6 research outputs found
ΠΠ°ΡΠ»ΡΠ΄ΠΊΠΈ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΈΡ ΠΊΡΠ±Π΅ΡΠ°ΡΠ°ΠΊ Π½Π° ΠΎΠ±βΡΠΊΡΠΈ ΠΊΡΠΈΡΠΈΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ
Vital government areas for critical infrastructures defined by availability of automatic control systems of process industries. They include supervisory control and data acquisition systems, distributed control system. In this basis research of negative consequences possible cyberattacks on objects of a critical infrastructure is executed. The basic categories of influence of destructive actions in the automated systems by technological processes on objects of a critical infrastructure are resulted. The concept of object of a critical infrastructure reveals. The interrelation between cyberattacks on object of a critical infrastructure and consequences in industrial sector is shown. Criteria on which the list of information-telecommunication systems of objects of a critical infrastructure of the state is formed are resulted. Actives of objects of a critical infrastructure and a damage which can be caused them are considered. The statistics of incidents on objects of a critical infrastructure on branches for previous year is resulted. The diagram is resulted, where it is shown, that the greatest quantity of incidents is necessary on manufacture and power branch. The concept of a direct and indirect damage to information system of objects of a critical infrastructure reveals.It is shown, that recently in the world cyberattacks are directed on computer networks of power sector, a diplomatic corps, power departments, a defensive complex, the state enterprises, media of the companies. It is shown, that the purpose such cyberattacks, first of all, drawing of a damage to a critical infrastructure of the state. Results of the carried out research can be used at an urgency estimation cyberthreats objects of a critical infrastructure.ΠΠΈΠ·Π½Π΅Π½Π½ΠΎ Π²Π°ΠΆΠ½ΡΠ΅ Π΄Π»Ρ ΠΊΡΠΈΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΈΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ ΠΎΡΡΠ°ΡΠ»ΠΈ Π³ΠΎΡΡΠ΄Π°ΡΡΡΠ²Π° Ρ
Π°ΡΠ°ΠΊΡΠ΅ΡΠΈΠ·ΡΡΡΡΡ Π½Π°Π»ΠΈΡΠΈΠ΅ΠΌ Π°Π²ΡΠΎΠΌΠ°ΡΠΈΠ·ΠΈΡΠΎΠ²Π°Π½Π½ΡΡ
ΡΠΈΡΡΠ΅ΠΌ ΡΠΏΡΠ°Π²Π»Π΅Π½ΠΈΡ ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΡΠ΅ΡΠΊΠΈΠΌΠΈ ΠΏΡΠΎΡΠ΅ΡΡΠ°ΠΌΠΈ. ΠΠ½ΠΈ Π²ΠΊΠ»ΡΡΠ°ΡΡ Π² ΡΠ΅Π±Ρ ΡΠΈΡΡΠ΅ΠΌΡ Π΄ΠΈΡΠΏΠ΅ΡΡΠ΅ΡΡΠΊΠΎΠ³ΠΎ ΡΠΏΡΠ°Π²Π»Π΅Π½ΠΈΡ ΠΈ ΡΠ±ΠΎΡΠ° Π΄Π°Π½Π½ΡΡ
, ΡΠΈΡΡΠ΅ΠΌΡ ΡΠ°ΡΠΏΡΠ΅Π΄Π΅Π»Π΅Π½Π½ΠΎΠ³ΠΎ ΡΠΏΡΠ°Π²Π»Π΅Π½ΠΈΡ. ΠΡΡ
ΠΎΠ΄Ρ ΠΈΠ· ΡΡΠΎΠ³ΠΎ, Π²ΡΠΏΠΎΠ»Π½Π΅Π½ΠΎ ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΠ΅ Π½Π΅Π³Π°ΡΠΈΠ²Π½ΡΡ
ΠΏΠΎΡΠ»Π΅Π΄ΡΡΠ²ΠΈΠΉ ΠΊΠΈΠ±Π΅ΡΠ°ΡΠ°ΠΊ Π½Π° ΠΎΠ±ΡΠ΅ΠΊΡΡ ΠΊΡΠΈΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΈΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ. ΠΡΠΈΠ²Π΅Π΄Π΅Π½Ρ ΠΎΡΠ½ΠΎΠ²Π½ΡΠ΅ ΠΊΠ°ΡΠ΅Π³ΠΎΡΠΈΠΈ Π²Π»ΠΈΡΠ½ΠΈΡ Π΄Π΅ΡΡΡΡΠΊΡΠΈΠ²Π½ΡΡ
Π΄Π΅ΠΉΡΡΠ²ΠΈΠΉ Π² Π°Π²ΡΠΎΠΌΠ°ΡΠΈΠ·ΠΈΡΠΎΠ²Π°Π½Π½ΡΡ
ΡΠΈΡΡΠ΅ΠΌΠ°Ρ
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΡΠ΅ΡΠΊΠΈΠΌΠΈ ΠΏΡΠΎΡΠ΅ΡΡΠ°ΠΌΠΈ Π½Π° ΠΎΠ±ΡΠ΅ΠΊΡΠ°Ρ
ΠΊΡΠΈΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΈΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ. ΠΠΎΠΊΠ°Π·Π°Π½Π° Π²Π·Π°ΠΈΠΌΠΎΡΠ²ΡΠ·Ρ ΠΌΠ΅ΠΆΠ΄Ρ ΠΊΠΈΠ±Π΅ΡΠ°ΡΠ°ΠΊΠ°ΠΌΠΈ Π½Π° ΠΎΠ±ΡΠ΅ΠΊΡΠ΅ ΠΊΡΠΈΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΈΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ ΠΈ ΠΏΠΎΡΠ»Π΅Π΄ΡΡΠ²ΠΈΡΠΌΠΈ Π² ΠΏΡΠΎΠΌΡΡΠ»Π΅Π½Π½ΠΎΠΌ ΡΠ΅ΠΊΡΠΎΡΠ΅. ΠΡΠΈΠ²Π΅Π΄Π΅Π½Ρ ΠΊΡΠΈΡΠ΅ΡΠΈΠΈ, ΠΏΠΎ ΠΊΠΎΡΠΎΡΡΠΌ ΡΠΎΡΠΌΠΈΡΡΠ΅ΡΡΡ ΠΏΠ΅ΡΠ΅ΡΠ΅Π½Ρ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΠΎ-ΡΠ΅Π»Π΅ΠΊΠΎΠΌΠΌΡΠ½ΠΈΠΊΠ°ΡΠΈΠΎΠ½Π½ΡΡ
ΡΠΈΡΡΠ΅ΠΌ ΠΎΠ±ΡΠ΅ΠΊΡΠΎΠ² ΠΊΡΠΈΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΈΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ Π³ΠΎΡΡΠ΄Π°ΡΡΡΠ²Π°. Π Π°ΡΡΠΌΠΎΡΡΠ΅Π½Ρ Π°ΠΊΡΠΈΠ²Ρ ΠΎΠ±ΡΠ΅ΠΊΡΠΎΠ² ΠΊΡΠΈΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΈΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ ΠΈ ΡΡΠ΅ΡΠ±, ΠΊΠΎΡΠΎΡΡΠΉ ΠΌΠΎΠΆΠ΅Ρ Π±ΡΡΡ ΠΈΠΌ ΠΏΡΠΈΡΠΈΠ½Π΅Π½. Π Π΅Π·ΡΠ»ΡΡΠ°ΡΡ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½ΠΎΠ³ΠΎ ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΡ ΠΌΠΎΠΆΠ½ΠΎ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΡ ΠΏΡΠΈ ΠΎΡΠ΅Π½ΠΊΠ΅ Π°ΠΊΡΡΠ°Π»ΡΠ½ΠΎΡΡΠΈ ΠΊΠΈΠ±Π΅ΡΡΠ³ΡΠΎΠ· ΠΎΠ±ΡΠ΅ΠΊΡΠΎΠ² ΠΊΡΠΈΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΈΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ.ΠΠΈΡΡΡΠ²ΠΎ Π²Π°ΠΆΠ»ΠΈΠ²Ρ Π΄Π»Ρ ΠΊΡΠΈΡΠΈΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ Π³Π°Π»ΡΠ·Ρ Π΄Π΅ΡΠΆΠ°Π²ΠΈ Ρ
