Model of the States of Critical Information Infrastructure Subjects under Destructive Influences in Static Mode
https://doi.org/10.31854/1813-324X-2021-7-3-65-72
Abstract
With the introduction of 187-FL "On the security of critical information infrastructure in the Russian Federation", a class of tasks requiring new approaches was determined. This is due to the solution of not only practical problems with the introduction of this law, but also with the development of its scientific and methodological support, which is one of the tasks of regulators. The main regulatory problem in ensuring the security of critical information infrastructure (CII), in our opinion, is associated with the lack of a systematic approach as a methodological basis for developing requirements for the development of CII. This leads to gross errors and errors in the course of making managerial decisions, therefore, to an increase in information security risks. When considering the subject of CII as a system, there is a need to consider inter-object relationships as sources of destructive influences that can lead to the effect of infrastructural "destructivism", i.e. to the self-destruction of infrastructure. To study this issue at the initial stage, it is proposed to build a model of the states of CII subjects in a static mode. In the course of working with this model, it is possible to predict the development of the situation of self-destruction of the infrastructure of the CII subject in a situation of uncertainty.
About the Author
E. MaksimovaRussian Federation
Moscow, 119454
References
1. Maksimova E.A. “Smart Decisions” in Development of a Model for Protecting Information of a Subject of Critical Information Infrastructure. In: Popkova E.G., Sergi B.S. (eds) "Smart Technologies" for Society, State and Economy. Institute of Scientific Communications Conference (ISC 2020). Lecture Notes in Networks and Systems. Cham: Springer; 2020. vol.155. p.1213–1221. DOI:10.1007/978-3-030-59126-7_132
2. Maksimova E.A., Baranov V.V. Predicting Destructive Malicious Impacts on the Subject of Critical Information Infrastructure. Proceedings of the IIIrd International Conference on Futuristic Trends in Networks and Computing Technologies, FTNCT 2020, 14–16 October 2020, Taganrog, Russia. Communications in Computer and Information Science. Singapore: Springer; 2021. p.88–99. DOI:10.1007/978-981-16-1480-4_8
3. Azhmukhamedov I.M. Management of Weakly Formalized Sociotechnical Systems Based on Fuzzy Cognitive Modeling (on the Example of Integrated Information Security Systems). D.Sc Thesis. Astrakhan: Astrakhan State Technical University Publ.; 2014. 334 p. (in Russ.)
4. Sadovnikova N.P., Zhidkova N.P. Selection of Territorial Development Strategies Based on Cognitive Analysis and Scenario Modeling. Internet-Vestnik VolgGASU. 2012:7(21):4. (in Russ.)
5. Sadovnikova N.P. Application of the Cognitive Modeling for Analysis of the Ecological and Economical Efficiency of the Urban Planning Project. Internet-Vestnik VolgGASU. 2011;5(14).
6. Roberts F.S. Discrete Mathematical Models with Applications to Social, Biological and Environmental Problems. Translate from English. Moscow: Nauka Publ.; 1986. 496 p. (in Russ.)
7. Obiedat M., Samarasinghe S. Fuzzy representation and aggregation of fuzzy cognitive maps. Proceedings of the 20th International Congress on Modelling and Simulation, MODSIM2013, 1–6 December 2013, Adelaide, Australia. Modelling and Simulation Society of Australia and New Zealand Inc.; 2013. p. 690‒694. Available from: https://researcharchive.lincoln.ac.nz/ handle/10182/5778 [Accessed 24th September 2021]
8. Buinevich M.V., Izrailov K.E. Anthropomorphic Approach to Description of the Vulnerabilities Interaction in Program Code. Part 1. Types of Interactions. Zaŝita informacii. Inside. 20195(89):78‒85. (in Russ.)
9. Buinevich M.V., Izrailov K.E. Anthropomorphic Approach to Description of the Vulnerabilities Interaction in Program Code. Pt. 2. Metric of Vulnerabilities. Zaŝita informacii. Inside. 2019;6(90):61‒65. (in Russ.)
10. Veselov G.E. The Theory of Hierarchical Management of Complex Systems: a Synergetic Approach. Proceedings of the VIIIth All-Russian Scientific Conference "System Synthesis and Applied Synergetics", 18‒20 September 2017, Nizhny Arkhyz, Russia. Rostov-on-Don: Southern Federal University Publ.; 2017. p.23‒43. (in Russ.)
11. MentalModeler. Available from: http://www.mentalmodeler.org [Accessed 24th September 2021]
12. Ryabinin I.A. Logical-Probabilistic Analysis and its Modern Possibilities. Biosphere. 2010;2(1):23‒28. (in Russ.)
13. Alekseev V.V. Development of Logical-Probabilistic Models, Methods and Algorithms for Risk and Efficiency Management in Structurally Complex Systems. PhD Thesis. St. Petersburg: Saint Petersburg State University of Aerospace Instrumentation Publ.; 2009. (in Russ.)
14. Mozhaev A.S., Gromov V.N. Theoretical Foundations of the General Logical-Probabilistic Method of Automated System Modeling. St. Petersburg: VITU Publ.; 2000. 144 p. (in Russ.)
Review
For citations:
Maksimova E. Model of the States of Critical Information Infrastructure Subjects under Destructive Influences in Static Mode. Proceedings of Telecommunication Universities. 2021;7(3):65-72. (In Russ.) https://doi.org/10.31854/1813-324X-2021-7-3-65-72