System-Information and Cognitive Technologies of Man-Made Infrastructure Cyber Security
DOI:
https://doi.org/10.13052/jcsm2245-1439.123.7Keywords:
Cyber security, infrastructure, system, management, cognitive models, information technologies, strategies, risks, target orientation, hierarchyAbstract
The complication of technological processes due to the modernization of complex technological processes aggregates with a distributed spatial infrastructure requires the use of new control systems and computer and information network technologies. Accordingly, this poses the problem of revising the basic concepts of information-measuring systems building, developing software and hardware for the implementation of the target management process. This requires development of new approaches to presentation, processing, and display of data about the aggregates state of energy-active objects and the entire information structure. For management under threat conditions, it is necessary to take into account the features of the information infrastructure, data selection and processing methods, methods and algorithms for classifying the situation, which are formed from blocks of data obtained from each unit and the technological process as a whole.
Information about the current state of system and infrastructure is necessary for the formation, adoption and implementation of management decisions which is the basis for coordination strategies synthesis. Appropriate target orientation, reasonable indicators of real process trajectories divergence from the target state determine the probability of object attack. Knowledge and decision-making procedures for the coordination of managerial actions is based on the strategic target orientation of the structure, their professionalism and the level of intellectual, cognitive and scientific training which is the basis for correct situation interpretation of countermeasures against threats formation.
In the event of active threats complex on man-made systems in a certain region (resource, cognitive, system, information) and natural disasters or military operations, the threats lead to active destruction or failure of the production process. In order to functionally withstand related production structures, when loyal to the industrial relations concept, they need to integrate at the strategic management level on common goal basis to reduce risks. If necessary, to increase sustainability, they can be integrated at operational management level using interconnections at the production and resource levels. To do this, it is necessary to develop a strategic and goal-oriented management system behaviour line, which requires informational and intelligent data processing at the highest level using cognitive creative methods.
For each level of the infrastructure hierarchy, oriented towards strategic goals in the global infrastructure dynamic environment, methods of assessing the situation to detect failures and the actions of attacks have been developed, based on which countermeasures are formed depending on the type of threats.
Downloads
References
Ponomarenko, V.S. (2002) Information systems and technologies in the economy. Kyiv: Academy, 542 p.
Konstantinov, S.M., Ponomarenko, Yu.L. (2010) Information technologies of modern enterprise management. Lviv: UAoP, Vol. 1., 368 p.
Kondratyev, V.V. (1989) Large systems: Modeling of organizational mechanisms. Moscow: Science, 245 p.
Hettmanserger, T. (1985) Statistical inference Based on Ranks. New York: 2ws, 335 p.
Muschik, E., Muller, P.H. (1990) Entschidun gspraxis. Berlin: VEB Verlog Technik, 206 p.
Davison, M. (1988) Multidimensional scaling. New York: IWss, 253 p.
Barankevych, M.M. (2008) Expert methods in decision-making. Lviv: LNU, 214 p.
Belz, O. (2009) Economic expert systems basics. Lviv: LNU, 238 p.
Erina, A.M. (2004) Statistical modeling and forecasting. Kyiv: Academy, 170 p.
Sikora L., Tkachuk R., Lysa N., Dronyuk I., Fedevych O., Talanchuk R. (2021) “Information-resource and cognitive concept of threat’s influence identification on technogenic system based on the cause and category diagrams integration” in Proceedings of the 2nd International Workshop on Intelligent Information Technologies & Systems of Information Security 2021, CEUR Workshop Proceedings 2853, CEUR-WS.org, 398–416.
Sikora L., Tkachuk R., Lysa N., Dronyuk I., Fedevych O. (2020) “Information and logic cognitive technologies of decision-making in risk conditions” in Proceedings of the 1st International Workshop on Intelligent Information Technologies & Systems of Information Security 2020, CEUR Workshop Proceedings 2623, CEUR-WS.org, 340–356.
Hovorushchenko T., Pavlova O. (2019) “Method of activity of ontology-based intelligent agent for evaluating the initial stages of the software lifecycle” in Recent Developments in Data Science and Intelligent Analysis of Information 2019, Springer International Publishing 836, 169–178.
Sikora L., Tkachuk R., Lysa N., Dronyuk I., Fedevych O., Navutka M. (2020) “Information technologies of formation of intellectual decision-making strategies under conditions of cognitive failures” in Proceedings of the 1st International Workshop on Computational & Information Technologies for Risk-Informed Systems 2020, CEUR Workshop Proceedings 2805, CEUR-WS.org, 233–254.
Demri, S., Goranko, V., Lange, M. (2016) Temporal logics in computer science. Cambridge: Cambridge University Press, 752 p.
Lyugger, Dzh. F. (2003) Artificial intelligence: strategy and methods of solving complex problems. Moscow: Williams, 864 p.
Khoroshchko V., Bobalo B., Dudykevych V. (2020) Complex information protection systems design. Lviv: LPNU Publishing, 320 p.
Tsypanov V., Bukharin S. (2007) Information wars in business and politics. Moscow: Academic Project, 336 p.
Mykytyn H., Dudykevych V., Bobalo Yu. (2019) Strategic security of “object – information technology” system. Lviv: LPNU Publishing, 580 p.
Vendrov A. (2000) Software design of economic information systems. Moscow: Finances and Statistics, 352 p.
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Journal of Cyber Security and Mobility
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.