ANALYSIS OF THE CONCEPT OF CYBER RESILIENCE OF CRITICAL INFRASTRUCTURE

Authors

DOI:

https://doi.org/10.18372/2410-7840.25.18228

Keywords:

cyber security, cyber resilience, critical infrastructure, information protection, cyberattack, cyberrisks, cyberthreat, cyberincidents

Abstract

Due to the increase in the number of cyber-attacks and incidents on critical infrastructure facilities, specialists face the problem of improving the effectiveness of security measures that will be able to ensure reliable and uninterrupted operation of critical infrastructure facilities as a whole. Therefore, the concepts of cyber resilience, cyber resilience management, cyber resilience provision, and cyber resilience assessment are gaining further relevance. The concept of cyber resilience, in addition to security, includes a number of tasks and processes related to information technology (e.g., backup and recovery after failures) and brand protection. Moreover, the issue of stability and continuity of services in this concept refers both to the company itself and to external contractors who provide such services. The prerequisite for the emergence of cyber resilience as a direction of corporate cyber security was the acceptance by companies of the fact that a cyber-attack is inevitable. The concept of cyber resilience also includes the ability to prepare for an attack, ensure effective operations and countermeasures during an attack, and reduce the possible consequences of an attack on a company. It is important for enterprises to assess the cyber resilience of their critical infrastructures to plan investments that enable them to provide the required level of cyber resilience. However, in order to implement the evaluation process, it is necessary to clearly understand what is behind this concept. Therefore, the analysis of the concept of cyber resilience of critical infrastructure is an urgent task. The purpose of the article is to analyse the concept of cyber resilience for critical information infrastructures. To achieve this goal, it is necessary to define a set of criteria characterizing the concept of cyber resilience. This will make it possible to formulate definitions of "cyber resilience" for its further use in solving the tasks of cyber security and information protection. The article analyses the concept of cyber resilience, which is based on the formed set of criteria consisting of 31 components. This makes it possible to formulate definitions related to cyber resilience for its further use in solving cybersecurity and information protection problems. Based on the subsequent definition of the concept of cyber resilience, it is possible, for example, to develop methods and models for assessing its level.

References

SPILNO [Electronic resource] spilno.org//Mode of access:// https: // spilno.org /article/kiberstiikist-sc¬ho-tse-yak-zabezpechyty-ta-yak-upravlyaty //(date of access: 20.12.2023).

INTRACOM-UKRAINE [Electronic resource] intracom-ukraine.com//Mode of access:// https:// www.intracom-ukraine.com/cyber-security-cyber-re-silience//(date of access: 20.12.2023).

EGA [Electronic resource] ega.ee// Mode of access://https://ega.ee/uk/publication/ncsi-pidvish-hennya-natsionalnoyi-kiberstijkosti//(date of access: 20.12.2023).

ПЛАТФОРМА ЛІГА:ЗАКОН [Electronic resource] ips.ligazakon.net//Mode of access: //https:// ips.ligazakon.net / document / TM065903 / (date of access: 20.12.2023).

Онищенко С.В., Глушко А.Д., Маслій О.А. Кібе-рстійкість як основа національної безпеки Украї-ни / Innovations and prospects of world science : Proceedings of XI International Scientific and Practical Conference, Vancouver, Canada, 22-24 June 2022. Vancouver: Perfect Publishing, 2022. С. 551-556.

ts2 [Electronic resource] ts2.space // Mode of ac-cess://https://ts2.space/uk/%D0%BA%D1%96 %D0%B1%D0%B5%D1%80%D1%81%D1%82%D1%96%D0%B9%D0%BA%D1%96%D1%81%D1%82%D1%8C//(date of access: 20.12.2023).

Мальцева І. Р., Черниш Ю. О., Овсянніков В. В. Аналіз методик оцінки кіберстійкості критичної інфраструктури. Кібербезпека: освіта, наука, тех-ніка :електронне наукове видання. 2021. N 12. С. 29-35. Режим доступу: http://ek.kubg.edu.ua/cgi-bin/irbis64r_17/cgiirbis_64.exe?LNG=&Z21ID=&I21DBN=KUBG&P21DBN=KUBG&S21STN=1&S21REF=3&S21FMT=fullwebr&C21COM=S&S21CNR=20&S21P01=0&S21P02=0&S21LOG=1&S21P03=K=&S21STR=%D0%BA%D1%96%D0%B1%D0%B5%D1%80%D1%81%D1%82%D1%96%D0%B9%D0%BA%D1%96%D1%81%D1%82%D1%8C//(date of access: 20.12.2023).

ECB [Electronic resource] ecb.europa.eu// Mode of access://https://www.ecb.europa.eu/paym/cyber-resilience/html/index.en.html#:~:text=Cyber%20 resilience%20refers%20to%20the,case%20of%20a%20successful%20attack//(date of access: 20.12.2023).

NIST [Electronic resource] csrc.nist.gov//Mode of access: // https: // csrc.nist.gov / glossary/term/ cy¬ber_resiliency//(date of access: 20.12.2023).

Спеціальна публікація NIST 800-53В "NIST Cybersecurity Framework [Electronic resource] csrc.nist.gov // Mode of access: //https://csrc.nist. gov/projects/cprt/catalog#/cprt/framework/version/ SP_800_53_5_1_1 /home// (date of access: 20. 12.2023).

