Electronic modeling

Vol 47, No 5 (2025)

CONTENTS

Mathematical modeling and Computation Methods

 

Kovalchuk L.V., Bespalov O.Yu., Klymenko T.M.
New Techniques for Testing Random/Pseudorando Sequence Generators at Various Stages of Their Operation


3-22

Informational Technologics

 

Rogoza W.S., Borysenko Ye.A.
Determination of the Content Similarity of Text Docu­ments Using a Two-Stage Analysis Method


23-39
 

Nedoseka S.A.
Automated Assessment Of The Pipeline Metalʼs Residual Resource


40-55 
 

Potenko O., Komarov M., Artemchuk V., Zubok V., Honchar S.
Comparative Analysis of New Ukrainian and International Information Security Standards


56-74 
 

Shevchenko S.S.
A Comprehensive Approach and a Role-Based Interaction Model for Designing Cooperative Scenarios In Interactive Training Systems


75-86 

Application of Modeling Methods and Facilities

 

Saukh S., Kliuzko O.
Forecasting Electricity Consumption Under Condi­tions of Rocket and Drone Attacks on the Power System


87-104 
  Havrysh V.I. 
Mathematical Models and Analysis of the Temperature Field Resulting From Heating of Electronic Devices

105-125  

NEW TECHNIQUES FOR TESTING RANDOM/PSEUDORANDO SEQUENCE GENERATORS AT VARIOUS STAGES OF THEIR OPERATION

L.V. Kovalchuk, O.Yu. Bespalov, T.M. Klymenko

Èlektron. model. 2025, 47(5):03-22

https://doi.org/10.15407/emodel.47.05.003

ABSTRACT

The issue of verifying the correct functioning of random/pseudorandom sequence generators designed for cryptographic applications is considered. Three different methods for checking the qua­lity of the generator are proposed: a first-level method designed to check the cryptographic qualities of the generator when it is approved for operation or after major repairs; a second-level method designed for periodic checking of the generator’s operation (for example, every month); and a third-level method designed for continuous checking of the generator throughout its entire operation. Each method has its own tasks: the first-level method conducts the most detailed study and determines whether the developed generator can actually be used to generate key data; the second-level method verifies that there has been no deterioration in the quality of the generator’s operation du­ring its operation; the third-level methodology operates in real time and is aimed at instantly detecting significant malfunctions in the generator. All these methodologies are developed and described step by step in the paper. A full justification of the conclusions drawn from the application of the methods is also provided. The results obtained are the basis for the development of a National Standard for Testing the Cryptographic Qualities of Generators, which is still absent in Ukraine.

KEYWORDS

random/pseudorandom number generators, statistical tests, cryptographic qua­lities of the number generator.

