6 research outputs found

    SYNERGY OF BUILDING CYBERSECURITY SYSTEMS

    Get PDF
    The development of the modern world community is closely related to advances in computing resources and cyberspace. The formation and expansion of the range of services is based on the achievements of mankind in the field of high technologies. However, the rapid growth of computing resources, the emergence of a full-scale quantum computer tightens the requirements for security systems not only for information and communication systems, but also for cyber-physical systems and technologies. The methodological foundations of building security systems for critical infrastructure facilities based on modeling the processes of behavior of antagonistic agents in security systems are discussed in the first chapter. The concept of information security in social networks, based on mathematical models of data protection, taking into account the influence of specific parameters of the social network, the effects on the network are proposed in second chapter. The nonlinear relationships of the parameters of the defense system, attacks, social networks, as well as the influence of individual characteristics of users and the nature of the relationships between them, takes into account. In the third section, practical aspects of the methodology for constructing post-quantum algorithms for asymmetric McEliece and Niederreiter cryptosystems on algebraic codes (elliptic and modified elliptic codes), their mathematical models and practical algorithms are considered. Hybrid crypto-code constructions of McEliece and Niederreiter on defective codes are proposed. They can significantly reduce the energy costs for implementation, while ensuring the required level of cryptographic strength of the system as a whole. The concept of security of corporate information and educational systems based on the construction of an adaptive information security system is proposed. ISBN 978-617-7319-31-2 (on-line)ISBN 978-617-7319-32-9 (print) ------------------------------------------------------------------------------------------------------------------ How to Cite: Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O., Korol, O., Milevskyi, S. et. al.; Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O. (Eds.) (2021). Synergy of building cybersecurity systems. Kharkiv: Π Π‘ Π’Π•Π‘HNOLOGY Π‘Π•NTΠ•R, 188. doi: http://doi.org/10.15587/978-617-7319-31-2 ------------------------------------------------------------------------------------------------------------------ Indexing:                    Π ΠΎΠ·Π²ΠΈΡ‚ΠΎΠΊ сучасної світової ΡΠΏΡ–Π»ΡŒΠ½ΠΎΡ‚ΠΈ тісно пов’язаний Π· досягнСннями Π² області ΠΎΠ±Ρ‡ΠΈΡΠ»ΡŽΠ²Π°Π»ΡŒΠ½ΠΈΡ… рСсурсів