DETERMINING OF THE RELEVANCE THREATS OF INFORMATION SECURITY IN INDUSTRIAL CONTROL SYSTEMS
DOI:
https://doi.org/10.18372/2410-7840.17.9519Keywords:
threat, information security, industrial control systems, vulnerability, method, model.Abstract
In order to solve problems related to the information security in the industrial control systems shows a generalized model of information security. The studies and analysisof the interaction between the system of information security and destabilizing factors such as threats, favorable conditions for the realization of these threats, vulnerabilities are realized. It was shown that the relevance ofthe information security threats is proportional to theprobability of the threat and the ratio of its danger is show. Expressions for the determination of the likelihoodof threats to information security and the coefficient of itsdanger are given. A method for determining the actual information security threats in the automated process control systems, and formulated the initial data neededfor this are given.References
Гончар С.Ф. Особенности обеспечения кибербезопасности индустриальных систем управления :тези доповідей міжнародної науково-практичної конференції «Проблеми та перспективи розвитку
енергетики, електротехнологій та автоматики в АПК», Київ, – 2013. – С. 36-37.
Исследование: уязвимости промышленных систем управления в 2014 году // [Електронний ресурс]. – Режим доступу: http://habrahabr.ru/
company /pt / blog /258039/.
Мохор В. В. Построение оценок рисков безопасности информации на основе динамического множества актуальных угроз / В. В. Мохор, А. М. Богданов, О. Н. Крук, В. В. Цуркан // Збірник наукових праць Інституту проблем моделюванняв енергетиці ім. Г. Є. Пухова. – К.: ІПМЕ ім. Г. Є. Пухова НАН України, 2010. – Вип. 56. – С. 87-99.
Домарев В.В. "Безопасность информационных технологий. Методология создания систем защиты" – К.: ООО "ТИД "ДС", 2002. – 688 с.
Гончар С.Ф. Аналіз ймовірності реалізації загроз захисту інформації в автоматизованих системах управління технологічним процесом // Захист інформації. – 2014. – том 16, № 1. – С. 40-46.
Power systems management and associated information exchange – Data and communications security: IEC 62351-1. – Part 1: Communication network and system security – Introduction to
security issues.
Industrial communication networks – Network and system security: IEC 62443-1-1. – Part 1-1: Terminology, concepts and models.
Антонюк А.А., Боровская Е.Н., Суслов В.Ю. Модель угроз информации в защищенных автоматизированных системах // Безопасность информации. – 2001. – № 2. – С. 17-22
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).