REFERENCES

  1. Bikos, Anastasios, Panagiotis, E. Nastou, Georgios, Petroudis, Yannis, C. Stamatiou. (2023). Random Number Generators: Principles and Applications. Cryptography 7(4), 54. 
    https://doi.org/10.3390/cryptography7040054
  2. Blum, L., Blum, M., Shub, M.A. (1986). Simple Unpredictable Pseudo-random Number Generator. SIAM Journal on Computing, 15(2), 364-383.
    https://doi.org/10.1137/0215025
  3. Bassham, III L.E., Rukhin, A.L., Soto, J., Nechvatal, J.R., Smid, M.E., Barker, E.B. and others. (2010). A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publication 800-22, Revision 1a. 
    https://doi.org/10.6028/NIST.SP.800-22r1a
  4. Maurer, U.M. A Universal Statistical Test for Random Bit Generators. (1992). Journal of Cryptolojy. 5, 89-105.
  5. Ziv, J., Lempel, A.A. (2023). Universal Algorithm for Sequential Data Compression. IEEE Transactions on Information Theory. 22, 337-3432.
  6. Crocetti, L., Nannipieri, P., Di Matteo, S., Fanucci, L., Saponara, S. (2023). Review of Me­thodologies and Metrics for Assessing the Quality of Random Number Generators. Electro­nics. 12(3), 723.
    https://doi.org/10.3390/electronics12030723
  7. Marsaglia, G. (2008). The Marsaglia random number CDROM including the diehard battery of tests of randomness. URL: http://www.stat. fsu. edu/pub/diehard/
  8. Verbytskyi, O.V. (1998). Introduction to Cryptology. Lviv: Publishing House of Scientific and Technical Literature. 247. (ukr).
  9. Foreman, C., Yeung, R., Curchod, F.J. (2024). Statistical Testing of Random Number Generators and Their Improvement Using Randomness Extraction. Entropy. 26(12), 1053. 
    https://doi.org/10.3390/e26121053
  10. Pseudorandom Number Generation Using a Block Cipher. https://www.brainkart.com/article/ Pseudorandom-Number-Generation-Using-a-Block-Cipher_8424/
  11. Yu Long Chen1, Eran Lambooij2, and Bart Mennink. How to Build Pseudorandom Functions from Public Random Permutations. https://eprint.iacr.org/2019/554.pdf
  12. Administration of the State Service for Special Communications and Information Protection of Ukraine. Order. 20.07.2007. No 141. On approval of the Regulation on the procedure for the development, production and operation of cryptographic information security means. (ukr) https://zakon.rada.gov.ua/laws/show/z0862-07#Text
  13. Kovalchuk, L., Bezditny, V. (2006). Verification of the independence of statistical tests inten­ded for assessing the cryptographic qualities of GPV. Information Security. 8, 2(29), 18-23. (ukr) https://doi.org/10.18372/2410-7840.8.4944
  14. Kovalchuk, L., Kuchynska, N. (2017). Methods for checking the independence of statistical tests. Information Technology and Security. July-December. 5, 2 (9), 20-32. (ukr) 
    https://doi.org/10.20535/2411-1031.2017.5.2.136941
  15. Kochana, R., Kovalchuk, L., Korchenko O., Kuchynska N. (2021). Statistical Tests Independence Verification Methods. Procedia Computer Science. 192, 2678-2688. https://doi.org/10.1016/j.procs.2021.09.038, https://www.sciencedirect.com/science/article/ pii/S1877050921017750
  16. Der Kiureghian, Armen Liu, Pei-Ling. (1985). Structural reliability under incomplete probability information. https://escholarship.org/uc/item/3739w8d3
  17. Kovalchuk, L., Nelasa, H., Rodinko, M., Bespalov, O. (2024). A new extended strategy of processing of statistical testing results. 11th International Research Conference Information Technology and Implementation 2024 - Workshop: Intelligent Systems and Security, IT and I-WS, CEUR Workshop Proceedings, 3933, 158-167. ISSN 16130073 Publisher CEUR-WS. 
    https://doi.org/10.1016/j.procs.2021.09.038
  18. Kovalchuk, L.V., Koryakov, I.V., Bespalov, O.Yu. (2024). Statistical tests for checking the independence of random variables describing the generation of sequences in cryptoalgorithms. Electronic modeling. 46(3), 22-38. (ukr). 
    https://doi.org/10.15407/emodel
  19. DSTU 9041:2020 Information technologies. Cryptographic information security. Short message encryption algorithm based on twisted elliptic Edwards curves. Effective from 2020-11-01. Kyiv: UkrNDNTS, 2020. IV, 36p. (ukr)
  20. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, NIST Special Publication 800-22 Revision 1a, April 2010. https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-22r1a.pdf

Full text: PDF

 

DETERMINATION OF THE CONTENT SIMILARITY OF TEXT DOCUMENTS USING A TWO-STAGE ANALYSIS METHOD

W.S. Rogoza, Ye.A. Borysenko

Èlektron. model. 2025, 47(5):23-39

https://doi.org/10.15407/emodel.47.05.023

ABSTRACT

Used by users of search engines problem of detecting similar pairs of text documents in large arrays of documents is considered. The weaknesses of traditional approaches to solving this problem are identified, such as significant consumption of computer resources (memory and computing time), which becomes especially vulnerable to mass computers with limited resources in situations where the number of pairs of documents analyzed in terms of their semantic identity reaches billions. It is noted that in such cases, the comparison of documents by content, which requires pairwise calls of documents from disk memory to RAM, can take tens of hours of machine time, which may be unacceptable for a researcher.

