Research of Vulnerabilities of Information Processing Processes Systems of Critical Information Infrastructure

2019 
The possibilities of researching the vulnerabilities of information processing in the systems of critical information infrastructure (CII) are considered. The aim of the work is to consider the methods for identifying vulnerabilities of processes of information interaction between man and machine in relation to the assessment of the security of objects of the CII. The paper presents the organizational-technical system of CII in the form of two subsystems: information-organizational and information-technical in order to identify the "thin spots" of the information system (IS) by special information-technical impact and information-psychological impact (ITI, IPI). In addressing this issue of detection of ITI and IPI in the CII of the IS, it is proposed to apply the information security of the IS operator based on the use of gas-discharge visualization technologies (GDV method). An integrated approach to assessing the security of CII enables to take into account the characteristic feature of the transition of ITI to IPI, and, conversely, with a targeted influence on the operator and the decision-maker.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    3
    Citations
    NaN
    KQI
    []