Dynamic time analysis of the influence of threat factors on the level of security of the critical infrastructure object
DOI:
https://doi.org/10.18372/2410-7840.22.14976Keywords:
information security, critical infrastructure, cognitive modeling, fuzzy cognitive map, dynamic causal algebraAbstract
Disruption of critical infrastructure (CI) can lead to emergencies that will have far-reaching negative consequences for the lives of both individual cities and the state as a whole. In this regard, the timely detection of threats and determining their impact on the level of protection of the CI object plays an important role. Given the importance of this issue, the paper proposes to conduct a dynamic analysis of the cognitive model to study the level of protection of this object. Based on dynamic causal algebra, the influence of the most important concepts of the system was determined: security of the security system and security of the computer network on security of the CI at different points in time. To achieve this goal, a vector of vertex thresholds is given, which does not depend on time and distinguishes all insignificant influences between concepts and a vector of vertex state, in which the studied vertex is activated from the outside and remains active throughout the process. Defined -wave, which generates the process of activation of the vertices and the corresponding paths. The time of stabilization of the process is set. The influences along all activated paths from the studied concepts to the target ones are calculated, on the basis of the obtained values the total influences of these concepts are determined, which are displayed graphically using the Microsoft Excel software. To automate the dynamic modeling of the analysis of the impact of concepts, a software tool has been developed that allows to reduce the time for data processing and increase the speed of their processing. After analyzing this graph, we can conclude that the security of the security system at different times has a greater impact on the security of CI than the security of the computer network, which, in turn, confirms the reliability of the results of scenario modeling.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).