QUANTITATIVE ASSESSMENT OF SECURE OPERATION OF INFORMATION SYSTEMS

Authors

DOI:

https://doi.org/10.18372/2410-7840.26.20008

Keywords:

coefficient of readiness for safe operation, modeling, graphical interpretation, information systems, parameters, attempts of illegal access to information

Abstract

The basis of information security is the activity of protecting information — ensuring its confidentiality, availability and integrity, as well as preventing any compromise in a critical situation. Its correct provision is responsible for the security of the company's information infrastructure, the security of all its data and their confidentiality.

Currently, information security is in trend, however, it is always necessary to remember that it is not a set of expensive technical means, but a continuous process that must be constantly improved, responding to the emergence of new threats and attack techniques. The damage from these threats can significantly exceed the cost of implementing protective measures, and it is clear that these risks must be mitigated as effectively as possible.

The article developed a model for quantitatively assessing the coefficient of readiness for safe operation of information systems. To do this, the following was done:

  • modeling the coefficient of readiness for safe operation, taking into account the impact of the simultaneous appearance in the system of several vulnerabilities of the same type;
  • modeling the coefficient of readiness for safe operation, taking into account the probability of the presence of r unremedied vulnerabilities (real threats of vulnerabilities) in the system at the same time;
  • modeling the readiness factor for the safe operation of a set of computers, for example, computer networks, where several vulnerabilities can be eliminated at the same time;
  • modeling factor of readiness for safe operation if the protection system used for vulnerability leveling is ready for safe operation.

For graphical interpretation of dependencies, graphic materials are presented, for which simulations were performed in the MatLab system. The graphic materials clearly indicate the possibility of obtaining a state of safe operation of information systems depending on the intensity of stopping attempts by the protection system of illegal access to information, and the intensity of such attempts at the entrance to the protection system.

This will allow developers of information systems and service personnel to have quantitative indicators of the coefficient of readiness for safe operation of the system and decision-making regarding possible vulnerabilities.

Author Biographies

Volodymyr Akhramovych, State university «Kyiv aviation institute»

Doctor of Technical Science, Professor, Professor, Department of Cybersecurity of the State University «Kyiv Aviation Institute», Kyiv, Ukraine.

Sergii Chuprun, State University of information and telecommunication technologies

Postgraduate of the Department of Information and Cyber Defense Systems of the State University of information and telecommunication technologies, Kyiv, Ukraine.

Roman Prydybailo, State University of information and telecommunication technologies

Postgraduate of the Department of Information and Cyber Defense Systems of the State University of information and telecommunication technologies, Kyiv, Ukraine.

References

Netscout. DDoS Threat Intelligence Report / Findings from 1st half 2023. Internet Traffic and Slipstreamed Threats. DOI:10.30534/ijatcse/ 2019/12812019. URL: https://www. netscout.com/threatreport/internet-traffic- slipstreamed-threats/

Timan, T., Mann, Z. (2021). Data Protection in the Era of Artificial Intelligence: Trends, Existing Solutions and Recommendations for Privacy-Preserving Technologies. In: Curry, E., Metzger, A., Zillner, S., Pazzaglia, JC., García Robles, A. (eds) The Elements of Big Data Value. Springer, Cham. Pp. 153-175.https://doi.org/10.1007/ 978-3-030-68176-0_7

Ахрамович В.М. Інформатика. Програмне забезпечення (навчальний посібник) Практикум: навч.-метод. посіб..- К.:ДП «Інформ.-аналіт. Агенство», 2013.-276с

Ахрамович В.М. Інформатика. Програмне забезпечення (навчальний посібник) Навчальний посібник.- К.:ДП «Інформ.-аналіт. агенство», 2012.-375с

Гарбарчук В., Зінович З., Свіц О. Кібернетичний підхід до проектування систем захисту інформації / Українська академія інформатики; Волинський держ. ун-т ім. Лесі Українки; Люблінський політехнічний ун-т. - К.; Луцьк; Люблін, 2003. - 658 с.

Домарев В.В. Безпека інформаційних технологій. Методологія створення систем захисту. - Вид-во «ДіаСофт», 2002. - 693с.

Козачок, В. А., Гайдур, Г. І., Гахов, С. О., Хмелевський, Р. М., Чумак, Н. С. Політики безпеки. Навчальний посібник для студентів вищих навчальних закладів. Київ: ДУТ ННІЗІ, 2020.167 с.

Маслова Н.А. Побудова моделі захисту інформації із заданими характеристиками якості //Штучний інтелект. – Донецьк: ІШІ, 2007. – №1. – С. 51-57.

Методологія захисту інформації. Аспекти кібербезпеки: підручник/ Г.М. Гулак – К.: Видавництво НА СБ України, 2020/ -256 с.

Якименко, Ю. М., Савченко, В. А., Легомінова, С. В. Системний аналіз інформаційної безпеки: сучасні методи управління: підручник. Київ: Державний університет телекомунікацій, 2022. 308 с.

Published

2025-05-19