CYBER SPACE PROTECTION MODEL CYBERSEC
DOI:
https://doi.org/10.18372/2410-7840.22.15255Keywords:
cyberspace, protection model, national security, protected cyberspaceAbstract
The article proposes a cyberspace protection model CyberSec, which is focused on performing the function of
"cyber protection". This model is functional, consists of
five stages, combines a number of methods and models,
is cyclical, and therefore allows you to create a selfconfiguring protection system in cyberspace. At the first
stage of "Intelligence and Detection" is a description of
the security environment, ie a threat model is formed,
which is a complete list of all possible threats that exist or
may arise in this situation, then assumptions are made
about the attacker, and therefore the violator model is
formed. The second stage of "Armament" is the choice of
means of protection and construction of a system of cyberspace protection (SSC). To do this, it is necessary to
develop an approach that will make the optimal (which
provides the best (optimal) protection) choice of the
functional profile of cybersecurity, while spending less
time than usual. Carrying out control of the system (cyberspace) is the third stage of "Control". To do this, the
analysis of the main tasks of information security, determines the real level of interest of security entities in compliance with all requirements for the security of each of
the properties of information (for example, sufficient,
low, unacceptable). At the fourth stage of "Counteraction" to the construction of secure cyberspace, the
evaluation of the effectiveness of the proposed SZK is
performed. In the fifth stage of "Active Counteraction",
normative documents are prepared, corporations are informed about cybersecurity incidents, active counteraction is carried out at the state level, ie countermeasures are applied. The CyberSec cyberspace protection model allows you to build a secure cyberspace in practice for both an individual corporation and the state as a whole.
References
ISO/IEC 15408-99 [Електронний ресурс]. – 2020. – Режим доступу до ресурсу: https://infobezlikbez. ru/terminy/standarty/266-mezhdunarodnyj-standart-iso-15408-obshchij-kriterij.
Державна служба спеціального зв’язку та захисту інформації України [Електронний ресурс]. – 2020. – Режим доступу до ресурсу: www.dsszzi.gov.ua.
Домарев В.В. Безопасность информационных технологий. Системный подход / Домарев В. В. – К.: ДиаСофт, 2006. – 904 с.
Синенко М.А. Математична модель методів активного захисту інформації / Синенко М.А., Ткач Ю.М. // Технічні науки та технології : науковий журнал / Чернігів. нац. технол. ун-т. – Чернігів: ЧНТУ, 2020. – № 2 (20). – С.109-115.
Ткач Ю.М. Моделі систем захисту інформаційної сфери держави // Сучасна спеціальна техніка. – 2020. – №2 (61). – С.59-66.
Ткач Ю.М. О развитии киберпространства и его защищенности // Безпека ресурсів інформаційних систем : збірник тез I Міжнародної науково-практичної конференції (м. Чернігів 16-17 квітня 2020 р.). – Чернігів: НУЧП, 2020. – С.173-177.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).