a one-hour close examination of the technical, organizational and social factors that indicate the structure of the system and the dynamics of its development. Schobstecchita to the nonsense of such systems, it is not possible to pray beyond the traditions of the tradition to the zziki projected Riziki, to go to the new paradigmes, and the blessing of the nonsense of the critical sinfrastructure for the criterly wrecks to the designed areas. Due to the need to include the consideration of design basis accidents on critical infrastructure, the scope of surveillance may be expanded accordingly. Come to the point of ensuring the safety of those responsible not only for the creation of dry-barriers that occur ahead of the implementation of project-based accidents that are postulated, but also for the improvement of the resistance and survivability of critical infrastructure times beyond the project inflows, in order to focus on avoided large-scale disasters and troubling interruptions in the functioning of , and the creation of a rich criteria model for assessing the level of security of critical infrastructure objects will give a more comprehensive picture of the status of the critical infrastructure object.
Conclusions. The current safety methods for technical systems are divided into systems that have clear boundaries and well defined danger flows. For these systems, a database of accident statistics can be created, which allows for precise evaluation and verification of models. These methods, which are based on case-by-case scenario "trees" (models of the type "tree" of ideas, "tree" of views), were fragmented without the coordination of design inputs and do not allow for proper management of the complexity of critical infrastructures functioning in is determined by the interaction of technical, organizational and social factors.
Downloads
References
Бірюков, Д., & Кондратов, С. (2012). Захист критичної інфраструктури, проблеми та перспективи впровадження в Україні. Національний інститут стратегічних досліджень.
Гнатюк, С., & Лядовська, В. (2013,). Критерії визначення елементів критичної інфраструктури держави. У Р. Сущенко, Л. Веремеєнко, Д. Шелунцов (Ред.). Матеріали ХХІІІ Всеукраїнської практичної конференції. Іноваційний потенціал світової науки ХХІ століття (с. 55–57). Національна академія СБУ. https://zp.edu.ua/.
Довгань, О. (2013). Критична інфраструктура як об'єкт захисту від кібернетичних атак. У Н. М. Мармоленко, О. П. Власенко, С. В. Ангелуца, Н. М. Лашкет (Ред.). Інформаційна безпека: виклики та загрози сучасності: матеріали науково-практичної конференції (с. 17–20). Національна академія СБУ. https://er.nau.edu.ua/bitstream/ NAU/27208/1/2013.
Юдін, А., & Пирогов, Г. (2013). Аналіз та оцінка нормативних документів, що використовуються для забезпечення інформаційної безпеки систем Smart Grid. Правова, нормативна та метрологічна функціональність системи захисту інформації в Україні, 1, 88.
Бурячок, В., Толюпа, С., Толубко, В., & Хорошко О. (2022). Інформаційна та кібербезпека: соціотехнічний аспект. У С. Даков, О. Торошанко, Я. Шестак, Ю. Бабенко (Ред.). VII міжнародна науково-практична конференція: Проблеми кібербезпеки інформаційно-телекомунікаційних систем (PCSIТS) (с. 288). Київський національний університет імені Тараса Шевченка. https://pcsits.knu.ua/.