Π°ΡΠ°ΠΊΡΠ΅ΡΠΈΠ·ΡΡΡΡΡΡ Β Π½Π°ΡΠ²Π½ΡΡΡΡ Π°Π²ΡΠΎΠΌΠ°ΡΠΈΠ·ΠΎΠ²Π°Π½ΠΈΡ
ΡΠΈΡΡΠ΅ΠΌ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΡΡΠ½ΠΈΠΌΠΈ ΠΏΡΠΎΡΠ΅ΡΠ°ΠΌΠΈ. ΠΠΎΠ½ΠΈ Π²ΠΊΠ»ΡΡΠ°ΡΡΡ Π² ΡΠ΅Π±Π΅ ΡΠΈΡΡΠ΅ΠΌΠΈ Π΄ΠΈΡΠΏΠ΅ΡΡΠ΅ΡΡΡΠΊΠΎΠ³ΠΎ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ Ρ Π·Π±ΠΎΡΡ Π΄Π°Π½ΠΈΡ
, ΡΠΈΡΡΠ΅ΠΌΠΈ ΡΠΎΠ·ΠΏΠΎΠ΄ΡΠ»Π΅Π½ΠΎΠ³ΠΎ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ. Π ΠΎΠ³Π»ΡΠ΄Ρ Π½Π° ΡΠ΅ Π²ΠΈΠΊΠΎΠ½Π°Π½ΠΎ Π΄ΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½Π½Ρ Π½Π΅Π³Π°ΡΠΈΠ²Π½ΠΈΡ
Π½Π°ΡΠ»ΡΠ΄ΠΊΡΠ² ΠΊΡΠ±Π΅ΡΠ°ΡΠ°ΠΊ Π½Π° ΠΎΠ±βΡΠΊΡΠΈ ΠΊΡΠΈΡΠΈΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ. ΠΡΠΈΠ²Π΅Π΄Π΅Π½ΠΎ ΠΎΡΠ½ΠΎΠ²Π½Ρ ΠΊΠ°ΡΠ΅Π³ΠΎΡΡΡ Π²ΠΏΠ»ΠΈΠ²Ρ Π΄Π΅ΡΡΡΡΠΊΡΠΈΠ²Π½ΠΈΡ
Π΄ΡΠΉ Π² Π°Π²ΡΠΎΠΌΠ°ΡΠΈΠ·ΠΎΠ²Π°Π½ΠΈΡ
ΡΠΈΡΡΠ΅ΠΌΠ°Ρ
ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΡΡΠ½ΠΈΠΌΠΈ ΠΏΡΠΎΡΠ΅ΡΠ°ΠΌΠΈ Π½Π° ΠΎΠ±βΡΠΊΡΠ°Ρ
ΠΊΡΠΈΡΠΈΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ. ΠΠΎΠΊΠ°Π·Π°Π½ΠΎ Π²Π·Π°ΡΠΌΠΎΠ·Π²βΡΠ·ΠΎΠΊ ΠΌΡΠΆ ΠΊΡΠ±Π΅ΡΠ°ΡΠ°ΠΊΠ°ΠΌΠΈ Π½Π° ΠΎΠ±βΡΠΊΡΠΈ ΠΊΡΠΈΡΠΈΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ Ρ Π½Π°ΡΠ»ΡΠ΄ΠΊΠ°ΠΌΠΈ Ρ ΠΏΡΠΎΠΌΠΈΡΠ»ΠΎΠ²ΠΎΠΌΡ ΡΠ΅ΠΊΡΠΎΡΡ. ΠΡΠΈΠ²Π΅Π΄Π΅Π½ΠΎ ΠΊΡΠΈΡΠ΅ΡΡΡ, ΠΏΠΎ ΡΠΊΠΈΡ
ΡΠΎΡΠΌΡΡΡΡΡΡ ΠΏΠ΅ΡΠ΅Π»ΡΠΊ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎ-ΡΠ΅Π»Π΅ΠΊΠΎΠΌΡΠ½ΡΠΊΠ°ΡΡΠΉΠ½ΠΈΡ
ΡΠΈΡΡΠ΅ΠΌ ΠΎΠ±βΡΠΊΡΡΠ² ΠΊΡΠΈΡΠΈΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ Π΄Π΅ΡΠΆΠ°Π²ΠΈ. ΠΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½ΠΎ Π°ΠΊΡΠΈΠ²ΠΈ ΠΎΠ±βΡΠΊΡΡΠ² ΠΊΡΠΈΡΠΈΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ ΡΠ° Π·Π±ΠΈΡΠΊΠΈ, ΡΠΎ ΠΌΠΎΠΆΡΡΡ Π±ΡΡΠΈ ΡΠΌ Π·Π°Π²Π΄Π°Π½Ρ. Π Π΅Π·ΡΠ»ΡΡΠ°ΡΠΈ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½ΠΎΠ³ΠΎ Π΄ΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½Π½Ρ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎ Π²ΠΈΠΊΠΎΡΠΈΡΡΠ°ΡΠΈ ΠΏΡΠΈ ΠΎΡΡΠ½ΡΠ²Π°Π½Π½Ρ Π°ΠΊΡΡΠ°Π»ΡΠ½ΠΎΡΡΡ ΠΊΡΠ±Π΅ΡΠ·Π°Π³ΡΠΎΠ· ΠΎΠ±βΡΠΊΡΡΠ² ΠΊΡΠΈΡΠΈΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ
ΠΠ½Π°Π»ΡΠ· ΡΠ°ΠΊΡΠΎΡΡΠ² Π²ΠΏΠ»ΠΈΠ²Ρ Π½Π° ΡΡΠ°Π½ ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ ΡΠΈΡΡΠ΅ΠΌΠΈ ΠΎΠ±βΡΠΊΡΡ ΠΊΡΠΈΡΠΈΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ
The analysis of the factors influencing condition cybersecurity of information system of object of a critical infrastructure is made. Integral parts of systems of cyber protection of information systems of objects of a critical infrastructure are considered. The model of interaction of elements of information system of object of a critical infrastructure is resulted, and also the analysis of their influence on a condition of cybersecurity the given system is made. Functions which the system of cyber protection of information system of objects of a critical infrastructure necessarily should possess are resulted. Research of the factors which influence can induce insider to possible performance of destructive actions is carried out, and also recommendations about minimization of probability of realization by insider such actions are given. The concept of internal destabilizing factors is opened. Directions on which it should be considered cyber protection of information systems of objects of a critical infrastructure are formulated. The question of is standard-legal maintenance cybersecurity of information systems of objects of a critical infrastructure is considered. Some features in actions of insider information systems of objects of a critical infrastructure are considered. Results of the spent analysis can be used by working out of offers and actions on cyber protection of information systems of objects of a critical infrastructure.ΠΡΠΏΠΎΠ»Π½Π΅Π½ Π°Π½Π°Π»ΠΈΠ· ΡΠ°ΠΊΡΠΎΡΠΎΠ², Π²Π»ΠΈΡΡΡΠΈΡ
Π½Π° ΡΠΎΡΡΠΎΡΠ½ΠΈΠ΅ ΠΊΠΈΠ±Π΅ΡΠ±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ ΠΎΠ±ΡΠ΅ΠΊΡΠ° ΠΊΡΠΈΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΈΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ. Π Π°ΡΡΠΌΠΎΡΡΠ΅Π½Ρ ΡΠΎΡΡΠ°Π²Π»ΡΡΡΠΈΠ΅ ΡΠΈΡΡΠ΅ΠΌΡ ΠΊΠΈΠ±Π΅ΡΠ·Π°ΡΠΈΡΡ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΡΡ
