Modeling of information and cyber security cost optimization

Authors

  • Vladimir Kononovich Odessa National Polytechnic University, Ukraine
  • Oleksandr Sievserinov Kharkiv National University of Radio Electronics, Ukraine
  • Mykola Romanyukov Kharkiv National University of Radio Electronics, Ukraine

Abstract

The growing vulnerability of each individual in a progressive information and communication society is undeniable. Thus, on the part of the state, as well as the owner of the information to be protected, it is necessary to create new mechanisms that meet the modern requirements of individual protection of each subject of the system in information and cyberspace. This paper presents an effective method for calculating information and cybersecurity cost optimization. The class of societal attacks, which are identified as the most dangerous ones, is considered.

References

Stepanov V.Yu. Information security as a component of state information policy / V.Yu. Stepanov [Electronic resource] // State building. - № 2, - Kharkiv, 2016. - P. 525-542. - Access mode: http://www.kbuapa.kharkov.ua/e-book/db/2016-2/doc/1/02.pdf.J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73.

Bykov A.Yu. The task of choosing information protection tools in automated systems based on the antagonistic game model /A.Yu. Bykov, N.O. Altukhov, A.S. Sosenko. // Engineering Herald. - 2014. - No. 4. - S. 525–542.

Abdenov A.Zh. The choice of means of effective protection using the methods of game theory / A.Zh. Abdenov, R.N. Zarkumova // Issues of information security. - 2010. - No. 2. - S. 26-31.

Buryachok VL Information and cyber security: the social aspect: a textbook / [VL. Buryachok, VB Tolubko, V.O. Khoroshko, S.V. Tolupa]; for the total. ed. Dr. Techn. of Sciences, Professor VB Crowd. - K .: DUT, 2015. - 288 p.

A. JosangAn Algebra for Assessing Trust in Certification Chains. InJ. Kochmar, editor, Proceedings of the Network and distributed Systems Security Symposium (NDSS’99). The Internet Society, 1999.

Simonov S., Technologies and tools for risk management // Newsletter Jetinfo No. 2 (117), 2003. - S. 1-32.

Published

2020-04-23

Issue

Section

RELIABILITY AND SAFETY ASSURANCE TECHNOLOGIES FOR COMPUTER AND INFORMATIONAL SYSTEMS