INVESTIGATION OF THE PROBLEM OF CYBERSQUITY OF THE UES OF UKRAINE AS A WHOLE

S.F. Honchar, R.P. Herasymov, V.V. Tkachenko

Èlektron. model. 2018, 41(1):43-54
https://doi.org/10.15407/emodel.41.01.043

ABSTRACT

The operation of critical infrastructure objects in a specific environment such as cyberspace is associated with vulnerabilities and threats, and requires the development of new tools to ensure the sustainability of functioning in a computer attack. Management of the sustainability of the critical information infrastructure of the United Energy System of Ukraine is based on knowledge of the state of the objects of management, the state of the functioning environment and the effects that take place. An integral element of such control systems is a number of decision support subsystems. The capabilities of the management system directly depend on the ability of the decision support subsystem to provide the decision maker with a well-balanced information that characterizes the real and predicted states of the critical infrastructure objects and propose a reasonable choice of the trajectory for achieving the goal. In this regard, the development of a methodology for assessing the critical information infrastructure functioning in cyberspace is an urgent task.

KEYWORDS

cyber life, technique, property, infrastructure, cyber resistance, cyberspace.

REFERENCES

  1. Korchenko, G., Buryachok, V.L. and Hnatyuk, S.O. (2013), “Cybernetic security of the state: characteristic features and problem aspects”, Bezpeka informatsiyi, Vol. 19, no. 1, pp. 40-45.
  2. Melnyk, V., Tikhomirov, O. and Lenkov, O.S. (2011), “On the Problem of the Formation of the Conceptual-Terminological Device of Cyber security”, Zb. nauk. prats Viyskovoho in-tu KNU im. Tarasa Shevchenka, Vol. 30, pp. 159-165.
  3. Tropina, T.L. (2003), “Cyber crime and cyber-terrorism: let’s talk about the conceptual apparatus”, Sb. nauch. trudov mezhdunar. konf. «Informatsionnyye tekhnologii i bezopasnost» [Scientific works of the Intern. conf. “Information Technology and Security”], Vol. 3, Kiev, NAS of Ukraine, pp. 173-181.

Full text: PDF