SPLUNK [Electronic resource] splunk.com // Mode of access:// https://www.splunk.com/en_us/blog/ learn/ cyber-resilience.html // (date of access: 20.12. 2023).

itgovernance [Electronic resource] itgovernance. co.uk //Mode of access: // https: //www.itgover-nance.co.uk/(date of access: 20.12.2023).

CISCO [Electronic resource] www.cisco.com//Mode of access: // https: // www.cisco.com / c / en / us/ solutions/hybrid-work/what-is-cyber-resilience.html // (date of access: 20.12.2023).

PNNL [Electronic resource] pnnl.gov//Mode of access://https: // www.pnnl.gov /explainer-articles/ cyber-resilience(date of access: 20.12.2023).

MIMECAST [Electronic resource] mimecast.com// Mode of access://https://www.mimecast.com/con-tent/cyber-resilience/(date of access: 20.12.2023).

SPRINGER LINK [Electronic resource] link. springer.com// Mode of access: // https:// link. spri-nger.com/chapter/10.1007/978-3-319-16486-1_31 //(date of access: 20.12.2023).

Deborah, B., Graubart, R. (2011), “Cyber Resiliency Engineering Framework”, MITRE Report, p. 37.

COHESITY [Electronic resource] cohesity.com// Mode of access:// https://www.cohesity.com/glossary/cyber-resilience//(date of access: 20.12.2023).

THALESGROUP [Electronic resource] thalesgro-up.com // Mode of access:// https://www.thalesgroup.com/en/cyber-resilience//(date of access: 20. 12.2023).

FSB [Electronic resource] fsb.org // Mode of ac-cess:// https://www.fsb.org/work-of-the-fsb/financial-innovation-and-structural-change/cyber-resilience//(date of access: 20.12.2023).

DELOITTE [Electronic resource] deloitte.com // Mode of access: // https://www.deloitte.com/ ru/ en/pages/risk/solutions/cyberresilience.html//(date of access: 20.12.2023).

ISO/IEC 27032:2012 [Electronic resource] iso.org //Mode of access:// https://www.iso.org/ru/standard/76070.html (date of access: 20.12.2023).

ENISA [Electronic resource] enisa.europa // Mode of access:// www.enisa.europa.eu (date of access: 20. 12.2023).

CyberResilienceReview [Electronic resource] cisa.gov //Mode of access:// https://www.cisa.gov/resources-tools/services / cyber-resilience-review-crr (date of access: 20.12.2023).

Шиповський В. Система показників оцінювання кіберстійкості інформаційних систем об’єктів критичної інфраструктури. Захист Інформації, Том 25, № 1, Січень-Березень 2023. С. 37-45.

Juan F. Carías, SaioaArrizabalaga, LeireLabaka and JosuneHernantes. Cyber Resilience Progression Model. Applied Scitnces. 2020. Vol.10(21), 7393.

R.S. Ross, R. Graubart, D. Bodeau, R. McQuaid, SystemsSecurityEngineering: CyberResiliencyCon-siderationsfortheEngineeringofTrustworthySecureSystems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, 2019, Vol. 2. // Mode of access://https: //doi.org/10.6028/NIST.SP.800-160v2. (date of access: 20.12.2023).

Brian West. Data Breach Preparation and Response. Breaches Are Certain, Impact Is Not. 2016, pp. 167-185. //Mode of access://https://doi.org/10.1016/ B978-0-12-803451-4.00007-1 (date of access: 20.12. 2023).

Benoît Dupont, Clifford Shearinga, Marilyne Bernier, Rutger Leukfeldt. The tensions of cyber-resilience: From sensemaking to practice. Computers & Securi-ty Volume 132, September 2023, 103372//Mode of access: // https:// doi.org/10.1016/j.cose.2023.103372 //(date of ac-cess: 20.12.2023).

Carlos Espinoza-Zelaya, Young Bai Moon. Frame-work for enhancing the operational resilience of cyber-manufacturing systems against cyber-attacks. Manufacturing Letters. Volume 35, Supplement, Au-gust 2023, pp 843-850. //Mode of access: //https: // doi.org / 10.1016/j.mfglet.2023.07.004// (date of access: 20.12.2023).

UPGUARD [Electronic resource] upguard.com// Mode of access://https://www.upguard.com/blog/ cyber-resilience//(date of access: 20.12.2023).

ZERTO [Electronic resource] zerto.com //Mode of access://https://www.zerto.com/resources/a-to-ze-rto/cyber-resilience (date of access: 20.12.2023).

DRUVA [Electronic resource] druva.com //Mode of access:// https://www.druva.com/glossary/what-is-cyber-resilience//(date of access: 20.12.2023).

TECHTARGET [Electronic resource] techtarget. com // Mode of access: // https: //www.techtarget. com/whatis / definition / cyber-resilience // (date of access: 20.12.2023).

MICROSOFT [Electronic resource] microsoft.com // Mode of access://https://www.microsoft.com/ uk-ua /security / business/ microsoft-digital-defense-report-2022-cyber-resilience (date of access: 20.12. 2023).

Published

2023-12-24