A new approach to solving the problem of determining the semantic similarity of documents is proposed, which consists of two stages: 1) approximate determination of the semantic similarity of documents using simplified methods and 2) approximate evaluation of the lexical similarity of documents using the Minhesh signature method. Due to the two-stage solution of the task, a certain compromise between the accuracy of the analysis and resource costs has been achieved. The proposed approach’s theoretical justification and the experimental data presented confirm its effectiveness and give reason to believe that it can serve as a basis for the development of multi-stage methods for identifying semantically similar text documents.

KEYWORDS

information search, unstructured data, semantic and lexical similarity of documents.

REFERENCES

  1. Rogoza W.S., Ishchenko G.V. Direct and Inverse Problems of Information Retreival of Text Documents. Electronic modeling. 2014. Vol. 46, no. 6. P. 8-28.
    https://doi.org/10.15407/emodel.46.06.008
  2. Zhang Z., Gentile A.L., Ciravegna F. Recent advances in methods of lexical semantic relatedness — a survey. Natural language engineering. 2013. Vol. 19, no. 4. P. 411-479.
    https://doi.org/10.1017/S1351324912000125
  3. Goczyła K. Ontologie w systemach informatycznych. Warszawa : Akademicka Oficyna Wydawnicza EXIT, 2011. 310 p.
  4. The description logic handbook / ed. by F. Baader et al. Cambridge : Cambridge University Press, 2003. 574 p.
  5. List of datasets for machine-learning research. URL: https://en.wikipedia.org/wiki/List_of_datasets.
  6. Curiskis S.A. et al. An evaluation of document clustering and topic modelling in two online social networks: Twitter and Reddit. Information processing & management. 2020. Vol. 57, no. 2. P. 1-50.
    https://doi.org/10.1016/j.ipm.2019.04.002
  7. Word2vec. URL: https://en.wikipedia.org/wiki/Word2vec
  8. Sculley D. Web-scale k-means clustering. Proceedings of the 19th international conference on World wide web : Матеріали Міжнародної Наукоіої Конференції, North Carolina, 26 April 2010. P. 1177-1178.
    https://doi.org/10.1145/1772690.1772862
  9. K-means clustering. URL: https://en.wikipedia.org/wiki/K-means_clustering
  10. Qurashi A.W., Holmes V., Johnson A.P. Document processing: methods for semantic text similarity analysis. Methods for semantic text similarity analysis : Матеріали Міжна­родної Наукової конференції, Novi Sad, 24 August 2020. P. 1-6.
    https://doi.org/10.1109/INISTA49547.2020.9194665
  11. Jang B., Kim I., Kim J.W. Word2vec convolutional neural networks for classification of news articles and tweets. PLoS one. 2019. Vol. 14, no. 8. P. 1-20.
    https://doi.org/10.1371/journal.pone.0220976
  12. Amorim R.C., Hennig C. Recovering the number of clusters in data sets with noise features using feature rescaling factors. Information sciences. 2015. Vol. 324, no. 2. P. 126-145.
    https://doi.org/10.1016/j.ins.2015.06.039

Full text: PDF

 

AUTOMATED ASSESSMENT OF THE PIPELINE METALʼS RESIDUAL RESOURCE

S.A. Nedoseka

Èlektron. model. 2025, 47(5):40-55

https://doi.org/10.15407/emodel.47.05.040

ABSTRACT

The automation of determining the damage and residual resources of pipeline materials, in particular, heat and water supply pipelines is discussed. The results of research are presented, which made it possible to propose a universal nomogram for determining the residual resource of pipeline elements based on known damage. An experimentally verified method for determining the damage to pipeline metal with different operating hours using various instrumental methods is also proposed. A program has been developed that allows automated damage assessment using up to ten different evaluation methods and, based on its calculations, assessment of the residual resource. It is shown how the developed tools can be used in the actual control of pipeline system components.