ΡΠΈΡΡΠ΅ΠΌ ΠΎΠ±ΡΠ΅ΠΊΡΠΎΠ² ΠΊΡΠΈΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΈΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ. ΠΡΠΈΠ²Π΅Π΄Π΅Π½Π° ΠΌΠΎΠ΄Π΅Π»Ρ Π²Π·Π°ΠΈΠΌΠΎΠ΄Π΅ΠΉΡΡΠ²ΠΈΡ ΡΠ»Π΅ΠΌΠ΅Π½ΡΠΎΠ² ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ ΠΎΠ±ΡΠ΅ΠΊΡΠ° ΠΊΡΠΈΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΈΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ, Π° ΡΠ°ΠΊΠΆΠ΅ Π²ΡΠΏΠΎΠ»Π½Π΅Π½ Π°Π½Π°Π»ΠΈΠ· ΠΈΡ
Π²Π»ΠΈΡΠ½ΠΈΡ Π½Π° ΡΠΎΡΡΠΎΡΠ½ΠΈΠ΅ ΠΊΠΈΠ±Π΅Π·Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ Π΄Π°Π½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ. ΠΡΠΎΠ²Π΅Π΄Π΅Π½ΠΎ ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΠ΅ ΡΠ°ΠΊΡΠΎΡΠΎΠ², Π²Π»ΠΈΡΠ½ΠΈΠ΅ ΠΊΠΎΡΠΎΡΡΡ
ΠΌΠΎΠΆΠ΅Ρ ΠΏΠΎΠ±ΡΠ΄ΠΈΡΡ ΠΈΠ½ΡΠ°ΠΉΠ΄Π΅ΡΠ° ΠΊ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΠΌΡ Π²ΡΠΏΠΎΠ»Π½Π΅Π½ΠΈΡ ΠΈΠΌ Π΄Π΅ΡΡΡΡΠΊΡΠΈΠ²Π½ΡΡ
Π΄Π΅ΠΉΡΡΠ²ΠΈΠΉ, Π° ΡΠ°ΠΊΠΆΠ΅ Π΄Π°Π½Ρ ΡΠ΅ΠΊΠΎΠΌΠ΅Π½Π΄Π°ΡΠΈΠΈ ΠΏΠΎ ΠΌΠΈΠ½ΠΈΠΌΠΈΠ·Π°ΡΠΈΠΈ Π²Π΅ΡΠΎΡΡΠ½ΠΎΡΡΠΈ ΠΎΡΡΡΠ΅ΡΡΠ²Π»Π΅Π½ΠΈΡ ΠΈΠ½ΡΠ°ΠΉΠ΄Π΅ΡΠΎΠΌ ΡΠ°ΠΊΠΈΡ
Π΄Π΅ΠΉΡΡΠ²ΠΈΠΉ. Π Π°ΡΡΠΌΠΎΡΡΠ΅Π½ Π²ΠΎΠΏΡΠΎΡ Π½ΠΎΡΠΌΠ°ΡΠΈΠ²Π½ΠΎ-ΠΏΡΠ°Π²ΠΎΠ²ΠΎΠ³ΠΎ ΠΎΠ±Π΅ΡΠΏΠ΅ΡΠ΅Π½ΠΈΡ ΠΊΠΈΠ±Π΅ΡΠ±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΡΡ
ΡΠΈΡΡΠ΅ΠΌ ΠΎΠ±ΡΠ΅ΠΊΡΠΎΠ² ΠΊΡΠΈΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΈΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ. Π Π΅Π·ΡΠ»ΡΡΠ°ΡΡ ΠΏΡΠΎΠ²Π΅Π΄ΡΠ½Π½ΠΎΠ³ΠΎ Π°Π½Π°Π»ΠΈΠ·Π° ΠΌΠΎΠΆΠ½ΠΎ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΡ ΠΏΡΠΈ ΡΠ°Π·ΡΠ°Π±ΠΎΡΠΊΠ΅ ΠΏΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½ΠΈΠΉ ΠΈ ΠΌΠ΅ΡΠΎΠΏΡΠΈΡΡΠΈΠΉ ΠΏΠΎ ΠΊΠΈΠ±Π΅ΡΠ·Π°ΡΠΈΡΠ΅ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΡΡ
ΡΠΈΡΡΠ΅ΠΌ ΠΎΠ±ΡΠ΅ΠΊΡΠΎΠ² ΠΊΡΠΈΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΈΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ.ΠΠΈΠΊΠΎΠ½Π°Π½ΠΎ Π°Π½Π°Π»ΡΠ· ΡΠ°ΠΊΡΠΎΡΡΠ², ΡΠΎ Π²ΠΏΠ»ΠΈΠ²Π°ΡΡΡ Π½Π° ΡΡΠ°Π½ ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ ΡΠΈΡΡΠ΅ΠΌΠΈ ΠΎΠ±βΡΠΊΡΡ ΠΊΡΠΈΡΠΈΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ. Π ΠΎΠ·Π³Π»ΡΠ½ΡΡΠΎ ΡΠΊΠ»Π°Π΄ΠΎΠ²Ρ ΡΠ°ΡΡΠΈΠ½ΠΈ ΡΠΈΡΡΠ΅ΠΌΠΈ ΠΊΡΠ±Π΅ΡΠ·Π°Ρ
ΠΈΡΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ
ΡΠΈΡΡΠ΅ΠΌ ΠΎΠ±βΡΠΊΡΡΠ² ΠΊΡΠΈΡΠΈΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ. ΠΡΠΈΠ²Π΅Π΄Π΅Π½ΠΎ ΠΌΠΎΠ΄Π΅Π»Ρ Π²Π·Π°ΡΠΌΠΎΠ΄ΡΡ Π΅Π»Π΅ΠΌΠ΅Π½ΡΡΠ² ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ ΡΠΈΡΡΠ΅ΠΌΠΈ ΠΎΠ±βΡΠΊΡΡ ΠΊΡΠΈΡΠΈΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ ΡΠ° Π·Π΄ΡΠΉΡΠ½Π΅Π½ΠΎ Π°Π½Π°Π»ΡΠ· ΡΡ
Π²ΠΏΠ»ΠΈΠ²Ρ Π½Π° ΡΡΠ°Π½ ΠΊΡΠ±Π΅Π·Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π΄Π°Π½ΠΎΡ ΡΠΈΡΡΠ΅ΠΌΠΈ. ΠΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½ΠΎ ΡΠΈΠ½Π½ΠΈΠΊΠΈ, Π²ΠΏΠ»ΠΈΠ² ΡΠΊΠΈΡ
ΠΌΠΎΠΆΠ΅ ΡΠΏΠΎΠ½ΡΠΊΠ°ΡΠΈ ΡΠ½ΡΠ°ΠΉΠ΄Π΅ΡΠ° Π΄ΠΎ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎΠ³ΠΎ Π²ΠΈΠΊΠΎΠ½Π°Π½Π½Ρ Π½ΠΈΠΌ Π΄Π΅ΡΡΡΡΠΊΡΠΈΠ²Π½ΠΈΡ
Π΄ΡΠΉ ΡΠ° Π΄Π°Π½ΠΎ ΡΠ΅ΠΊΠΎΠΌΠ΅Π½Π΄Π°ΡΡΡ ΡΠΎΠ΄ΠΎ ΠΌΡΠ½ΡΠΌΡΠ·Π°ΡΡΡ ΠΉΠΌΠΎΠ²ΡΡΠ½ΠΎΡΡΡ Π·Π΄ΡΠΉΡΠ½Π΅Π½Π½Ρ ΡΠ½ΡΠ°ΠΉΠ΄Π΅ΡΠΎΠΌ ΡΠ°ΠΊΠΈΡ
Π΄ΡΠΉ. Π ΠΎΠ·Π³Π»ΡΠ½ΡΡΠΎ ΠΏΠΈΡΠ°Π½Π½Ρ Π½ΠΎΡΠΌΠ°ΡΠΈΠ²Π½ΠΎ-ΠΏΡΠ°Π²ΠΎΠ²ΠΎΡ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ
ΡΠΈΡΡΠ΅ΠΌ ΠΎΠ±βΡΠΊΡΡΠ² ΠΊΡΠΈΡΠΈΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ. Π Π΅Π·ΡΠ»ΡΡΠ°ΡΠΈ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½ΠΎΠ³ΠΎ Π°Π½Π°Π»ΡΠ·Ρ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎ Π²ΠΈΠΊΠΎΡΠΈΡΡΠ°ΡΠΈ ΠΏΡΠΈ ΡΠΎΠ·ΡΠΎΠ±ΡΡ ΠΏΡΠΎΠΏΠΎΠ·ΠΈΡΡΠΉ ΡΠ° Π·Π°Ρ
ΠΎΠ΄ΡΠ² ΡΠΎΠ΄ΠΎ ΠΊΡΠ±Π΅ΡΠ·Π°Ρ
ΠΈΡΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ
ΡΠΈΡΡΠ΅ΠΌ ΠΎΠ±βΡΠΊΡΡΠ² ΠΊΡΠΈΡΠΈΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ
Analysis of the factors influencing condition cybersecurity of information system of object of the critical infrastructure
ΠΠΈΠΊΠΎΠ½Π°Π½ΠΎ Π°Π½Π°Π»ΡΠ· ΡΠ°ΠΊΡΠΎΡΡΠ², ΡΠΎ Π²ΠΏΠ»ΠΈΠ²Π°ΡΡΡ Π½Π° ΡΡΠ°Π½ ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ ΡΠΈΡΡΠ΅ΠΌΠΈ ΠΎΠ±βΡΠΊΡΡ ΠΊΡΠΈΡΠΈΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ. Π ΠΎΠ·Π³Π»ΡΠ½ΡΡΠΎ ΡΠΊΠ»Π°Π΄ΠΎΠ²Ρ ΡΠ°ΡΡΠΈΠ½ΠΈ ΡΠΈΡΡΠ΅ΠΌΠΈ ΠΊΡΠ±Π΅ΡΠ·Π°Ρ
ΠΈΡΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ
ΡΠΈΡΡΠ΅ΠΌ ΠΎΠ±βΡΠΊΡΡΠ² ΠΊΡΠΈΡΠΈΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ. ΠΡΠΈΠ²Π΅Π΄Π΅Π½ΠΎ ΠΌΠΎΠ΄Π΅Π»Ρ Π²Π·Π°ΡΠΌΠΎΠ΄ΡΡ Π΅Π»Π΅ΠΌΠ΅Π½ΡΡΠ² ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ ΡΠΈΡΡΠ΅ΠΌΠΈ ΠΎΠ±βΡΠΊΡΡ ΠΊΡΠΈΡΠΈΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ ΡΠ° Π·Π΄ΡΠΉΡΠ½Π΅Π½ΠΎ Π°Π½Π°Π»ΡΠ· ΡΡ
Π²ΠΏΠ»ΠΈΠ²Ρ Π½Π° ΡΡΠ°Π½ ΠΊΡΠ±Π΅Π·Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π΄Π°Π½ΠΎΡ ΡΠΈΡΡΠ΅ΠΌΠΈ. ΠΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½ΠΎ ΡΠΈΠ½Π½ΠΈΠΊΠΈ, Π²ΠΏΠ»ΠΈΠ² ΡΠΊΠΈΡ
