Doklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki (Apr 2023)

Model and Method for Determining the Optimal Structure of the Security System for Critical Information Infrastructure

  • V. A. Gasimov,
  • J. I. Mammadov

DOI
https://doi.org/10.35596/1729-7648-2023-21-2-95-103
Journal volume & issue
Vol. 21, no. 2
pp. 95 – 103

Abstract

Read online

The article investigates the problem of information security of critical information infrastructures. The features of critical objects from the point of view of collecting, processing, storing and transmitting information are analysed. The set of functions performed by the information security system in critical infrastructures and the dependencies between these functions are studied. A model of the security system is proposed and the require ments for this model are defined. At the same time, the set of relations between objects and threats is represented in the form of an object-threat relationship graph, in which an edge connecting the j-th object with the i-th threat exists only when the i-th threat can directly affect the j-th object. To protect objects of critical information infrastructures from possible threats, a set of necessary methods and tools has been introduced into the model of the security system, which converts a two-sided graph into a three-sided one, such as “object – method – threat”. Further in the article, the problem of determining the optimal structure of the security system for critical information infrastructure objects is considered. It is assumed here that each threat can affect several objects, and that any object can be affected by more than one threat. The solution of this problem makes it possible to minimize the material costs to implement the methods and tools for protection and minimize damage from a security breach.

Keywords