Метод количественной оценки опасности реализации угроз безопасности информации объектов критической информационной инфраструктуры потенциальными нарушителями
Работая с сайтом, я даю свое согласие на использование файлов cookie. Это необходимо для нормального функционирования сайта, показа целевой рекламы и анализа трафика. Статистика использования сайта обрабатывается системой Яндекс.Метрика
Научный журнал Моделирование, оптимизация и информационные технологииThe scientific journal Modeling, Optimization and Information Technology
Online media
issn 2310-6018

A method for quantifying the danger of implementing threats to the information security of objects of critical information infrastructure by potential violators

idChernov D.V.

UDC 004.056.53
DOI: 10.26102/2310-6018/2025.49.2.013

  • Abstract
  • List of references
  • About authors

In the context of increasing informatization of various production areas, when most technological processes and information flows are automated and controlled by computer technology, the choice of measures to ensure the security of information (SI) of critical information infrastructure objects (CIIO) becomes a pressing issue. The article discusses existing methods and approaches to assessing the risk of implementing SI threats to CIIO, which include automated process control systems, information systems, and information and telecommunication networks. These approaches help SI specialists assess the risks associated with possible cyberattacks and data leaks. A method is proposed for quantitatively assessing the degree of danger of implementing SI threats based on the intelligent analysis of data stored in the CIIO logging subsystem. The method allows for a quantitative assessment of the degree of danger of implementing SI threats by potential violators with respect to a specific CIIO. The developed method complements the available assessments of SI specialists by forming expert assessments from additionally involved specialists - professionals in the field of technological processes and information flows of CIIO. The results of the study are recommended for use in modeling SI threats and developing requirements for information security tools in the CIIO.

Keywords: information security, critical information infrastructure, automated control system, technological process, threat, violator, potential, danger of threat realization, risk, damage

For citation: Chernov D.V. A method for quantifying the danger of implementing threats to the information security of objects of critical information infrastructure by potential violators. Modeling, Optimization and Information Technology. 2025;13(2). URL: https://moitvivt.ru/ru/journal/pdf?id=1870 DOI: 10.26102/2310-6018/2025.49.2.013 (In Russ).

101

Full text in PDF

Received 25.03.2025

Revised 14.04.2025

Accepted 24.04.2025