ΠΌΠΎΠΆΠ΅ ΡΠΏΠΎΠ½ΡΠΊΠ°ΡΠΈ ΡΠ½ΡΠ°ΠΉΠ΄Π΅ΡΠ° Π΄ΠΎ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎΠ³ΠΎ Π²ΠΈΠΊΠΎΠ½Π°Π½Π½Ρ Π½ΠΈΠΌ Π΄Π΅ΡΡΡΡΠΊΡΠΈΠ²Π½ΠΈΡ
Π΄ΡΠΉ ΡΠ° Π΄Π°Π½ΠΎ ΡΠ΅ΠΊΠΎΠΌΠ΅Π½Π΄Π°ΡΡΡ ΡΠΎΠ΄ΠΎ ΠΌΡΠ½ΡΠΌΡΠ·Π°ΡΡΡ ΠΉΠΌΠΎΠ²ΡΡΠ½ΠΎΡΡΡ Π·Π΄ΡΠΉΡΠ½Π΅Π½Π½Ρ ΡΠ½ΡΠ°ΠΉΠ΄Π΅ΡΠΎΠΌ ΡΠ°ΠΊΠΈΡ
Π΄ΡΠΉ. Π ΠΎΠ·Π³Π»ΡΠ½ΡΡΠΎ ΠΏΠΈΡΠ°Π½Π½Ρ Π½ΠΎΡΠΌΠ°ΡΠΈΠ²Π½ΠΎ-ΠΏΡΠ°Π²ΠΎΠ²ΠΎΡ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ
ΡΠΈΡΡΠ΅ΠΌ ΠΎΠ±βΡΠΊΡΡΠ² ΠΊΡΠΈΡΠΈΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ. Π Π΅Π·ΡΠ»ΡΡΠ°ΡΠΈ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½ΠΎΠ³ΠΎ Π°Π½Π°Π»ΡΠ·Ρ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎ Π²ΠΈΠΊΠΎΡΠΈΡΡΠ°ΡΠΈ ΠΏΡΠΈ ΡΠΎΠ·ΡΠΎΠ±ΡΡ ΠΏΡΠΎΠΏΠΎΠ·ΠΈΡΡΠΉ ΡΠ° Π·Π°Ρ
ΠΎΠ΄ΡΠ² ΡΠΎΠ΄ΠΎ ΠΊΡΠ±Π΅ΡΠ·Π°Ρ
ΠΈΡΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ
ΡΠΈΡΡΠ΅ΠΌ ΠΎΠ±βΡΠΊΡΡΠ² ΠΊΡΠΈΡΠΈΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ.The analysis of the factors influencing condition cybersecurity of information system of object of a critical infrastructure is made. Integral parts of systems of cyber protection of information systems of objects of a critical infrastructure are considered. The model of interaction of elements of information system of object of a critical infrastructure is resulted, and also the analysis of their influence on a condition of cybersecurity the given system is made. Functions which the system of cyber protection of information system of objects of a critical infrastructure necessarily should possess are resulted. Research of the factors which influence can induce insider to possible performance of destructive actions is carried out, and also recommendations about minimization of probability of realization by insider such actions are given. The concept of internal destabilizing factors is opened. Directions on which it should be considered cyber protection of information systems of objects of a critical infrastructure are formulated. The question of is standard-legal maintenance cybersecurity of information systems of objects of a critical infrastructure is considered. Some features in actions of insider information systems of objects of a critical infrastructure are considered. Results of the spent analysis can be used by working out of offers and actions on cyber protection of information systems of objects of a critical infrastructure.ΠΡΠΏΠΎΠ»Π½Π΅Π½ Π°Π½Π°Π»ΠΈΠ· ΡΠ°ΠΊΡΠΎΡΠΎΠ², Π²Π»ΠΈΡΡΡΠΈΡ
Π½Π° ΡΠΎΡΡΠΎΡΠ½ΠΈΠ΅ ΠΊΠΈΠ±Π΅ΡΠ±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ ΠΎΠ±ΡΠ΅ΠΊΡΠ° ΠΊΡΠΈΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΈΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ. Π Π°ΡΡΠΌΠΎΡΡΠ΅Π½Ρ ΡΠΎΡΡΠ°Π²Π»ΡΡΡΠΈΠ΅ ΡΠΈΡΡΠ΅ΠΌΡ ΠΊΠΈΠ±Π΅ΡΠ·Π°ΡΠΈΡΡ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΡΡ
ΡΠΈΡΡΠ΅ΠΌ ΠΎΠ±ΡΠ΅ΠΊΡΠΎΠ² ΠΊΡΠΈΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΈΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ. ΠΡΠΈΠ²Π΅Π΄Π΅Π½Π° ΠΌΠΎΠ΄Π΅Π»Ρ Π²Π·Π°ΠΈΠΌΠΎΠ΄Π΅ΠΉΡΡΠ²ΠΈΡ ΡΠ»Π΅ΠΌΠ΅Π½ΡΠΎΠ² ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ ΠΎΠ±ΡΠ΅ΠΊΡΠ° ΠΊΡΠΈΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΈΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ, Π° ΡΠ°ΠΊΠΆΠ΅ Π²ΡΠΏΠΎΠ»Π½Π΅Π½ Π°Π½Π°Π»ΠΈΠ· ΠΈΡ
Π²Π»ΠΈΡΠ½ΠΈΡ Π½Π° ΡΠΎΡΡΠΎΡΠ½ΠΈΠ΅ ΠΊΠΈΠ±Π΅Π·Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ Π΄Π°Π½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ. ΠΡΠΎΠ²Π΅Π΄Π΅Π½ΠΎ ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΠ΅ ΡΠ°ΠΊΡΠΎΡΠΎΠ², Π²Π»ΠΈΡΠ½ΠΈΠ΅ ΠΊΠΎΡΠΎΡΡΡ
ΠΌΠΎΠΆΠ΅Ρ ΠΏΠΎΠ±ΡΠ΄ΠΈΡΡ ΠΈΠ½ΡΠ°ΠΉΠ΄Π΅ΡΠ° ΠΊ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΠΌΡ Π²ΡΠΏΠΎΠ»Π½Π΅Π½ΠΈΡ ΠΈΠΌ Π΄Π΅ΡΡΡΡΠΊΡΠΈΠ²Π½ΡΡ
Π΄Π΅ΠΉΡΡΠ²ΠΈΠΉ, Π° ΡΠ°ΠΊΠΆΠ΅ Π΄Π°Π½Ρ ΡΠ΅ΠΊΠΎΠΌΠ΅Π½Π΄Π°ΡΠΈΠΈ ΠΏΠΎ ΠΌΠΈΠ½ΠΈΠΌΠΈΠ·Π°ΡΠΈΠΈ Π²Π΅ΡΠΎΡΡΠ½ΠΎΡΡΠΈ ΠΎΡΡΡΠ΅ΡΡΠ²Π»Π΅Π½ΠΈΡ ΠΈΠ½ΡΠ°ΠΉΠ΄Π΅ΡΠΎΠΌ ΡΠ°ΠΊΠΈΡ
Π΄Π΅ΠΉΡΡΠ²ΠΈΠΉ. Π Π°ΡΡΠΌΠΎΡΡΠ΅Π½ Π²ΠΎΠΏΡΠΎΡ Π½ΠΎΡΠΌΠ°ΡΠΈΠ²Π½ΠΎ-ΠΏΡΠ°Π²ΠΎΠ²ΠΎΠ³ΠΎ ΠΎΠ±Π΅ΡΠΏΠ΅ΡΠ΅Π½ΠΈΡ ΠΊΠΈΠ±Π΅ΡΠ±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΡΡ
ΡΠΈΡΡΠ΅ΠΌ ΠΎΠ±ΡΠ΅ΠΊΡΠΎΠ² ΠΊΡΠΈΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΈΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ. Π Π΅Π·ΡΠ»ΡΡΠ°ΡΡ ΠΏΡΠΎΠ²Π΅Π΄ΡΠ½Π½ΠΎΠ³ΠΎ Π°Π½Π°Π»ΠΈΠ·Π° ΠΌΠΎΠΆΠ½ΠΎ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΡ ΠΏΡΠΈ ΡΠ°Π·ΡΠ°Π±ΠΎΡΠΊΠ΅ ΠΏΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½ΠΈΠΉ ΠΈ ΠΌΠ΅ΡΠΎΠΏΡΠΈΡΡΠΈΠΉ ΠΏΠΎ ΠΊΠΈΠ±Π΅ΡΠ·Π°ΡΠΈΡΠ΅ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΡΡ
ΡΠΈΡΡΠ΅ΠΌ ΠΎΠ±ΡΠ΅ΠΊΡΠΎΠ² ΠΊΡΠΈΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΈΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ
Consequences of possible cyberattacks on objects of the critical infrastructure
ΠΠΈΡΡΡΠ²ΠΎ Π²Π°ΠΆΠ»ΠΈΠ²Ρ Π΄Π»Ρ ΠΊΡΠΈΡΠΈΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ Π³Π°Π»ΡΠ·Ρ Π΄Π΅ΡΠΆΠ°Π²ΠΈ Ρ
Π°ΡΠ°ΠΊΡΠ΅ΡΠΈΠ·ΡΡΡΡΡΡ Π½Π°ΡΠ²Π½ΡΡΡΡ Π°Π²ΡΠΎΠΌΠ°ΡΠΈΠ·ΠΎΠ²Π°Π½ΠΈΡ
ΡΠΈΡΡΠ΅ΠΌ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΡΡΠ½ΠΈΠΌΠΈ ΠΏΡΠΎΡΠ΅ΡΠ°ΠΌΠΈ. ΠΠΎΠ½ΠΈ Π²ΠΊΠ»ΡΡΠ°ΡΡΡ Π² ΡΠ΅Π±Π΅ ΡΠΈΡΡΠ΅ΠΌΠΈ Π΄ΠΈΡΠΏΠ΅ΡΡΠ΅ΡΡΡΠΊΠΎΠ³ΠΎ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ Ρ Π·Π±ΠΎΡΡ Π΄Π°Π½ΠΈΡ
, ΡΠΈΡΡΠ΅ΠΌΠΈ ΡΠΎΠ·ΠΏΠΎΠ΄ΡΠ»Π΅Π½ΠΎΠ³ΠΎ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ. Π ΠΎΠ³Π»ΡΠ΄Ρ Π½Π° ΡΠ΅ Π²ΠΈΠΊΠΎΠ½Π°Π½ΠΎ Π΄ΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½Π½Ρ Π½Π΅Π³Π°ΡΠΈΠ²Π½ΠΈΡ
Π½Π°ΡΠ»ΡΠ΄ΠΊΡΠ² ΠΊΡΠ±Π΅ΡΠ°ΡΠ°ΠΊ Π½Π° ΠΎΠ±βΡΠΊΡΠΈ ΠΊΡΠΈΡΠΈΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ. ΠΡΠΈΠ²Π΅Π΄Π΅Π½ΠΎ ΠΎΡΠ½ΠΎΠ²Π½Ρ ΠΊΠ°ΡΠ΅Π³ΠΎΡΡΡ Π²ΠΏΠ»ΠΈΠ²Ρ Π΄Π΅ΡΡΡΡΠΊΡΠΈΠ²Π½ΠΈΡ
Π΄ΡΠΉ Π² Π°Π²ΡΠΎΠΌΠ°ΡΠΈΠ·ΠΎΠ²Π°Π½ΠΈΡ
ΡΠΈΡΡΠ΅ΠΌΠ°Ρ
ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΡΡΠ½ΠΈΠΌΠΈ ΠΏΡΠΎΡΠ΅ΡΠ°ΠΌΠΈ Π½Π° ΠΎΠ±βΡΠΊΡΠ°Ρ
ΠΊΡΠΈΡΠΈΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ. ΠΠΎΠΊΠ°Π·Π°Π½ΠΎ Π²Π·Π°ΡΠΌΠΎΠ·Π²βΡΠ·ΠΎΠΊ ΠΌΡΠΆ ΠΊΡΠ±Π΅ΡΠ°ΡΠ°ΠΊΠ°ΠΌΠΈ Π½Π° ΠΎΠ±βΡΠΊΡΠΈ ΠΊΡΠΈΡΠΈΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ Ρ Π½Π°ΡΠ»ΡΠ΄ΠΊΠ°ΠΌΠΈ Ρ ΠΏΡΠΎΠΌΠΈΡΠ»ΠΎΠ²ΠΎΠΌΡ ΡΠ΅ΠΊΡΠΎΡΡ. ΠΡΠΈΠ²Π΅Π΄Π΅Π½ΠΎ ΠΊΡΠΈΡΠ΅ΡΡΡ, ΠΏΠΎ ΡΠΊΠΈΡ
ΡΠΎΡΠΌΡΡΡΡΡΡ ΠΏΠ΅ΡΠ΅Π»ΡΠΊ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎ-ΡΠ΅Π»Π΅ΠΊΠΎΠΌΡΠ½ΡΠΊΠ°ΡΡΠΉΠ½ΠΈΡ
ΡΠΈΡΡΠ΅ΠΌ ΠΎΠ±βΡΠΊΡΡΠ² ΠΊΡΠΈΡΠΈΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ Π΄Π΅ΡΠΆΠ°Π²ΠΈ. ΠΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½ΠΎ Π°ΠΊΡΠΈΠ²ΠΈ ΠΎΠ±βΡΠΊΡΡΠ² ΠΊΡΠΈΡΠΈΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ ΡΠ° Π·Π±ΠΈΡΠΊΠΈ, ΡΠΎ ΠΌΠΎΠΆΡΡΡ Π±ΡΡΠΈ ΡΠΌ Π·Π°Π²Π΄Π°Π½Ρ. Π Π΅Π·ΡΠ»ΡΡΠ°ΡΠΈ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½ΠΎΠ³ΠΎ Π΄ΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½Π½Ρ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎ Π²ΠΈΠΊΠΎΡΠΈΡΡΠ°ΡΠΈ ΠΏΡΠΈ ΠΎΡΡΠ½ΡΠ²Π°Π½Π½Ρ Π°ΠΊΡΡΠ°Π»ΡΠ½ΠΎΡΡΡ ΠΊΡΠ±Π΅ΡΠ·Π°Π³ΡΠΎΠ· ΠΎΠ±βΡΠΊΡΡΠ² ΠΊΡΠΈΡΠΈΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ.Vital government areas for critical infrastructures defined by availability of automatic control systems of process industries. They include supervisory control and data acquisition systems, distributed control system. In this basis research of negative consequences possible cyberattacks on objects of a critical infrastructure is executed. The basic categories of influence of destructive actions in the automated systems by technological processes on objects of a critical infrastructure are resulted. The concept of object of a critical infrastructure reveals. The interrelation between cyberattacks on object of a critical infrastructure and consequences in industrial sector is shown. Criteria on which the list of information-telecommunication systems of objects of a critical infrastructure of the state is formed are resulted. Actives of objects of a critical infrastructure and a damage which can be caused them are considered. The statistics of incidents on objects of a critical infrastructure on branches for previous year is resulted. The diagram is resulted, where it is shown, that the greatest quantity of incidents is necessary on manufacture and power branch. The concept of a direct and indirect damage to information system of objects of a critical infrastructure reveals.It is shown, that recently in the world cyberattacks are directed on computer networks of power sector, a diplomatic corps, power departments, a defensive complex, the state enterprises, media of the companies. It is shown, that the purpose such cyberattacks, first of all, drawing of a damage to a critical infrastructure of the state. Results of the carried out research can be used at an urgency estimation cyberthreats objects of a critical infrastructure.ΠΠΈΠ·Π½Π΅Π½Π½ΠΎ Π²Π°ΠΆΠ½ΡΠ΅ Π΄Π»Ρ ΠΊΡΠΈΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΈΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ ΠΎΡΡΠ°ΡΠ»ΠΈ Π³ΠΎΡΡΠ΄Π°ΡΡΡΠ²Π° Ρ
Π°ΡΠ°ΠΊΡΠ΅ΡΠΈΠ·ΡΡΡΡΡ Π½Π°Π»ΠΈΡΠΈΠ΅ΠΌ Π°Π²ΡΠΎΠΌΠ°ΡΠΈΠ·ΠΈΡΠΎΠ²Π°Π½Π½ΡΡ
