An evaluation strategy of state security level from the risk of external cyber influence
DOI:
https://doi.org/10.18372/2410-7840.15.4207Keywords:
strategy of assessment, protection level evaluation, cyber influence, information and telecommunication technologies, cybersecurity, cyber threat, cyber spaceAbstract
In industrialized countries, the task of protection level evaluation of its information and cyber infrastructure from the external cyber influence refers to the number of priority. The problem solving now is impossible without an integrated study of the systems cyber-security ability of these countries to counter such influence and its destructive effects. First of all it is caused by the continuous increase of the information, that circulates, accumulates and processed in the cyberspaces of these countries, and also by the increase of speed of its transmission, by the rapid development of new information and telecommunication technologies and general computerization, in particular, an access to the Internet, as well as the need to protect information from internal and external cyber threats and interferences. Taking the above mentioned into consideration, it was represented the strategy of actions which will give an opportunity: the first is to evaluate a level of state security from the risk of external cyber influence; the second is to obtain the quantitative value of " Cyber Power Index ", what characterizes the readiness of State objects cyberinfrastructure for safe operation under such conditions; thirdly, to establish requirements for the State systems development of cyber-security and to develop measures aimed to increase its effectiveness. It was established, that the level of cyber security awareness to attacks in cyberspace, mainly depends on the presence of implemented regulatory framework and the substantial technological infrastructure of the country, the condition of its socio-economic development, as well as the usage of information and communication technologies and systems by the country. For protection level evaluation it was offered to use the questionnaire method - one of the known methods of expert assessment.
References
Бешелев С. Д., Гурвич Ф. Г. Экспертные оценки. – М.: Наука, 1973. – 263 с.
Бурячок В.Л., Луханин М.И., Митрахович М.М. Методика експертного отбора научно-исследовательских и опытно-конструкторских работ при формировании проектов научно-технических программ // Артиллерийское и Стрелковое Вооружение. – 2007. – Спецвыпуск. – С. 23–29.
Кини Р.Л., Райфа Х. Принятие решений при многих критериях: предпочтение и замещение. – М.: Радио и связь, 1981. – 346 с.
Beshelev S.D., Gurvich F.G. Expert estimate, M.: Nauka, 1973, 263 p.
Buryachok V.L., Lukhanin M.I., Mitrakhovich M.M. Methodology of expert selection of research and experience works at forming projects of the scientific and technical programs // Artillery and rifle armaments, 2007, Special Edition, P. 23–29.
KEENEY R.L., RAIFFA H Decisions with Multiple Objectives: Preferences and Value Tradeoff,M.: Radio i svyazʹ, 1981, 346 p.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).