KEYWORDS

damage, residual resource, instrumental methods, automation, program.

REFERENCES

  1. Vladimirsky, O., Vladimirsky, I., Artemchuk, V., Kryvoruchko, I., Semenyuk, D. (2024) Features and development of technologies for detecting leaks in heat and water supply pipelines under conditions of wear and tear and military influences. Electronic modeling. 46(5), 64-73. https://doi.org/10.15407/emodel.46.05.064 [In Ukrainian]
  2. Vladimirsky, A., Vladimirsky, I. (2024) Correlation parametric method for determining the velocity of acoustic wave propagation in a pipeline. Electronic modeling. 46(6), pp. 55-63.
    https://doi.org/10.15407/emodel.46.06.055
  3. Vladimirsky, A., Vladimirsky, I., Artemchuk, V., Kryvoruchko, I., Semenyuk, D. (2025) Adaptation of correlation leak detectors to diagnostics under conditions of military influences and wear of heat and water supply pipelines. Electronic modeling. 47(3), 67-78. https://doi.org/10.15407/emodel.47.03.067 [In Ukrainian]
  4. Skalsky, V. (2003) Assessment of the accumulation of volumetric damage of solids by acoustic emission signals. Technical diagnostics and nondestructive testing. (4), 29-36. [In Ukrainian]
  5. Zelenin, I., Voynalovych, O. (2019) Methodical approach to determining the characteristics of damage of cyclically loaded metal specimens. Proceedings of the International Conference “In-Service Damage of Materials…”. Ternopil, 28-37. [In Ukrainian]
  6. Zelenin, I. (2015) Ultrasonic and metallographic methods for detecting damage to materials. Theses of the IV International Scientific and Technical Conference “Metals”. Ternopil, 266 p. ISBN 978-966-305-073-7. [In Ukrainian]
  7. Pisarenko, G., Voinalovych, O., Mailo, A. (2024) Stochastic regularities in the non-contact determination of damage characteristics in the surface layer of steel 45 under high-cycle loading. Strength of Materials. 56(6), 1108-1116. 
    https://doi.org/10.1007/s11223-025-00721-4
  8. Petriv, O., Moroz, O. (2018) Assessment of damage of welded joints by acoustic emission method. Bulletin of DNUZT. (16), 65-72. [In Ukrainian]
  9. Lemaitre, J. (1985) A Continuous Damage Mechanics Model for Ductile Fracture. Journal of Engineering Materials and Technology. (107), 83-89.
    https://doi.org/10.1115/1.3225775
  10. Chaboche, J., Lemaitre, J. (1992) A Continuous Damage Model for Ductile Materials. International Journal of Damage Mechanics. 1(2), 81-111.
  11. Ju, J. (2008) General Continuum Theory for Static and Cyclic Damage Evolution. Archive of Applied Mechanics. Vol. 77, pp. 121-139.
  12. Kachanov, L. (1958) On the Time to Rupture Process under Creep Conditions. Proceedings of the USSR Academy of Sciences. 24(3), 132-135. [In Russian]
  13. Murakami, Y. (2002) Metal Fatigue: Effects of Small Defects and Nonmetallic Inclusions. Butterworth-Heinemann, Section 3: Damage Evaluation and Tolerance.
  14. GOST 25.601-79 (DSTU GOST 25.601-79) “Methods of testing metals for fatigue. Determination of the degree of damage.” [In Russian]
  15. DSTU ISO TR 15608:2015 “Metals and alloys. Guidelines for assessing damage to structures.” [In Ukrainian]
  16. ISO 23254:2015 “General principles for determination of residual lifetime of structures.”
  17. ISO 13822:2010 “Bases for design of structures — Assessment of existing structures.”
  18. EN 1993-1-9:2005 (Eurocode 3) “Design of steel structures — Part 1-9: Fatigue.”
  19. API 579-1/ASME FFS-1 (2016) “Fitness-for-Service.” Comprehensive standard for damage assessment for metal structures.
  20. DIN 50113:2009 “Testing of metallic materials — Evaluation of damage.”
  21. ASTM E1823-20 “Standard Terminology Relating to Fatigue and Fracture Testing.”
  22. DSTU 2860-94 “Technical reliability. Terms. Residual life» [In Ukrainian]
  23. DSTU 8646:2016 «Technical reliability. Assessment and forecasting of technical systems residual life». [In Ukrainian]
  24. SO 23254:2015 «General principles for determination of residual lifetime of structures»
  25. API 579-1/ASME FFS-1:2016 «Fitness-for-Service»
  26. Lebedev, A., Muzyka, N., Volchek, N., Nedoseka, S. (2003) Evaluation of the current state of the operating gas pipelines metal. Research method and results. Problems of strength. (2), 29-36. [In Russian]
  27. Nedoseka, S., Nedoseka, A. (2010) Complex assessment of damage and final resource of metals with operational development. Technical diagnostics and non-destructive testing. (1), 9-16. [In Russian]
  28. Nedoseka, A.Ya., Nedoseka, S.A. (2020) Fundamentals of calculation and diagnostics of welded structures: textbook. 5th ed., revised. and additional, edited by B. E. Paton. Kyiv, Indprom. [In Russian]
  29. Nedoseka, A.Ya., Nedoseka, S.A. (2021) Fundamentals of calculation and diagnostics of welded structures: textbook. 5th ed., revised. and additional, edited by B. E. Paton. Chapter 7. Kyiv, Indprom. [In Russian]
  30. Nedoseka, A., Nedoseka, S., Yaremenko, M. (2011) Continuous monitoring of main gas pipelines and gas compressor stations by acoustic emission method. Technical diagnostics and nondestructive testing, (4), 3-13. [In Russian]
  31. Lobanov, L., Nedoseka, A., Nedoseka, S. at al. (2003). DSTU 4223-2003. Boilers, pressure vessels and pipelines. Technical diagnostics. General requirements. National standard of Ukraine. [In Ukrainian]
  32. Lobanov, L., Nedoseka, A., Nedoseka, S. at al. (2003). DSTU 4227-2003. Guidelines for conducting acoustic emission diagnostics of high-risk facilities. National standard of Ukraine. [In Ukrainian]
  33. Nedoseka, A., Nedoseka, S., Yaremenko, M. (2011) On control of equipment and pipelines of compressor stations by the method of acoustic emission. International scientific and technical conference "Residual resource and problems of modernization of main and industrial pipeline systems. April 12-13. Kyiv. 31-40. [In Ukrainian]
  34. Nedoseka, S., Nedoseka, A., Yaremenko M. at al (2021). Integration of the AE method into the technology of repair and extension of the resource of metal structures. Technical diagnostics and nondestructive testing. (1) 11-16. [In Ukrainian]