ΡΠΈΡΡΠ΅ΠΌ ΡΠΏΡΠ°Π²Π»Π΅Π½ΠΈΡ ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΡΠ΅ΡΠΊΠΈΠΌΠΈ ΠΏΡΠΎΡΠ΅ΡΡΠ°ΠΌΠΈ. ΠΠ½ΠΈ Π²ΠΊΠ»ΡΡΠ°ΡΡ Π² ΡΠ΅Π±Ρ ΡΠΈΡΡΠ΅ΠΌΡ Π΄ΠΈΡΠΏΠ΅ΡΡΠ΅ΡΡΠΊΠΎΠ³ΠΎ ΡΠΏΡΠ°Π²Π»Π΅Π½ΠΈΡ ΠΈ ΡΠ±ΠΎΡΠ° Π΄Π°Π½Π½ΡΡ
, ΡΠΈΡΡΠ΅ΠΌΡ ΡΠ°ΡΠΏΡΠ΅Π΄Π΅Π»Π΅Π½Π½ΠΎΠ³ΠΎ ΡΠΏΡΠ°Π²Π»Π΅Π½ΠΈΡ. ΠΡΡ
ΠΎΠ΄Ρ ΠΈΠ· ΡΡΠΎΠ³ΠΎ, Π²ΡΠΏΠΎΠ»Π½Π΅Π½ΠΎ ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΠ΅ Π½Π΅Π³Π°ΡΠΈΠ²Π½ΡΡ
ΠΏΠΎΡΠ»Π΅Π΄ΡΡΠ²ΠΈΠΉ ΠΊΠΈΠ±Π΅ΡΠ°ΡΠ°ΠΊ Π½Π° ΠΎΠ±ΡΠ΅ΠΊΡΡ ΠΊΡΠΈΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΈΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ. ΠΡΠΈΠ²Π΅Π΄Π΅Π½Ρ ΠΎΡΠ½ΠΎΠ²Π½ΡΠ΅ ΠΊΠ°ΡΠ΅Π³ΠΎΡΠΈΠΈ Π²Π»ΠΈΡΠ½ΠΈΡ Π΄Π΅ΡΡΡΡΠΊΡΠΈΠ²Π½ΡΡ
Π΄Π΅ΠΉΡΡΠ²ΠΈΠΉ Π² Π°Π²ΡΠΎΠΌΠ°ΡΠΈΠ·ΠΈΡΠΎΠ²Π°Π½Π½ΡΡ
ΡΠΈΡΡΠ΅ΠΌΠ°Ρ
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΡΠ΅ΡΠΊΠΈΠΌΠΈ ΠΏΡΠΎΡΠ΅ΡΡΠ°ΠΌΠΈ Π½Π° ΠΎΠ±ΡΠ΅ΠΊΡΠ°Ρ
ΠΊΡΠΈΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΈΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ. ΠΠΎΠΊΠ°Π·Π°Π½Π° Π²Π·Π°ΠΈΠΌΠΎΡΠ²ΡΠ·Ρ ΠΌΠ΅ΠΆΠ΄Ρ ΠΊΠΈΠ±Π΅ΡΠ°ΡΠ°ΠΊΠ°ΠΌΠΈ Π½Π° ΠΎΠ±ΡΠ΅ΠΊΡΠ΅ ΠΊΡΠΈΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΈΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ ΠΈ ΠΏΠΎΡΠ»Π΅Π΄ΡΡΠ²ΠΈΡΠΌΠΈ Π² ΠΏΡΠΎΠΌΡΡΠ»Π΅Π½Π½ΠΎΠΌ ΡΠ΅ΠΊΡΠΎΡΠ΅. ΠΡΠΈΠ²Π΅Π΄Π΅Π½Ρ ΠΊΡΠΈΡΠ΅ΡΠΈΠΈ, ΠΏΠΎ ΠΊΠΎΡΠΎΡΡΠΌ ΡΠΎΡΠΌΠΈΡΡΠ΅ΡΡΡ ΠΏΠ΅ΡΠ΅ΡΠ΅Π½Ρ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΠΎ-ΡΠ΅Π»Π΅ΠΊΠΎΠΌΠΌΡΠ½ΠΈΠΊΠ°ΡΠΈΠΎΠ½Π½ΡΡ
ΡΠΈΡΡΠ΅ΠΌ ΠΎΠ±ΡΠ΅ΠΊΡΠΎΠ² ΠΊΡΠΈΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΈΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ Π³ΠΎΡΡΠ΄Π°ΡΡΡΠ²Π°. Π Π°ΡΡΠΌΠΎΡΡΠ΅Π½Ρ Π°ΠΊΡΠΈΠ²Ρ ΠΎΠ±ΡΠ΅ΠΊΡΠΎΠ² ΠΊΡΠΈΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΈΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ ΠΈ ΡΡΠ΅ΡΠ±, ΠΊΠΎΡΠΎΡΡΠΉ ΠΌΠΎΠΆΠ΅Ρ Π±ΡΡΡ ΠΈΠΌ ΠΏΡΠΈΡΠΈΠ½Π΅Π½. Π Π΅Π·ΡΠ»ΡΡΠ°ΡΡ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½ΠΎΠ³ΠΎ ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΡ ΠΌΠΎΠΆΠ½ΠΎ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΡ ΠΏΡΠΈ ΠΎΡΠ΅Π½ΠΊΠ΅ Π°ΠΊΡΡΠ°Π»ΡΠ½ΠΎΡΡΠΈ ΠΊΠΈΠ±Π΅ΡΡΠ³ΡΠΎΠ· ΠΎΠ±ΡΠ΅ΠΊΡΠΎΠ² ΠΊΡΠΈΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΈΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ
ΠΠΈΡΠ²Π»Π΅Π½Π½Ρ Π²ΠΏΠ»ΠΈΠ²Ρ ΠΊΠΎΠ½ΡΠ΅Π½ΡΡΠ°ΡΡΡ ΠΊΠ°ΡΠ°Π»ΡΠ·Π°ΡΠΎΡΠ° Π½Π° ΠΏΡΠΎΡΠ΅Ρ ΠΏΠ΅ΡΠ΅ΡΠΎΠ±ΠΊΠΈ ΠΌΠ°Π·ΡΡΠ° Π² ΡΠΌΠΎΠ²Π°Ρ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΡ Π°Π΅ΡΠΎΠ·ΠΎΠ»ΡΠ½ΠΎΠ³ΠΎ Π½Π°Π½ΠΎΠΊΠ°ΡΠ°Π»ΡΠ·Ρ
The primary oil processing product is a mixture of different hydrocarbons. One of the hard-to-process petroleum products is fuel oil. This paper considers a method to derive clear (light) fractions of petroleum products by the catalytic processing of fuel oil on a zeolite-containing catalyst at 1Β atm under the technological conditions of aerosol nanocatalysis. The prospect of the catalytic processing of a viscous residue β fuel oil β has been analyzed and estimated. The process is carried out by dispersing the catalytically active component in a vibratory-fluidized layer. Chemical transformation occurs during the constant mechanochemical activation of catalyst particles by forming an aerosol cloud in the reactive volume. Natural zeolite catalyst of the type Y was selected for research. Methods for separating the gasoline and diesel fractions of light hydrocarbons and for analyzing the gas phase have been given. The effect of the concentration of zeolite catalyst aerosol on the composition of cracking products (the yield of the gasoline and diesel fractions of light hydrocarbons) has been studied. It is noted that the rate of the course of fuel oil processing in the aerosol of the catalyst is 1.5β2Β times higher than that in thermal processing. It has been found that in fuel oil processing based on the aerosol nanocatalysis technology, the concentration of the catalyst can be controlled to produce the final product. The study results have shown that the optimal conditions for processing fuel oil in the aerosol of the catalyst should be considered 773Β K, a frequency of 5Β Hz, a pressure of 1Β atm. At the sameΒ time, a concentration of the catalyst of 1β5Β g/m3 should be considered optimal for the output of a light fraction of hydrocarbons. In this case, the yield is up to 80Β % of the fraction in the laboratory. It was found out that during the processing of fuel oil, the concentration of the catalyst makes it possible to optimize the output of light oil products under the technological conditions of aerosol nanocatalysisΠΡΠΎΠ΄ΡΠΊΡΠ°ΠΌΠΈ ΠΏΠ΅ΡΠ²ΠΈΡΠ½ΠΎΠΉ ΠΏΠ΅ΡΠ΅ΡΠ°Π±ΠΎΡΠΊΠΈ Π½Π΅ΡΡΠΈ ΡΠ²Π»ΡΠ΅ΡΡΡ ΡΠΌΠ΅ΡΡ ΡΠ°Π·Π»ΠΈΡΠ½ΡΡ
