Network-Centric Monitoring for Cyber Incidents in Sectors of Critical State Infrastructure
Journal: Cybersecurity: Education, Science, Technique (Vol.2, No. 2)Publication Date: 2019-03-03
Authors : Sergiy O. Gnatyuk Vitaliy V. Kishchenko Vitaliy V. Kotelianets Madina Bauyrzhan;
Page : 80-89
Keywords : incident; cybersecurity; network-centric monitoring; concept; critical infrastructure; CSIRT;
Abstract
Information and communication technologies implementation in most areas of human life is aimed at improving the efficiency of business processes, but the emergence of new vulnerabilities and cyberthreats generates cybersecurity incidents. To localize and neutralize incidents effective management techniques are necessary. These processes are very actual for critical information infrastructure of the state, because destructive influences on objects of critical information infrastructure can cause big losses for the state (human life, material and status losses). Known methods for incidents management are not oriented on some special components and parameters of the cyberspace. It complicates implementation of these methods in real information and communication systems. From this viewpoint, in this paper the concept of network-centric incident management was developed. It allows to identify the most important (real) objects of critical information infrastructure protection and cybersecurity incidents to predict the categories that arise as a result of specific cyberattacks and their risk level. Further research study consists in instrumental tools based on mentioned concept. These tools can be useful for incidents prediction (character and level of losses) in information and communication systems of state critical infrastructure objects.
Other Latest Articles
- Model of Investment Strategies of Transport Situational Centers in Cyber Security Systems
- Classification of Cyber Cruise of Informational Resources of Automated Banking Systems
- Comparison of Possible Approaches for the Development of Low-Budget Spectrum Analyzers for Sensor Networks in the Range of 2.4–2.5 GHz
- GERT Models of Technology of Cloudy Anti-Virus Defense
- Calculation of Parameters of Cryptic Curves Edwards over the Fields of 5th and 7th Characteristic
Last modified: 2019-03-03 20:55:57