Ρ– кібСрпростору. Ѐормування Ρ‚Π° Ρ€ΠΎΠ·ΡˆΠΈΡ€Π΅Π½Π½Ρ асортимСнту послуг Π±Π°Π·ΡƒΡ”Ρ‚ΡŒΡΡ Π½Π° досягнСннях Π»ΡŽΠ΄ΡΡ‚Π²Π° Ρƒ Π³Π°Π»ΡƒΠ·Ρ– високих Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³Ρ–ΠΉ. Однак стрімкС зростання ΠΎΠ±Ρ‡ΠΈΡΠ»ΡŽΠ²Π°Π»ΡŒΠ½ΠΈΡ… рСсурсів, поява ΠΏΠΎΠ²Π½ΠΎΠΌΠ°ΡΡˆΡ‚Π°Π±Π½ΠΎΠ³ΠΎ ΠΊΠ²Π°Π½Ρ‚ΠΎΠ²ΠΎΠ³ΠΎ ΠΊΠΎΠΌΠΏβ€™ΡŽΡ‚Π΅Ρ€Π° ΠΏΠΎΡΠΈΠ»ΡŽΡ” Π²ΠΈΠΌΠΎΠ³ΠΈ Π΄ΠΎ систСм Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π½Π΅ Ρ‚Ρ–Π»ΡŒΠΊΠΈ Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½ΠΎ-ΠΊΠΎΠΌΡƒΠ½Ρ–ΠΊΠ°Ρ†Ρ–ΠΉΠ½ΠΈΡ…, Π°Π»Π΅ Ρ– Π΄ΠΎ ΠΊΡ–Π±Π΅Ρ€Ρ„Ρ–Π·ΠΈΡ‡Π½ΠΈΡ… систСм Ρ– Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³Ρ–ΠΉ. Π£ ΠΏΠ΅Ρ€ΡˆΠΎΠΌΡƒ Ρ€ΠΎΠ·Π΄Ρ–Π»Ρ– ΠΎΠ±Π³ΠΎΠ²ΠΎΡ€ΡŽΡŽΡ‚ΡŒΡΡ ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΎΠ»ΠΎΠ³Ρ–Ρ‡Π½Ρ– основи ΠΏΠΎΠ±ΡƒΠ΄ΠΎΠ²ΠΈ систСм Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ для ΠΎΠ±'Ρ”ΠΊΡ‚Ρ–Π² ΠΊΡ€ΠΈΡ‚ΠΈΡ‡Π½ΠΎΡ— інфраструктури Π½Π° основі модСлювання процСсів ΠΏΠΎΠ²Π΅Π΄Ρ–Π½ΠΊΠΈ антагоністичних Π°Π³Π΅Π½Ρ‚Ρ–Π² Ρƒ систСм Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ. Π£ Π΄Ρ€ΡƒΠ³ΠΎΠΌΡƒ Ρ€ΠΎΠ·Π΄Ρ–Π»Ρ– ΠΏΡ€ΠΎΠΏΠΎΠ½ΡƒΡ”Ρ‚ΡŒΡΡ концСпція Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½ΠΎΡ— Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π² ΡΠΎΡ†Ρ–Π°Π»ΡŒΠ½ΠΈΡ… ΠΌΠ΅Ρ€Π΅ΠΆΠ°Ρ…, яка заснована Π½Π° ΠΌΠ°Ρ‚Π΅ΠΌΠ°Ρ‚ΠΈΡ‡Π½ΠΈΡ… модСлях захисту Π΄Π°Π½ΠΈΡ…, Π· урахуванням Π²ΠΏΠ»ΠΈΠ²Ρƒ ΠΊΠΎΠ½ΠΊΡ€Π΅Ρ‚Π½ΠΈΡ… ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Ρ–Π² ΡΠΎΡ†Ρ–Π°Π»ΡŒΠ½ΠΎΡ— ΠΌΠ΅Ρ€Π΅ΠΆΡ– Ρ‚Π° наслідків для Π½Π΅Ρ—. Π’Ρ€Π°Ρ…ΠΎΠ²ΡƒΡŽΡ‚ΡŒΡΡ Π½Π΅Π»Ρ–Π½Ρ–ΠΉΠ½Ρ– Π²Π·Π°Ρ”ΠΌΠΎΠ·Π²'язки ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Ρ–Π² систСми захисту, Π°Ρ‚Π°ΠΊ, ΡΠΎΡ†Ρ–Π°Π»ΡŒΠ½ΠΈΡ… ΠΌΠ΅Ρ€Π΅ΠΆ, Π° Ρ‚Π°ΠΊΠΎΠΆ Π²ΠΏΠ»ΠΈΠ² Ρ–Π½Π΄ΠΈΠ²Ρ–Π΄ΡƒΠ°Π»ΡŒΠ½ΠΈΡ… характСристик користувачів Ρ– Ρ…Π°Ρ€Π°ΠΊΡ‚Π΅Ρ€Ρƒ взаємовідносин ΠΌΡ–ΠΆ Π½ΠΈΠΌΠΈ. Π£ Ρ‚Ρ€Π΅Ρ‚ΡŒΠΎΠΌΡƒ Ρ€ΠΎΠ·Π΄Ρ–Π»Ρ– Ρ€ΠΎΠ·Π³Π»ΡΠ΄Π°ΡŽΡ‚ΡŒΡΡ ΠΏΡ€Π°ΠΊΡ‚ΠΈΡ‡Π½Ρ– аспСкти ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΎΠ»ΠΎΠ³Ρ–Ρ— ΠΏΠΎΠ±ΡƒΠ΄ΠΎΠ²ΠΈ постквантових Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΡ–Π² для асимСтричних криптосистСм Мак-Еліса Ρ‚Π° НідСррСйтСра Π½Π° Π°Π»Π³Π΅Π±Ρ€Π°Ρ—Ρ‡Π½ΠΈΡ… ΠΊΠΎΠ΄Π°Ρ… (Π΅Π»Ρ–ΠΏΡ‚ΠΈΡ‡Π½ΠΈΡ… Ρ‚Π° ΠΌΠΎΠ΄ΠΈΡ„Ρ–ΠΊΠΎΠ²Π°Π½ΠΈΡ… Π΅Π»Ρ–ΠΏΡ‚ΠΈΡ‡Π½ΠΈΡ… ΠΊΠΎΠ΄Π°Ρ…), Ρ—Ρ… ΠΌΠ°Ρ‚Π΅ΠΌΠ°Ρ‚ΠΈΡ‡Π½Ρ– ΠΌΠΎΠ΄Π΅Π»Ρ– Ρ‚Π° ΠΏΡ€Π°ΠΊΡ‚ΠΈΡ‡Π½Ρ– Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΠΈ. Π—Π°ΠΏΡ€ΠΎΠΏΠΎΠ½ΠΎΠ²Π°Π½ΠΎ Π³Ρ–Π±Ρ€ΠΈΠ΄Π½Ρ– конструкції ΠΊΡ€ΠΈΠΏΡ‚ΠΎΠΊΠΎΠ΄Ρƒ Мак-Еліса Ρ‚Π° НідСррСйтСра Π½Π° Π΄Π΅Ρ„Π΅ΠΊΡ‚Π½ΠΈΡ… ΠΊΠΎΠ΄Π°Ρ…. Π’ΠΎΠ½ΠΈ Π΄ΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‚ΡŒ істотно Π·Π½ΠΈΠ·ΠΈΡ‚ΠΈ Π΅Π½Π΅Ρ€Π³Π΅Ρ‚ΠΈΡ‡Π½Ρ– Π²ΠΈΡ‚Ρ€Π°Ρ‚ΠΈ Π½Π° Ρ€Π΅Π°Π»Ρ–Π·Π°Ρ†Ρ–ΡŽ, Π·Π°Π±Π΅Π·ΠΏΠ΅Ρ‡ΡƒΡŽΡ‡ΠΈ ΠΏΡ€ΠΈ Ρ†ΡŒΠΎΠΌΡƒ Π½Π΅ΠΎΠ±Ρ…Ρ–Π΄Π½ΠΈΠΉ Ρ€Ρ–Π²Π΅Π½ΡŒ ΠΊΡ€ΠΈΠΏΡ‚ΠΎΠ³Ρ€Π°Ρ„Ρ–Ρ‡Π½ΠΎΡ— стійкості систСми Π² Ρ†Ρ–Π»ΠΎΠΌΡƒ. Π—Π°ΠΏΡ€ΠΎΠΏΠΎΠ½ΠΎΠ²Π°Π½ΠΎ ΠΊΠΎΠ½Ρ†Π΅ΠΏΡ†Ρ–ΡŽ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΠΊΠΎΡ€ΠΏΠΎΡ€Π°Ρ‚ΠΈΠ²Π½ΠΈΡ… Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½ΠΈΡ… Ρ‚Π° освітніх систСм, які засновані Π½Π° ΠΏΠΎΠ±ΡƒΠ΄ΠΎΠ²Ρ– Π°Π΄Π°ΠΏΡ‚ΠΈΠ²Π½ΠΎΡ— систСми захисту Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–Ρ—. ISBN 978-617-7319-31-2 (on-line)ISBN 978-617-7319-32-9 (print) ------------------------------------------------------------------------------------------------------------------ Π―ΠΊ Ρ†ΠΈΡ‚ΡƒΠ²Π°Ρ‚ΠΈ: Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O., Korol, O., Milevskyi, S. et. al.; Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O. (Eds.) (2021). Synergy of building cybersecurity systems. Kharkiv: Π Π‘ Π’Π•Π‘HNOLOGY Π‘Π•NTΠ•R, 188. doi: http://doi.org/10.15587/978-617-7319-31-2 ------------------------------------------------------------------------------------------------------------------ ІндСксація:                 &nbsp

    The concept of building security of the network with elements of the semiotic approach

    Get PDF
    The object of research: First, to identify and discuss the security problems of cyber-physical systems associated with the emergence of qualitatively new technologies and qualitatively new affordable artificial intelligence software. Secondly, building the concept of the security structure of a cyber-physical system based on the Zero Trust Security approach. Creation of a new secure load transfer structure based on the semiotic approach. Investigated problem: Information system security problems continue to cause significant costs and damage to organizations. Sustainability requires comprehensive and integrated security platforms that reach customers, whether they work at headquarters, in a branch office, or individually from random touchpoints. The main scientific results: the concept of a structured protection system with the Zero Trust Security approach has been developed. The structure of the semiotic analysis of the segmentation of the transmitted load on the blocks is proposed. Blocks by signs are subjected to individual analysis. According to the features, the blocks are transformed by the selected representation into an object/groups of objects. Groups for transmission in the load are tagged, have different coding severity (depth), depending on the risk assessment. Groups are transmitted through the network in different ways (paths) – VPN (different ESP), unencrypted tunnel, open access, etc. This solution improves the throughput of malicious load analysis prior to transmission. The