ΡΠ³Π»Π΅Π²ΠΎΠ΄ΠΎΡΠΎΠ΄ΠΎΠ². ΠΠ΄Π½ΠΈΠΌ ΠΈΠ· ΡΡΡΠ΄Π½ΠΎΠΏΠ΅ΡΠ΅ΡΠ°Π±Π°ΡΡΠ²Π°Π΅ΠΌΡΡ
Π½Π΅ΡΡΠ΅ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ² ΡΠ²Π»ΡΠ΅ΡΡΡ ΠΌΠ°Π·ΡΡ. Π ΡΡΠ°ΡΡΠ΅ ΡΠ°ΡΡΠΌΠΎΡΡΠ΅Π½ ΠΌΠ΅ΡΠΎΠ΄ ΠΏΠΎΠ»ΡΡΠ΅Π½ΠΈΡ ΡΠ²Π΅ΡΠ»ΡΡ
(Π»Π΅Π³ΠΊΠΈΡ
)ΡΡΠ°ΠΊΡΠΈΠΉ Π½Π΅ΡΡΠ΅ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ² ΠΏΡΡΠ΅ΠΌ ΠΊΠ°ΡΠ°Π»ΠΈΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΏΠ΅ΡΠ΅ΡΠ°Π±ΠΎΡΠΊΠΈ ΠΌΠ°Π·ΡΡΠ° Π½Π° ΡΠ΅ΠΎΠ»ΠΈΡΡΠΎΠ΄Π΅ΡΠΆΠ°ΡΠ΅ΠΌ ΠΊΠ°ΡΠ°Π»ΠΈΠ·Π°ΡΠΎΡΠ΅ ΠΏΡΠΈ 1 Π°ΡΠΌ Π² ΡΡΠ»ΠΎΠ²ΠΈΡΡ
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΠΈ Π°ΡΡΠΎΠ·ΠΎΠ»ΡΠ½ΠΎΠ³ΠΎ Π½Π°Π½ΠΎΠΊΠ°ΡΠ°Π»ΠΈΠ·Π°. ΠΡΠΎΠ°Π½Π°Π»ΠΈΠ·ΠΈΡΠΎΠ²Π°Π½Π° ΠΈ ΠΎΡΠ΅Π½Π΅Π½Π° ΠΏΠ΅ΡΡΠΏΠ΅ΠΊΡΠΈΠ²Π° ΠΊΠ°ΡΠ°Π»ΠΈΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΏΠ΅ΡΠ΅ΡΠ°Π±ΠΎΡΠΊΠΈ Π²ΡΠ·ΠΊΠΎΠ³ΠΎ ΠΎΡΡΠ°ΡΠΊΠ° β ΠΌΠ°Π·ΡΡΠ°. ΠΡΠΎΡΠ΅ΡΡ ΠΎΡΡΡΠ΅ΡΡΠ²Π»ΡΠ΅ΡΡΡ ΠΏΡΠΈ Π΄ΠΈΡΠΏΠ΅ΡΠ³ΠΈΡΠΎΠ²Π°Π½ΠΈΠΈ ΠΊΠ°ΡΠ°Π»ΠΈΡΠΈΡΠ΅ΡΠΊΠΈ Π°ΠΊΡΠΈΠ²Π½ΠΎΠ³ΠΎ ΠΊΠΎΠΌΠΏΠΎΠ½Π΅Π½ΡΠ° Π² Π²ΠΈΠ±ΡΠΎΠΎΠΆΠΈΠΆΠ΅Π½Π½ΠΎΠΌ ΡΠ»ΠΎΠ΅. Π₯ΠΈΠΌΠΈΡΠ΅ΡΠΊΠΎΠ΅ ΠΏΡΠ΅Π²ΡΠ°ΡΠ΅Π½ΠΈΠ΅ ΠΏΡΠΎΠΈΡΡ
ΠΎΠ΄ΠΈΡ ΠΏΡΠΈ ΠΏΠΎΡΡΠΎΡΠ½Π½ΠΎΠΉ ΠΌΠ΅Ρ
Π°Π½ΠΎΡ
ΠΈΠΌΠ°ΠΊΡΠΈΠ²Π°ΡΠΈΠΈ ΡΠ°ΡΡΠΈΡ ΠΊΠ°ΡΠ°Π»ΠΈΠ·Π°ΡΠΎΡΠ°, ΡΠΎΠ·Π΄Π°Π²Π°Ρ ΠΎΠ±Π»Π°ΠΊΠΎ Π°ΡΡΠΎΠ·ΠΎΠ»Ρ Π² ΡΠ΅Π°ΠΊΡΠΈΠΎΠ½Π½ΠΎΠΌ ΠΎΠ±ΡΠ΅ΠΌΠ΅. ΠΠ»Ρ ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΠΉ Π±ΡΠ» Π²ΡΠ±ΡΠ°Π½ ΠΏΡΠΈΡΠΎΠ΄Π½ΡΠΉ ΡΠ΅ΠΎΠ»ΠΈΡΠ½ΡΠΉ ΠΊΠ°ΡΠ°Π»ΠΈΠ·Π°ΡΠΎΡ ΡΠΈΠΏ Y. ΠΡΠΈΠ²Π΅Π΄Π΅Π½Ρ ΠΌΠ΅ΡΠΎΠ΄Ρ ΡΠ°Π·Π΄Π΅Π»Π΅Π½ΠΈΡ Π±Π΅Π½Π·ΠΈΠ½ΠΎΠ²ΠΎΠΉ ΠΈ Π΄ΠΈΠ·Π΅Π»ΡΠ½ΠΎΠΉ ΡΡΠ°ΠΊΡΠΈΠΉ ΡΠ²Π΅ΡΠ»ΡΡ
ΡΠ³Π»Π΅Π²ΠΎΠ΄ΠΎΡΠΎΠ΄ΠΎΠ² ΠΈ Π°Π½Π°Π»ΠΈΠ·Π° Π³Π°Π·ΠΎΠ²ΠΎΠΉ ΡΠ°Π·Ρ. ΠΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΎ Π²Π»ΠΈΡΠ½ΠΈΠ΅ ΠΊΠΎΠ½ΡΠ΅Π½ΡΡΠ°ΡΠΈΠΈ Π°ΡΡΠΎΠ·ΠΎΠ»Ρ ΡΠ΅ΠΎΠ»ΠΈΡΠ½ΠΎΠ³ΠΎ ΠΊΠ°ΡΠ°Π»ΠΈΠ·Π°ΡΠΎΡΠ° Π½Π° ΡΠΎΡΡΠ°Π² ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ² ΠΊΡΠ΅ΠΊΠΈΠ½Π³Π° (Π²ΡΡ
ΠΎΠ΄ Π±Π΅Π½Π·ΠΈΠ½ΠΎΠ²ΠΎΠΉ ΠΈ Π΄ΠΈΠ·Π΅Π»ΡΠ½ΠΎΠΉ ΡΡΠ°ΠΊΡΠΈΠΉ ΡΠ²Π΅ΡΠ»ΡΡ
ΡΠ³Π»Π΅Π²ΠΎΠ΄ΠΎΡΠΎΠ΄ΠΎΠ²). ΠΡΠΌΠ΅ΡΠ΅Π½ΠΎ, ΡΡΠΎ ΡΠΊΠΎΡΠΎΡΡΡ ΠΏΡΠΎΡΠ΅ΡΡΠ° ΠΏΠ΅ΡΠ΅ΡΠ°Π±ΠΎΡΠΊΠΈ ΠΌΠ°Π·ΡΡΠ° Π² Π°ΡΡΠΎΠ·ΠΎΠ»Π΅ ΠΊΠ°ΡΠ°Π»ΠΈΠ·Π°ΡΠΎΡΠ° Π² 1,5β2 ΡΠ°Π·Π° Π²ΡΡΠ΅, ΡΠ΅ΠΌ ΠΏΡΠΈ ΡΠ΅ΡΠΌΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΏΠ΅ΡΠ΅ΡΠ°Π±ΠΎΡΠΊΠ΅. ΠΡΡΡΠ½Π΅Π½ΠΎ, ΡΡΠΎ Π² ΠΏΡΠΎΡΠ΅ΡΡΠ΅ ΠΏΠ΅ΡΠ΅ΡΠ°Π±ΠΎΡΠΊΠΈ ΠΌΠ°Π·ΡΡΠ° ΠΏΠΎ ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΠΈ Π°ΡΡΠΎΠ·ΠΎΠ»ΡΠ½ΠΎΠ³ΠΎ Π½Π°Π½ΠΎΠΊΠ°ΡΠ°Π»ΠΈΠ·Π° ΠΊΠΎΠ½ΡΠ΅Π½ΡΡΠ°ΡΠΈΠ΅ΠΉ ΠΊΠ°ΡΠ°Π»ΠΈΠ·Π°ΡΠΎΡΠ° ΠΌΠΎΠΆΠ½ΠΎ ΡΠΏΡΠ°Π²Π»ΡΡΡ Π΄Π»Ρ ΠΏΠΎΠ»ΡΡΠ΅Π½ΠΈΡ ΠΊΠΎΠ½Π΅ΡΠ½ΠΎΠ³ΠΎ ΠΏΡΠΎΠ΄ΡΠΊΡΠ°. Π ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΠ΅ ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΠΉ ΠΏΠΎΠΊΠ°Π·Π°Π½ΠΎ, ΡΡΠΎ ΠΎΠΏΡΠΈΠΌΠ°Π»ΡΠ½ΡΠΌΠΈ ΡΡΠ»ΠΎΠ²ΠΈΡΠΌΠΈ ΠΏΠ΅ΡΠ΅ΡΠ°Π±ΠΎΡΠΊΠΈ ΠΌΠ°Π·ΡΡΠ° Π² Π°ΡΡΠΎΠ·ΠΎΠ»Π΅ ΠΊΠ°ΡΠ°Π»ΠΈΠ·Π°ΡΠΎΡΠ° ΡΠ»Π΅Π΄ΡΠ΅Ρ ΡΡΠΈΡΠ°ΡΡ 773Π, ΡΠ°ΡΡΠΎΡΠ° 5 ΠΡ, Π΄Π°Π²Π»Π΅Π½ΠΈΠ΅ 1 Π°ΡΠΌ. ΠΡΠΈ ΡΡΠΎΠΌ ΠΊΠΎΠ½ΡΠ΅Π½ΡΡΠ°ΡΠΈΡ ΠΊΠ°ΡΠ°Π»ΠΈΠ·Π°ΡΠΎΡΠ° 1β5 Π³/ΠΌ3 ΡΠ»Π΅Π΄ΡΠ΅Ρ ΡΡΠΈΡΠ°ΡΡ ΠΎΠΏΡΠΈΠΌΠ°Π»ΡΠ½ΠΎΠΉ Π΄Π»Ρ Π²ΡΡ
ΠΎΠ΄Π° Π»Π΅Π³ΠΊΠΎΠΉ ΡΡΠ°ΠΊΡΠΈΠΈ ΡΠ³Π»Π΅Π²ΠΎΠ΄ΠΎΡΠΎΠ΄ΠΎΠ². ΠΡΠΈ ΡΡΠΎΠΌ Π²ΡΡ
ΠΎΠ΄ ΡΠΎΡΡΠ°Π²Π»ΡΠ΅Ρ Π΄ΠΎ 80 % ΡΡΠ°ΠΊΡΠΈΠΈ Π² Π»Π°Π±ΠΎΡΠ°ΡΠΎΡΠ½ΡΡ
ΡΡΠ»ΠΎΠ²ΠΈΡΡ
. ΠΡΡΡΠ½Π΅Π½ΠΎ, ΡΡΠΎ ΠΏΡΠΈ ΠΏΠ΅ΡΠ΅ΡΠ°Π±ΠΎΡΠΊΠ΅ ΠΌΠ°Π·ΡΡΠ° ΠΊΠΎΠ½ΡΠ΅Π½ΡΡΠ°ΡΠΈΡ ΠΊΠ°ΡΠ°Π»ΠΈΠ·Π°ΡΠΎΡΠ° ΠΏΠΎΠ·Π²ΠΎΠ»ΡΠ΅Ρ ΠΎΠΏΡΠΈΠΌΠΈΠ·ΠΈΡΠΎΠ²Π°ΡΡ Π²ΡΡ
ΠΎΠ΄ ΡΠ²Π΅ΡΠ»ΡΡ
Π½Π΅ΡΡΠ΅ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ² Π² ΡΡΠ»ΠΎΠ²ΠΈΡΡ
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΠΈ Π°ΡΡΠΎΠ·ΠΎΠ»ΡΠ½ΠΎΠ³ΠΎ Π½Π°Π½ΠΎΠΊΠ°ΡΠ°Π»ΠΈΠ·Π°ΠΡΠΎΠ΄ΡΠΊΡΠ°ΠΌΠΈ ΠΏΠ΅ΡΠ²ΠΈΠ½Π½ΠΎΡ ΠΏΠ΅ΡΠ΅ΡΠΎΠ±ΠΊΠΈ Π½Π°ΡΡΠΈ Ρ ΡΡΠΌΡΡ ΡΡΠ·Π½ΠΈΡ
Π²ΡΠ³Π»Π΅Π²ΠΎΠ΄Π½ΡΠ². ΠΠ΄Π½ΠΈΠΌ Π· Π½Π°ΡΡΠΎΠΏΡΠΎΠ΄ΡΠΊΡΡΠ², ΡΠΎ Π²Π°ΠΆΠΊΠΎ ΠΏΠ΅ΡΠ΅ΡΠΎΠ±Π»ΡΡΡΡΡΡ, Ρ ΠΌΠ°Π·ΡΡ. Π£ ΡΡΠ°ΡΡΡ ΡΠΎΠ·Π³Π»ΡΠ½ΡΡΠΎ ΠΌΠ΅ΡΠΎΠ΄ ΠΎΡΡΠΈΠΌΠ°Π½Π½Ρ ΡΠ²ΡΡΠ»ΠΈΡ
(Π»Π΅Π³ΠΊΠΈΡ
) ΡΡΠ°ΠΊΡΡΠΉ Π½Π°ΡΡΠΎΠΏΡΠΎΠ΄ΡΠΊΡΡΠ² ΡΠ»ΡΡ
ΠΎΠΌ ΠΊΠ°ΡΠ°Π»ΡΡΠΈΡΠ½ΠΎΡ ΠΏΠ΅ΡΠ΅ΡΠΎΠ±ΠΊΠΈ ΠΌΠ°Π·ΡΡΡ Π½Π° ΡΠ΅ΠΎΠ»ΠΈΡΠ²ΠΌΡΡΡΠ½ΠΎΠΌΡ ΠΊΠ°ΡΠ°Π»ΡΠ·Π°ΡΠΎΡΡ ΠΏΡΠΈ 1 Π°ΡΠΌ Π² ΡΠΌΠΎΠ²Π°Ρ
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΡΡ Π°Π΅ΡΠΎΠ·ΠΎΠ»ΡΠ½ΠΎΠ³ΠΎ Π½Π°Π½ΠΎΠΊΠ°ΡΠ°Π»ΡΠ·Ρ. ΠΡΠΎΠ°Π½Π°Π»ΡΠ·ΠΎΠ²Π°Π½ΠΎ ΡΠ° ΠΎΡΡΠ½Π΅Π½ΠΎ ΠΏΠ΅ΡΡΠΏΠ΅ΠΊΡΠΈΠ²Π° ΠΊΠ°ΡΠ°Π»ΡΡΠΈΡΠ½ΠΎΡ ΠΏΠ΅ΡΠ΅ΡΠΎΠ±ΠΊΠΈ Π²'ΡΠ·ΠΊΠΎΠ³ΠΎ Π·Π°Π»ΠΈΡΠΊΡ β ΠΌΠ°Π·ΡΡΡ. ΠΡΠΎΡΠ΅Ρ Π·Π΄ΡΠΉΡΠ½ΡΡΡΡΡΡ ΠΏΡΠΈ Π΄ΠΈΡΠΏΠ΅ΡΠ³ΡΠ²Π°Π½Π½Ρ ΠΊΠ°ΡΠ°Π»ΡΡΠΈΡΠ½ΠΎ Π°ΠΊΡΠΈΠ²Π½ΠΈΠΌ ΠΊΠΎΠΌΠΏΠΎΠ½Π΅Π½ΡΠΎΠΌ Π² Π²ΡΠ±ΡΠΎΠ·ΡΡΠ΄ΠΆΠ΅Π½ΠΎΠΌΡ ΡΠ°ΡΡ. Π₯ΡΠΌΡΡΠ½Π΅ ΠΏΠ΅ΡΠ΅ΡΠ²ΠΎΡΠ΅Π½Π½Ρ Π²ΡΠ΄Π±ΡΠ²Π°ΡΡΡΡΡ ΠΏΡΠΈ ΠΏΠΎΡΡΡΠΉΠ½ΡΠΉ ΠΌΠ΅Ρ