Full text: PDF

 

Comparative analysis of new Ukrainian and international information security standards

O. Potenko, M. Komarov, V. Artemchuk, V. Zubok, S. Honchar

Èlektron. model. 2025, 47(5):56-74

https://doi.org/10.15407/emodel.47.05.056

ABSTRACT

The article provides a comparative analysis of leading international cybersecurity standards (NIST SP 800-53, NIST SP 800-171, ISO/IEC 27001/27002, CMMC 2.0, BSI IT-Grundschutz, ANSSI, ISM) and modern Ukrainian regulatory documents (ND TZI 2.5-004-99, ND TZI 3.6-006-24, ND TZI 2.3-025-24). The structure, terminology, content of control measures and ap­proaches to their implementation and evaluation are considered. Particular attention is paid to the harmonization of Ukrainian standards with international requirements, as well as the identification of current challenges in the field of information security regulation. The results of the study can be used to improve the national cyber security policy, support compliance in IT infrastructure, and develop information security management systems.

A comparative analysis of leading international cybersecurity standards (NIST SP 800-53, NIST SP 800-171, ISO/IEC 27001/27002, CMMC 2.0, BSI IT-Grundschutz, ANSSI, ISM) and modern Ukrainian regulatory documents (ND TZI 2.5-004-99, ND TZI 3.6-006-24, ND TZI 2.3-025-24) was conducted. The structure, terminology, content, and approaches to implementing and evaluating control measures are considered. Particular attention is paid to the harmonization of Ukrainian standards with international requirements, as well as the identification of current challenges in the field of information security regulation. The results of the study can be used to improve national cyber defense policy, support compliance in IT infrastructure, and develop information security management systems.