performance overhead for encoding/decoding the load and encapsulating/de-encapsulating during transmission is reduced. The transmission bandwidth is increased. The area of practical use of the research results: businesses requiring secure access to on-premise resources and mission-critical cloud environments. Organizations using employees in distributed networks. Specialists in the deployment and analysis of the protection of cyber-physical systems. Innovative technological product: The semiotic security concept extends the zero-trust security model, which focuses on protecting network traffic within and between organizations. This concept uses load traffic segmentation, which combines an advanced analysis and transfer load transformation framework. This concept provides for integration with other cybersecurity technologies such as endpoint discovery and response (EDR) and security information and event management (SIEM) to provide a more comprehensive security solution. This solution improves the throughput of malicious load analysis prior to transmission. Reduced performance resources for encode/decode load and encapsulate/deencapsulate in transit. Scope of the innovative technological product: this concept can be applied to enterprises that already have some elements of zero trust in their corporate infrastructure, but cannot strictly control the state of the requested assets, are limited in implementing security policies for certain classes of users. This deployment model can also be applied to enterprises that use cloud services for individual business processes. It can be useful for researchers and administrators in the development of corporate cybersecurity plans, which uses the concepts of zero-trust and covers relationships between components, workflow planning, and access policies

    Π ΠΎΠ·Ρ€ΠΎΠ±ΠΊΠ° ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΎΠ»ΠΎΠ³Ρ–Ρ‡Π½ΠΈΡ… основ ΠΏΠΎΠ±ΡƒΠ΄ΠΎΠ²ΠΈ класифікатору Π·Π°Π³Ρ€ΠΎΠ· ΠΊΡ–Π±Π΅Ρ€Ρ„Ρ–Π·ΠΈΡ‡Π½ΠΈΡ… систСм

    No full text
    The emergence of a full-scale quantum computer questions the stability of almost all symmetric and asymmetric cryptography algorithms. At the same time, the rapid growth of computing resources of IT and β€œG” technologies contributes to an increase in attacks on information and communication (ICS) and cyberphysical systems (CPS). These systems are the core of modern critical cybernetic information systems (CCIS). In such conditions, the primary task of maintaining the required level of security is the classification of modern threats that are integrated with social engineering methods and acquire signs of synergy and hybridity. The paper proposes a synergistic model of threats