Modeling of information and cyber security cost optimization
Abstract
The growing vulnerability of each individual in a progressive information and communication society is undeniable. Thus, on the part of the state, as well as the owner of the information to be protected, it is necessary to create new mechanisms that meet the modern requirements of individual protection of each subject of the system in information and cyberspace. This paper presents an effective method for calculating information and cybersecurity cost optimization. The class of societal attacks, which are identified as the most dangerous ones, is considered.References
Stepanov V.Yu. Information security as a component of state information policy / V.Yu. Stepanov [Electronic resource] // State building. - № 2, - Kharkiv, 2016. - P. 525-542. - Access mode: http://www.kbuapa.kharkov.ua/e-book/db/2016-2/doc/1/02.pdf.J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73.
Bykov A.Yu. The task of choosing information protection tools in automated systems based on the antagonistic game model /A.Yu. Bykov, N.O. Altukhov, A.S. Sosenko. // Engineering Herald. - 2014. - No. 4. - S. 525–542.
Abdenov A.Zh. The choice of means of effective protection using the methods of game theory / A.Zh. Abdenov, R.N. Zarkumova // Issues of information security. - 2010. - No. 2. - S. 26-31.
Buryachok VL Information and cyber security: the social aspect: a textbook / [VL. Buryachok, VB Tolubko, V.O. Khoroshko, S.V. Tolupa]; for the total. ed. Dr. Techn. of Sciences, Professor VB Crowd. - K .: DUT, 2015. - 288 p.
A. JosangAn Algebra for Assessing Trust in Certification Chains. InJ. Kochmar, editor, Proceedings of the Network and distributed Systems Security Symposium (NDSS’99). The Internet Society, 1999.
Simonov S., Technologies and tools for risk management // Newsletter Jetinfo No. 2 (117), 2003. - S. 1-32.