Written by tuzs
Cognitive Modeling of Destructive Malicious Impacts on Critical Information Infrastructure Objects
- Abstract: The security of a subject of critical information infrastructure (CII) is one of the key issues of its life support. The current approach (legal and regulatory) regulates solutions of this issue without taking into account the influence of the violator, which can have a destructive effect on the SCII. This, in our opinion, leads to significant errors in the analysis of the information security of the CII, therefore, reduces the effectiveness of the information protection means declared information security tools for CII objects. The purpose of this work is to develop a model of an information security (IS) intruder, presented in a formalized form using the "violator’s potential" parameter in the space of their implementation of destructive effects on the objects of the CII. The proposed model for assessing the capabilities of the offender to implement destructive influences on the CII subject as a set of objects is implemented in the developed cognitive map "Assessment of the IB of the CII Subject" for dynamic changes in the parameters of the "Malicious actions on the CII object" vertex.
- Keywords: violator, subject, critical information infrastructure, category, destructive effects, model, cognitive model.