to ICS/CPS, which takes into account the focus of threats on synergy and hybridity, and the combined impact of security components: information security (IS), cybersecurity (CS), security of information (SI). This approach allows developing methodological foundations for building a unified classifier of threats to cyberphysical systems, forming sets of critical threats, critical points in the ICS/CPS infrastructure elements, based on minimal computing, human and economic costs. The developed methodology for determining the category of an attacker allows systematizing an attacker and, based on the analysis of weighting factors, forming a matrix of correspondence between the capabilities of attackers of various categories and technical means of information security (TMIS). These actions significantly reduce the risk of an attack by certain categories of attackers and allow for planning in the formation of both the IS policy and the corresponding protection profiles.Π’ условиях появлСния ΠΏΠΎΠ»Π½ΠΎΠΌΠ°ΡΡˆΡ‚Π°Π±Π½ΠΎΠ³ΠΎ ΠΊΠ²Π°Π½Ρ‚ΠΎΠ²ΠΎΠ³ΠΎ ΠΊΠΎΠΌΠΏΡŒΡŽΡ‚Π΅Ρ€Π° ставится ΠΏΠΎΠ΄ сомнСниС ΡΡ‚ΠΎΠΉΠΊΠΎΡΡ‚ΡŒ практичСски всСх Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΠΎΠ² симмСтричной ΠΈ нСсиммСтричной ΠΊΡ€ΠΈΠΏΡ‚ΠΎΠ³Ρ€Π°Ρ„ΠΈΠΈ. ΠŸΡ€ΠΈ этом Π±ΡƒΡ€Π½Ρ‹ΠΉ рост Π²Ρ‹Ρ‡ΠΈΡΠ»ΠΈΡ‚Π΅Π»ΡŒΠ½Ρ‹Ρ… рСсурсов ИВ ΠΈ Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³ΠΈΠΉ β€œG” способствуСт ΡƒΠ²Π΅Π»ΠΈΡ‡Π΅Π½ΠΈΡŽ роста Π°Ρ‚Π°ΠΊ Π½Π° ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎ-ΠΊΠΎΠΌΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Π΅ (ICS) ΠΈ кибСрфизичСскиС систСмы (CPS). Π­Ρ‚ΠΈ систСмы ΡΠ²Π»ΡΡŽΡ‚ΡΡ ядром соврСмСнных ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎ-критичСских кибСрнСтичСских систСм (CCIS). Π’ Ρ‚Π°ΠΊΠΈΡ… условиях ΠΏΠ΅Ρ€Π²ΠΎΠΎΡ‡Π΅Ρ€Π΅Π΄Π½ΠΎΠΉ Π·Π°Π΄Π°Ρ‡Π΅ΠΉ поддСрТания Ρ‚Ρ€Π΅Π±ΡƒΠ΅ΠΌΠΎΠ³ΠΎ уровня бСзопасности являСтся классификация соврСмСнных ΡƒΠ³Ρ€ΠΎΠ·, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠΈΡ€ΡƒΡŽΡ‚ΡΡ с ΠΌΠ΅Ρ‚ΠΎΠ΄Π°ΠΌΠΈ ΡΠΎΡ†ΠΈΠ°Π»ΡŒΠ½ΠΎΠΉ ΠΈΠ½ΠΆΠ΅Π½Π΅Ρ€ΠΈΠΈ, ΠΈ ΠΏΡ€ΠΈΠΎΠ±Ρ€Π΅Ρ‚Π°ΡŽΡ‚ ΠΏΡ€ΠΈΠ·Π½Π°ΠΊΠΈ синСргии ΠΈ гибридности. Π’ Ρ€Π°Π±ΠΎΡ‚Π΅ прСдлагаСтся синСргСтичСская модСль ΡƒΠ³Ρ€ΠΎΠ· Π½Π° ICS/CPS, которая ΡƒΡ‡ΠΈΡ‚Ρ‹Π²Π°Π΅Ρ‚ Π½Π°ΠΏΡ€Π°Π²Π»Π΅Π½Π½ΠΎΡΡ‚ΡŒ ΡƒΠ³Ρ€ΠΎΠ· Π½Π° ΡΠΈΠ½Π΅Ρ€Π³ΠΈΡŽ ΠΈ Π³ΠΈΠ±Ρ€ΠΈΠ΄Π½ΠΎΡΡ‚ΡŒ, ΠΈ комплСксированноС воздСйствиС ΡΠΎΡΡ‚Π°Π²Π»ΡΡŽΡ‰ΠΈΡ… бСзопасности: ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΡƒΡŽ Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡ‚ΡŒ (Π˜Π‘), ΠΊΠΈΠ±Π΅Ρ€Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡ‚ΡŒ (ΠšΠ‘), Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡ‚ΡŒ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ (Π‘Π˜). Π’Π°ΠΊΠΎΠΉ ΠΏΠΎΠ΄Ρ…ΠΎΠ΄ позволяСт