Π°Π½ΠΎΡ
ΡΠΌΠ°ΠΊΡΠΈΠ²Π°ΡΡΡ ΡΠ°ΡΡΠΈΠ½ΠΎΠΊ ΠΊΠ°ΡΠ°Π»ΡΠ·Π°ΡΠΎΡΠ°, ΡΡΠ²ΠΎΡΡΡΡΠΈ Ρ
ΠΌΠ°ΡΡ Π°Π΅ΡΠΎΠ·ΠΎΠ»Ρ Π² ΡΠ΅Π°ΠΊΡΡΠΉΠ½ΠΎΠΌΡ ΠΎΠ±ΡΡΠ·Ρ. ΠΠ»Ρ Π΄ΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½Ρ Π±ΡΠ² ΠΎΠ±ΡΠ°Π½ΠΈΠΉ ΠΏΡΠΈΡΠΎΠ΄Π½ΠΈΠΉ ΡΠ΅ΠΎΠ»ΡΡΠ½ΠΈΠΉ ΠΊΠ°ΡΠ°Π»ΡΠ·Π°ΡΠΎΡ ΡΠΈΠΏΡ Y. ΠΠ°Π²Π΅Π΄Π΅Π½ΠΎ ΠΌΠ΅ΡΠΎΠ΄ΠΈ ΠΏΠΎΠ΄ΡΠ»Ρ Π±Π΅Π½Π·ΠΈΠ½ΠΎΠ²ΠΎΡ Ρ Π΄ΠΈΠ·Π΅Π»ΡΠ½ΠΎΡ ΡΡΠ°ΠΊΡΡΠΉ ΡΠ²ΡΡΠ»ΠΈΡ
Π²ΡΠ³Π»Π΅Π²ΠΎΠ΄Π½ΡΠ² Ρ Π°Π½Π°Π»ΡΠ·Ρ Π³Π°Π·ΠΎΠ²ΠΎΡ ΡΠ°Π·ΠΈ. ΠΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½ΠΎ Π²ΠΏΠ»ΠΈΠ² ΠΊΠΎΠ½ΡΠ΅Π½ΡΡΠ°ΡΡΡ Π°Π΅ΡΠΎΠ·ΠΎΠ»Ρ ΡΠ΅ΠΎΠ»ΡΡΠ½ΠΎΠ³ΠΎ ΠΊΠ°ΡΠ°Π»ΡΠ·Π°ΡΠΎΡΠ° Π½Π° ΡΠΊΠ»Π°Π΄ ΠΏΡΠΎΠ΄ΡΠΊΡΡΠ² ΠΊΡΠ΅ΠΊΡΠ½Π³Ρ (Π²ΠΈΡ
ΡΠ΄ Π±Π΅Π½Π·ΠΈΠ½ΠΎΠ²ΠΎΡ Ρ Π΄ΠΈΠ·Π΅Π»ΡΠ½ΠΎΡ ΡΡΠ°ΠΊΡΡΠΉ ΡΠ²ΡΡΠ»ΠΈΡ
Π²ΡΠ³Π»Π΅Π²ΠΎΠ΄Π½ΡΠ²). ΠΡΠ΄Π·Π½Π°ΡΠ΅Π½ΠΎ, ΡΠΎ ΡΠ²ΠΈΠ΄ΠΊΡΡΡΡ ΠΏΡΠΎΡΠ΅ΡΡ ΠΏΠ΅ΡΠ΅ΡΠΎΠ±ΠΊΠΈ ΠΌΠ°Π·ΡΡΡ Π² Π°Π΅ΡΠΎΠ·ΠΎΠ»Ρ ΠΊΠ°ΡΠ°Π»ΡΠ·Π°ΡΠΎΡΠ° Π² 1,5β2 ΡΠ°Π·ΠΈ Π²ΠΈΡΠ΅, Π½ΡΠΆ ΠΏΡΠΈ ΡΠ΅ΡΠΌΡΡΠ½ΡΠΉ ΠΏΠ΅ΡΠ΅ΡΠΎΠ±ΡΡ. Π'ΡΡΠΎΠ²Π°Π½ΠΎ, ΡΠΎ Π² ΠΏΡΠΎΡΠ΅ΡΡ ΠΏΠ΅ΡΠ΅ΡΠΎΠ±ΠΊΠΈ ΠΌΠ°Π·ΡΡΡ Π·Π° ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΡΡΡ Π°Π΅ΡΠΎΠ·ΠΎΠ»ΡΠ½ΠΎΠ³ΠΎ Π½Π°Π½ΠΎΠΊΠ°ΡΠ°Π»ΡΠ·Ρ ΠΊΠΎΠ½ΡΠ΅Π½ΡΡΠ°ΡΡΡΡ ΠΊΠ°ΡΠ°Π»ΡΠ·Π°ΡΠΎΡΠ° ΠΌΠΎΠΆΠ½Π° ΠΊΠ΅ΡΡΠ²Π°ΡΠΈ Π΄Π»Ρ ΠΎΡΡΠΈΠΌΠ°Π½Π½Ρ ΠΊΡΠ½ΡΠ΅Π²ΠΎΠ³ΠΎ ΠΏΡΠΎΠ΄ΡΠΊΡΡ. Π ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΡ Π΄ΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½Ρ ΠΏΠΎΠΊΠ°Π·Π°Π½ΠΎ, ΡΠΎ ΠΎΠΏΡΠΈΠΌΠ°Π»ΡΠ½ΠΈΠΌΠΈ ΡΠΌΠΎΠ²Π°ΠΌΠΈ ΠΏΠ΅ΡΠ΅ΡΠΎΠ±ΠΊΠΈ ΠΌΠ°Π·ΡΡΡ Π² Π°Π΅ΡΠΎΠ·ΠΎΠ»Ρ ΠΊΠ°ΡΠ°Π»ΡΠ·Π°ΡΠΎΡΠ° ΡΠ»ΡΠ΄ Π²Π²Π°ΠΆΠ°ΡΠΈ 773Π, ΡΠ°ΡΡΠΎΡΠ° 5 ΠΡ, ΡΠΈΡΠΊ 1 Π°ΡΠΌ. ΠΡΠΈ ΡΡΠΎΠΌΡ ΠΊΠΎΠ½ΡΠ΅Π½ΡΡΠ°ΡΡΡ ΠΊΠ°ΡΠ°Π»ΡΠ·Π°ΡΠΎΡΠ° 1β5 Π³/ΠΌ3 ΡΠ»ΡΠ΄ Π²Π²Π°ΠΆΠ°ΡΠΈ ΠΎΠΏΡΠΈΠΌΠ°Π»ΡΠ½ΠΎΡ Π΄Π»Ρ Π²ΠΈΡ
ΠΎΠ΄Ρ Π»Π΅Π³ΠΊΠΎΡ ΡΡΠ°ΠΊΡΡΡ Π²ΡΠ³Π»Π΅Π²ΠΎΠ΄Π½ΡΠ². ΠΡΠΈ ΡΡΠΎΠΌΡ Π²ΠΈΡ
ΡΠ΄ ΡΡΠ°Π½ΠΎΠ²ΠΈΡΡ Π΄ΠΎ 80% ΡΡΠ°ΠΊΡΡΡ Π² Π»Π°Π±ΠΎΡΠ°ΡΠΎΡΠ½ΠΈΡ
ΡΠΌΠΎΠ²Π°Ρ
. Π'ΡΡΠΎΠ²Π°Π½ΠΎ, ΡΠΎ ΠΏΡΠΈ ΠΏΠ΅ΡΠ΅ΡΠΎΠ±ΡΡ ΠΌΠ°Π·ΡΡΡ ΠΊΠΎΠ½ΡΠ΅Π½ΡΡΠ°ΡΡΡ ΠΊΠ°ΡΠ°Π»ΡΠ·Π°ΡΠΎΡΠ° Π΄ΠΎΠ·Π²ΠΎΠ»ΡΡ ΠΎΠΏΡΠΈΠΌΡΠ·ΡΠ²Π°ΡΠΈ Π²ΠΈΡ
ΡΠ΄ ΡΠ²ΡΡΠ»ΠΈΡ
Π½Π°ΡΡΠΎΠΏΡΠΎΠ΄ΡΠΊΡΡΠ² Π² ΡΠΌΠΎΠ²Π°Ρ
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΡΡ Π°Π΅ΡΠΎΠ·ΠΎΠ»ΡΠ½ΠΎΠ³ΠΎ Π½Π°Π½ΠΎΠΊΠ°ΡΠ°Π»ΡΠ·
Revealing the Effect of Catalyst Concentration on the Process of Fuel Oil Refining Using the TECHNOLOGY of Aerosol Nano Catalysis
The primary oil processing product is a mixture of different hydrocarbons. One of the hard-to-process petroleum products is fuel oil. This paper considers a method to derive clear (light) fractions of petroleum products by the catalytic processing of fuel oil on a zeolite-containing catalyst at 1 atm under the technological conditions of aerosol nanocatalysis. The prospect of the catalytic processing of a viscous residue β fuel oil β has been analyzed and estimated. The process is carried out by dispersing the catalytically active component in a vibratory-fluidized layer. Chemical transformation occurs during the constant mechanochemical activation of catalyst particles by forming an aerosol cloud in the reactive volume. Natural zeolite catalyst of the type Y was selected for research. Methods for separating the gasoline and diesel fractions of light hydrocarbons and for analyzing the gas phase have been given. The effect of the concentration of zeolite catalyst aerosol on the composition of cracking products (the yield of the gasoline and diesel fractions of light hydrocarbons) has been studied. It is noted that the rate of the course of fuel oil processing in the aerosol of the catalyst is 1.5β2 times higher than that in thermal processing. It has been found that in fuel oil processing based on the aerosol nanocatalysis technology, the concentration of the catalyst can be controlled to produce the final product. The study results have shown that the optimal conditions for processing fuel oil in the aerosol of the catalyst should be considered 773 K, a frequency of 5 Hz, a pressure of 1 atm. At the same time, a concentration of the catalyst of 1β5 g/m3 should be considered optimal for the output of a light fraction of hydrocarbons. In this case, the yield is up to 80 % of the fraction in the laboratory. It was found out that during the processing of fuel oil, the concentration of the catalyst makes it possible to optimize the output of light oil products under the technological conditions of aerosol nanocatalysi