KEYWORDS

Cybersecurity, cyber threats, security assessment, information security stan­-dards, risk-oriented approach, information security management systems (ISMS).

REFERENCES

  1. NIST SP 800‑53 Rev. 5: Security and Privacy Controls for Information Systems and Orga-nizations. URL: https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final (date of access: 25.08.2025).
  2. NIST SP 800‑53A Rev. 5: Assessment Procedures for Security and Privacy Controls in Information Systems and Organizations. [Електронний ресурс]. URL: https://csrc.nist.gov/publications/detail/sp/800-53a/rev-5/final (date of access: 25.08.2025).
  3. NIST SP 800‑37 Rev. 2: Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. URL: https://csrc.nist.gov/pubs/sp/800/37/r2/final (date of access: 25.08.2025).
  4. NIST SP 800‑171 Rev. 3: Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. URL: https://csrc.nist.gov/pubs/sp/800/171/r3/final (date of access: 25.08.2025).
  5. NIST SP 800‑171A Rev. 3: Assessment Procedures for NIST SP 800‑171. Режим доступу. URL: https://csrc.nist.gov/pubs/sp/800/171/a/r3/final (date of access: 25.08.2025).
  6. CIS Controls v8.1. [Електронний ресурс]. Режим доступу: https://www.cisecurity.org/controls/cis-controls-navigator (date of access: 25.08.2025).
  7. Center for Internet Security: 18 security controls you need. URL: https://www.threatshub.org/blog/center-for-internet-security-18-security-controls-you-need/ (date of access: 25.08.2025).
  8. Cybersecurity Maturity Model Certification 2.13 (CMMC 2.13): Cybersecurity Maturity Model Certification (CMMC) Model Overview. URL:https://dodcio.defense.gov/Portals/0/Documents/CMMC/ModelOverviewv2.pdf (date of access: 25.08.2025).
  9. 52.204‑21: Basic Safeguarding of Covered Contractor Information Systems. URL: https://www.acquisition.gov/far/52.204-21 (date of access: 25.08.2025).
  10. NIST SP 800‑172: Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800‑171. URL: https://csrc.nist.gov/ pubs/sp/800/172/final (date of access: 25.08.2025).
  11. CMMC Assessment Guide Level 2 Version 2.13 September 2024. URL: https://dodcio>. defense.gov/Portals/0/Documents/CMMC/AssessmentGuideL2.pdf (date of access: 25.08.2025).
  12. CMMC Scoping Guide Level 2 Version 2.13 September 2024. URL: https://dodcio.defense.gov/Portals/0/Documents/CMMC/ScopingGuideL2.pdf (date of access: 25.08.2025).
  13. CMMC Hashing Guide Version 2.13 September 2024. URL: https://dodcio.defense.gov/Portals/0/Documents/CMMC/HashingGuide.pdf (date of access: 25.08.2025).
  14. ISO/IEC 27001 : 2022. URL: https://www.iso.org/standard/27001 (date of access: 25.08.2025).
  15. ISO/IEC 27002 : 2022. URL: https://www.iso.org/standard/75652.html (date of access: 25.08.2025).
  16. ISO/IEC 27019 : 2024. URL:https://www.iso.org/standard/85056.html (date of access: 25.08.2025).
  17. BSI IT‑Grundschutz (Baseline Protection). URL: https://www.bsi.bund.de/EN/Themen/Unternehmen-und-Organisationen/Standards-und-Zertifizierung/IT-Grundschutz/it-grundschutz.html (date of access: 25.08.2025).
  18. BSI‑Standard 200-1: Information Security Management Systems (ISMS). Режим доступу: URL: https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Grundschutz/International/bsi-standard-2001_en_pdf.html?nn=908032 (date of access: 25.08.2025).
  19. BSI‑Standard 200-2: IT‑Grundschutz‑Methodology. URL: https://www.bsi.bund.de/ SharedDocs/Downloads/EN/BSI/Grundschutz/International/bsi-standard-2002_en_pdf. html?nn=908032 (date of access: 25.08.2025).