Ρ€Π°Π·Ρ€Π°Π±ΠΎΡ‚Π°Ρ‚ΡŒ мСтодологичСскиС основы построСния ΡƒΠ½ΠΈΡ„ΠΈΡ†ΠΈΡ€ΠΎΠ²Π°Π½Π½ΠΎΠ³ΠΎ классификатора ΡƒΠ³Ρ€ΠΎΠ· кибСрфизичСскиС систСмы, ΠΎΠ±Π΅ΡΠΏΠ΅Ρ‡ΠΈΡ‚ΡŒ Ρ„ΠΎΡ€ΠΌΠΈΡ€ΠΎΠ²Π°Π½ΠΈΠ΅ мноТСств критичСских ΡƒΠ³Ρ€ΠΎΠ·, критичСских Ρ‚ΠΎΡ‡Π΅ΠΊ Π² элСмСнтах инфраструктуры ICS/CPS, Π½Π° основС ΠΌΠΈΠ½ΠΈΠΌΠ°Π»ΡŒΠ½Ρ‹Ρ… Π²Ρ‹Ρ‡ΠΈΡΠ»ΠΈΡ‚Π΅Π»ΡŒΠ½Ρ‹Ρ…, Π»ΡŽΠ΄ΡΠΊΠΈΡ… ΠΈ экономичСских Π·Π°Ρ‚Ρ€Π°Ρ‚. Разработанная ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΈΠΊΠ° опрСдСлСния ΠΊΠ°Ρ‚Π΅Π³ΠΎΡ€ΠΈΠΈ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΠ° позволяСт ΡΠΈΡΡ‚Π΅ΠΌΠ°Ρ‚ΠΈΠ·ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΠ° ΠΈ Π½Π° основС Π°Π½Π°Π»ΠΈΠ·Π° вСсовых коэффициСнтов ΡΡ„ΠΎΡ€ΠΌΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ ΠΌΠ°Ρ‚Ρ€ΠΈΡ†Ρƒ соотвСтствия ΠΌΠ΅ΠΆΠ΄Ρƒ возмоТностями Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΠΎΠ² Ρ€Π°Π·Π»ΠΈΡ‡Π½Ρ‹Ρ… ΠΊΠ°Ρ‚Π΅Π³ΠΎΡ€ΠΈΠΉ ΠΈ тСхничСскими срСдствами Π·Π°Ρ‰ΠΈΡ‚Ρ‹ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ (Π’Π‘Π—Π˜). Π­Ρ‚ΠΈ дСйствия сущСствСнно ΡΠ½ΠΈΠΆΠ°ΡŽΡ‚ ΡƒΡ€ΠΎΠ²Π΅Π½ΡŒ риска Ρ€Π΅Π°Π»ΠΈΠ·Π°Ρ†ΠΈΠΈ Π°Ρ‚Π°ΠΊΠΈ ΠΎΠΏΡ€Π΅Π΄Π΅Π»Π΅Π½Π½Ρ‹ΠΌΠΈ катСгориями Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΠΎΠ² ΠΈ ΠΏΠΎΠ·Π²ΠΎΠ»ΡŽΡ‚ ΠΎΠ±Π΅ΡΠΏΠ΅Ρ‡ΠΈΡ‚ΡŒ ΠΏΠ»Π°Π½ΠΎΠ²ΠΎΡΡ‚ΡŒ Π² Ρ„ΠΎΡ€ΠΌΠΈΡ€ΠΎΠ²Π°Π½ΠΈΠΈ ΠΊΠ°ΠΊ ΠΏΠΎΠ»ΠΈΡ‚ΠΈΠΊΠΈ Π˜Π‘, Ρ‚Π°ΠΊ ΠΈ ΡΠΎΠΎΡ‚Π²Π΅Ρ‚ΡΡ‚Π²ΡƒΡŽΡ‰ΠΈΡ… ΠΏΡ€ΠΎΡ„ΠΈΠ»Π΅ΠΉ Π·Π°Ρ‰ΠΈΡ‚Ρ‹Π’ ΡƒΠΌΠΎΠ²Π°Ρ… появи ΠΏΠΎΠ²Π½ΠΎΠΌΠ°ΡΡˆΡ‚Π°Π±Π½ΠΎΠ³ΠΎ ΠΊΠ²Π°Π½Ρ‚ΠΎΠ²ΠΎΠ³ΠΎ ΠΊΠΎΠΌΠΏ'ΡŽΡ‚Π΅Ρ€Π° ΡΡ‚Π°Π²ΠΈΡ‚ΡŒΡΡ ΠΏΡ–Π΄ сумнів ΡΡ‚Ρ–ΠΉΠΊΡ–ΡΡ‚ΡŒ ΠΏΡ€Π°ΠΊΡ‚ΠΈΡ‡Π½ΠΎ всіх Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΡ–Π² симСтричної Ρ– нСсимСтричної ΠΊΡ€ΠΈΠΏΡ‚ΠΎΠ³Ρ€Π°Ρ„Ρ–Ρ—. ΠŸΡ€ΠΈ Ρ†ΡŒΠΎΠΌΡƒ Π±ΡƒΡ€Ρ…Π»ΠΈΠ²Π΅ зростання ΠΎΠ±Ρ‡ΠΈΡΠ»ΡŽΠ²Π°Π»ΡŒΠ½ΠΈΡ… рСсурсів Π†Π’ Ρ– Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³Ρ–ΠΉ "G" сприяє Π·Π±Ρ–Π»ΡŒΡˆΠ΅Π½Π½ΡŽ зростання Π°Ρ‚Π°ΠΊ Π½Π° Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½ΠΎ-ΠΊΠΎΠΌΡƒΠ½Ρ–ΠΊΠ°Ρ†Ρ–ΠΉΠ½Ρ– (ICS) Ρ– ΠΊΡ–Π±Π΅Ρ€Ρ„Ρ–Π·Ρ–Ρ‡Π½Ρ– систСми (CPS). Π¦Ρ– систСми Ρ” ядром сучасних Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½ΠΎ-ΠΊΡ€ΠΈΡ‚ΠΈΡ‡Π½ΠΈΡ… ΠΊΡ–Π±Π΅Ρ€Π½Π΅Ρ‚ΠΈΡ‡Π½ΠΈΡ… систСм (CCIS). Π’ Ρ‚Π°ΠΊΠΈΡ… ΡƒΠΌΠΎΠ²Π°Ρ… ΠΏΠ΅Ρ€ΡˆΠΎΡ‡Π΅Ρ€Π³ΠΎΠ²ΠΈΠΌ завданням ΠΏΡ–Π΄Ρ‚Ρ€ΠΈΠΌΠΊΠΈ Π½Π΅ΠΎΠ±Ρ…Ρ–Π΄Π½ΠΎΠ³ΠΎ рівня Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Ρ” класифікація сучасних Π·Π°Π³Ρ€ΠΎΠ·, які ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠΈΡ€ΡƒΡŽΡ‚ΡΡ Π· ΠΌΠ΅Ρ‚ΠΎΠ΄Π°ΠΌΠΈ ΡΠΎΡ†Ρ–Π°Π»ΡŒΠ½ΠΎΡ— Ρ–Π½ΠΆΠ΅Π½Π΅Ρ€Ρ–Ρ— Ρ– Π½Π°Π±ΡƒΠ²Π°ΡŽΡ‚ΡŒ ΠΎΠ·Π½Π°ΠΊ синСргії Ρ– гибридности. Π£ Ρ€ΠΎΠ±ΠΎΡ‚Ρ– ΠΏΡ€ΠΎΠΏΠΎΠ½ΡƒΡ”Ρ‚ΡŒΡΡ синСргСтична модСль Π·Π°Π³Ρ€ΠΎΠ· Π½Π° ICS/CPS, яка Π²Ρ€Π°Ρ…ΠΎΠ²ΡƒΡ” ΡΠΏΡ€ΡΠΌΠΎΠ²Π°Π½Ρ–ΡΡ‚ΡŒ Π·Π°Π³Ρ€ΠΎΠ· Π½Π° ΡΠΈΠ½Π΅Ρ€Π³Ρ–ΡŽ Ρ– Π³ΠΈΠ±Ρ€ΠΈΠ΄Π½ΠΎΡΡ‚ΡŒ, Ρ– комплСксірований