ФОРМУВАННЯ ПЕРЕЛІКУ КРИТИЧНИХ АВІАЦІЙНИХ ІНФОРМАЦІЙНИХ СИСТЕМ В УМОВАХ РЕАЛІЗАЦІЇ КІБЕРЗАГРОЗ

2019 
The subject of the paper is the methods and models of forming the list of objects of critical information infrastructure (CII). The purpose of this paper is to form a list of critical aviation information systems (CAIS) on the basis of the developed unified data model and determine their metrics of connectivity and complexity. Results. Based on the author’s previously developed unified data model, a methodology was developed for creating a list of CII objects. It due to multi-level detail, hierarchical representation of sets characterizing systems and their components, as well as the introduction of the incidence matrix of CII cybersecurity, its simplex complexes and Q-analysis, allowed to formulate the list of CAIS and to determine their connectivity (the ratio of q -bonds between sets cyber threats (CT) and CAIS). Conclusions. This research study has shown that the relations q -connections of sets of CT have a higher connectivity in comparison with similar relations q -connections of sets of systems of CAIS, which indicates that the implementation of one CT can initiate a cascade effect on other related threats and lead to damage, and sometimes devastating consequences for a certain system of CAIS. In addition, the complexity measurements of complexes j KAIS  = 1,39 and j THREATS = 1,13 are calculated and indicate a greater «complexity» of CAIS systems. Given results can be used by the relevant state authorities to build a list of CII objects in order to apply adequate security methods and means.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    0
    Citations
    NaN
    KQI
    []