  20. BSI‑Standard 200-3: Risk Analysis based on IT‑Grundschutz. URL: https://www.bsi. bund.de/SharedDocs/Downloads/EN/BSI/Grundschutz/International/bsi-standard-2003_en_ pdf.html?nn=908032 (date of access: 25.08.2025).
  21. GUIDE DʼHYGIÈNE INFORMATIQUE RENFORCER LA SÉCURITÉ DE SON SYSTÈME DʼINFORMATION EN 42 MESURES. URL: https://cyber.gouv.fr/publications/guide-dhygiene-informatique (date of access: 25.08.2025).
  22. EBIOS Risk Manager — The method. URL: https://cyber.gouv.fr/publications/ebios-risk-manager-method (date of access: 25.08.2025).
  23. ANSSI SecNumCloud: the highest level of security for sensitive and critical data. URL: https://www.ovhcloud.com/en-gb/compliance/secnumcloud/ (date of access: 25.08.2025).
  24. Information security manual Last updated: June 2025. URL: https://www.cyber.gov.au/resources-business-and-government/essential-cybersecurity/ism
  25. Information security manual Last updated: June 2025. URL: https://www.cyber.gov.au/sites/default/files/2025-07/Information%20security%20manual%20(June%202025).pdf (date of access: 25.08.2025).
  26. NIST Cybersecurity Framework. URL: https://www.nist.gov/cyberframework (date of access: 25.08.2025).
    https://doi.org/10.6028/NIST.SP.1308.ipd
  27. ND TZI 2.5-004-99 Criteria for Assessing the Information Security of Computer Systems Against Unauthorized Access. URL: https://cip.gov.ua/services/cm/api/attachment/download?id=66094 (date of access: 25.08.2025).
  28. DoD 5200.28‑STD: Department of Defense Trusted Computer System Evaluation Criteria. URL: https://csrc.nist.gov/files/pubs/conference/1998/10/08/proceedings-of-the-21st-nissc- 1998/final/docs/early-cs-papers/dod85.pdf (date of access: 25.08.2025).
  29. Potenko O.S. Determination of the Functional Profile of Automated System Protection: Monograph / Potenko O.S. Kyiv: Institute of Modeling Problems in Energy named after H.E. Pukhov NAS of Ukraine, 2024. 146 p.
  30. ND TZI 2.7-010-09: Guidelines for Evaluating the Level of Assurance of Correct Implementation of Security Functionality in Information Protection Means Against Unauthorized Access. URL: https://cip.gov.ua/services/cm/api/attachment/download?id=66104 (date of access: 25.08.2025).
  31. ND TZI 3.6-006-24: Procedure for Selecting Information Protection Measures, the Protection of Which is Mandated by Law and Does Not Constitute State Secret, for Information Systems. URL: https://cip.gov.ua/services/cm/api/attachment/download?id=66109 (date of access: 25.08.2025).
  32. ND TZI 2.3-025-24: Methodology for Evaluating Information Protection Measures, the Protection of Which is Mandated by Law and Does Not Constitute State Secret, for Information Systems. Volume 1. URL: https://cip.gov.ua/services/cm/api/attachment/download?id=66105 (date of access: 25.08.2025).
  33. ND TZI 2.3-025-24: Methodology for Evaluating Information Protection Measures, the Protection of Which is Mandated by Law and Does Not Constitute State Secret, for Information Systems. Volume 2. URL: https://cip.gov.ua/services/cm/api/attachment/download?id=66108 (date of access: 25.08.2025).
  34. ND TZI 2.3-025-24: Methodology for Evaluating Information Protection Measures, the Protection of Which is Mandated by Law and Does Not Constitute State Secret, for Information Systems. Volume 3. URL: https://cip.gov.ua/services/cm/api/attachment/download?id=66107 (date of access: 25.08.2025).

Full text: PDF