Π²ΠΏΠ»ΠΈΠ² складових Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ: Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½Ρƒ Π±Π΅Π·ΠΏΠ΅ΠΊΡƒ (Π†Π‘), ΠΊΡ–Π±Π΅Ρ€Π±Π΅Π·ΠΏΠ΅ΠΊΡƒ (ΠšΠ‘), Π±Π΅Π·ΠΏΠ΅ΠΊΡƒ Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–Ρ— (Π‘Π†). Π’Π°ΠΊΠΈΠΉ ΠΏΡ–Π΄Ρ…Ρ–Π΄ дозволяє Ρ€ΠΎΠ·Ρ€ΠΎΠ±ΠΈΡ‚ΠΈ ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΎΠ»ΠΎΠ³Ρ–Ρ‡Π½Ρ– основи ΠΏΠΎΠ±ΡƒΠ΄ΠΎΠ²ΠΈ ΡƒΠ½Ρ–Ρ„Ρ–ΠΊΠΎΠ²Π°Π½ΠΎΠ³ΠΎ класифікатора Π·Π°Π³Ρ€ΠΎΠ· ΠΊΡ–Π±Π΅Ρ€Ρ„Ρ–Π·ΠΈΡ‡Π½ΠΈΡ… систСм, Π·Π°Π±Π΅Π·ΠΏΠ΅Ρ‡ΠΈΡ‚ΠΈ формування ΠΌΠ½ΠΎΠΆΠΈΠ½ ΠΊΡ€ΠΈΡ‚ΠΈΡ‡Π½ΠΈΡ… Π·Π°Π³Ρ€ΠΎΠ·, ΠΊΡ€ΠΈΡ‚ΠΈΡ‡Π½ΠΈΡ… Ρ‚ΠΎΡ‡ΠΎΠΊ Π² Π΅Π»Π΅ΠΌΠ΅Π½Ρ‚Π°Ρ… інфраструктури ICS/CPS, Π½Π° основі ΠΌΡ–Π½Ρ–ΠΌΠ°Π»ΡŒΠ½ΠΈΡ… ΠΎΠ±Ρ‡ΠΈΡΠ»ΡŽΠ²Π°Π»ΡŒΠ½ΠΈΡ…, Π»ΡŽΠ΄ΡΡŒΠΊΠΈΡ… Ρ– Π΅ΠΊΠΎΠ½ΠΎΠΌΡ–Ρ‡Π½ΠΈΡ… Π²ΠΈΡ‚Ρ€Π°Ρ‚. Π ΠΎΠ·Ρ€ΠΎΠ±Π»Π΅Π½Π° ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΈΠΊΠ° визначСння ΠΊΠ°Ρ‚Π΅Π³ΠΎΡ€Ρ–Ρ— зловмисника дозволяє систСматизувати зловмисника Ρ– Π½Π° основі Π°Π½Π°Π»Ρ–Π·Ρƒ Π²Π°Π³ΠΎΠ²ΠΈΡ… ΠΊΠΎΠ΅Ρ„Ρ–Ρ†Ρ–Ρ”Π½Ρ‚Ρ–Π² сформувати ΠΌΠ°Ρ‚Ρ€ΠΈΡ†ΡŽ відповідності ΠΌΡ–ΠΆ моТливостями зловмисників Ρ€Ρ–Π·Π½ΠΈΡ… ΠΊΠ°Ρ‚Π΅Π³ΠΎΡ€Ρ–ΠΉ Ρ– Ρ‚Π΅Ρ…Π½Ρ–Ρ‡Π½ΠΈΠΌΠΈ засобами захисту Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–Ρ— (Π’Π‘Π—Π†). Π¦Ρ– Π΄Ρ–Ρ— істотно Π·Π½ΠΈΠΆΡƒΡŽΡ‚ΡŒ Ρ€Ρ–Π²Π΅Π½ΡŒ Ρ€ΠΈΠ·ΠΈΠΊΡƒ Ρ€Π΅Π°Π»Ρ–Π·Π°Ρ†Ρ–Ρ— Π°Ρ‚Π°ΠΊΠΈ ΠΏΠ΅Π²Π½ΠΈΠΌΠΈ катСгоріями зловмисників Ρ– Π΄ΠΎΠ·Π²ΠΎΠ»ΡΡ‚ΡŒ Π·Π°Π±Π΅Π·ΠΏΠ΅Ρ‡ΠΈΡ‚ΠΈ ΠΏΠ»Π°Π½ΠΎΠ²Ρ–ΡΡ‚ΡŒ Ρƒ Ρ„ΠΎΡ€ΠΌΡƒΠ²Π°Π½Π½Ρ– як ΠΏΠΎΠ»Ρ–Ρ‚ΠΈΠΊΠΈ Π†Π‘, Ρ‚Π°ΠΊ Ρ– Π²Ρ–Π΄ΠΏΠΎΠ²Ρ–Π΄Π½ΠΈΡ… ΠΏΡ€ΠΎΡ„Ρ–Π»Ρ–Π² захист

    Π ΠΎΠ·Ρ€ΠΎΠ±ΠΊΠ° ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΎΠ»ΠΎΠ³Ρ–Ρ‡Π½ΠΈΡ… основ ΠΏΠΎΠ±ΡƒΠ΄ΠΎΠ²ΠΈ класифікатору Π·Π°Π³Ρ€ΠΎΠ· ΠΊΡ–Π±Π΅Ρ€Ρ„Ρ–Π·ΠΈΡ‡Π½ΠΈΡ… систСм

    No full text
    The emergence of a full-scale quantum computer questions the stability of almost all symmetric and asymmetric cryptography algorithms. At the same time, the rapid growth of computing resources of IT and β€œG” technologies contributes to an increase in attacks on information and communication (ICS) and cyberphysical systems (CPS). These systems are the core of modern critical cybernetic information systems (CCIS). In such conditions, the primary task of maintaining the required level of security is the classification of modern threats that are integrated with social engineering methods and acquire signs of synergy and hybridity. The paper proposes a synergistic model of threats to ICS/CPS, which takes into account the focus of threats on synergy and hybridity, and the combined impact of security components: information security (IS), cybersecurity (CS), security of information (SI). This approach allows developing methodological foundations for building a unified classifier of threats to cyberphysical systems, forming sets of critical threats, critical points in the ICS/CPS infrastructure elements, based on minimal computing, human and economic costs. The developed methodology for determining the category of an attacker allows systematizing an attacker and, based on the analysis of weighting factors, forming a matrix of correspondence between the capabilities of attackers of various categories and technical means of information security (TMIS). These actions significantly reduce the risk of an attack by certain categories of attackers and allow for planning in the formation of both the IS policy and the corresponding protection profiles.Π’ условиях появлСния ΠΏΠΎΠ»Π½ΠΎΠΌΠ°ΡΡˆΡ‚Π°Π±Π½ΠΎΠ³ΠΎ ΠΊΠ²Π°Π½Ρ‚ΠΎΠ²ΠΎΠ³ΠΎ ΠΊΠΎΠΌΠΏΡŒΡŽΡ‚Π΅Ρ€Π° ставится ΠΏΠΎΠ΄ сомнСниС ΡΡ‚ΠΎΠΉΠΊΠΎΡΡ‚ΡŒ практичСски всСх Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΠΎΠ² симмСтричной ΠΈ нСсиммСтричной ΠΊΡ€ΠΈΠΏΡ‚ΠΎΠ³Ρ€Π°Ρ„ΠΈΠΈ. ΠŸΡ€ΠΈ этом Π±ΡƒΡ€Π½Ρ‹ΠΉ рост Π²Ρ‹Ρ‡ΠΈΡΠ»ΠΈΡ‚Π΅Π»ΡŒΠ½Ρ‹Ρ… рСсурсов ИВ ΠΈ Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³ΠΈΠΉ β€œG” способствуСт ΡƒΠ²Π΅Π»ΠΈΡ‡Π΅Π½ΠΈΡŽ роста Π°Ρ‚Π°ΠΊ Π½Π° ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎ-ΠΊΠΎΠΌΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Π΅ (ICS) ΠΈ кибСрфизичСскиС систСмы (CPS). Π­Ρ‚ΠΈ систСмы ΡΠ²Π»ΡΡŽΡ‚ΡΡ ядром соврСмСнных ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎ-критичСских кибСрнСтичСских систСм (CCIS). Π’ Ρ‚Π°ΠΊΠΈΡ… условиях ΠΏΠ΅Ρ€Π²ΠΎΠΎΡ‡Π΅Ρ€Π΅Π΄Π½ΠΎΠΉ Π·Π°Π΄Π°Ρ‡Π΅ΠΉ поддСрТания Ρ‚Ρ€Π΅Π±ΡƒΠ΅ΠΌΠΎΠ³ΠΎ уровня бСзопасности являСтся классификация соврСмСнных ΡƒΠ³Ρ€ΠΎΠ·, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠΈΡ€ΡƒΡŽΡ‚ΡΡ с ΠΌΠ΅Ρ‚ΠΎΠ΄Π°ΠΌΠΈ ΡΠΎΡ†ΠΈΠ°Π»ΡŒΠ½ΠΎΠΉ ΠΈΠ½ΠΆΠ΅Π½Π΅Ρ€ΠΈΠΈ, ΠΈ ΠΏΡ€ΠΈΠΎΠ±Ρ€Π΅Ρ‚Π°ΡŽΡ‚ ΠΏΡ€ΠΈΠ·Π½Π°ΠΊΠΈ синСргии ΠΈ гибридности. Π’ Ρ€Π°Π±ΠΎΡ‚Π΅ прСдлагаСтся синСргСтичСская модСль ΡƒΠ³Ρ€ΠΎΠ· Π½Π° ICS/CPS, которая ΡƒΡ‡ΠΈΡ‚Ρ‹Π²Π°Π΅Ρ‚ Π½Π°ΠΏΡ€Π°Π²Π»Π΅Π½Π½ΠΎΡΡ‚ΡŒ ΡƒΠ³Ρ€ΠΎΠ· Π½Π° ΡΠΈΠ½Π΅Ρ€Π³ΠΈΡŽ ΠΈ Π³ΠΈΠ±Ρ€ΠΈΠ΄Π½ΠΎΡΡ‚ΡŒ, ΠΈ комплСксированноС воздСйствиС ΡΠΎΡΡ‚Π°Π²Π»ΡΡŽΡ‰ΠΈΡ… бСзопасности: ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΡƒΡŽ Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡ‚ΡŒ (Π˜Π‘), ΠΊΠΈΠ±Π΅Ρ€Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡ‚ΡŒ (ΠšΠ‘), Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡ‚ΡŒ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ (Π‘Π˜). Π’Π°ΠΊΠΎΠΉ ΠΏΠΎΠ΄Ρ…ΠΎΠ΄ позволяСт Ρ€Π°Π·Ρ€Π°Π±ΠΎΡ‚Π°Ρ‚ΡŒ мСтодологичСскиС основы построСния ΡƒΠ½ΠΈΡ„ΠΈΡ†ΠΈΡ€ΠΎΠ²Π°Π½Π½ΠΎΠ³ΠΎ классификатора ΡƒΠ³Ρ€ΠΎΠ· кибСрфизичСскиС систСмы, ΠΎΠ±Π΅ΡΠΏΠ΅Ρ‡ΠΈΡ‚ΡŒ Ρ„ΠΎΡ€ΠΌΠΈΡ€ΠΎΠ²Π°Π½ΠΈΠ΅ мноТСств критичСских ΡƒΠ³Ρ€ΠΎΠ·, критичСских Ρ‚ΠΎΡ‡Π΅ΠΊ Π² элСмСнтах инфраструктуры ICS/CPS, Π½Π° основС ΠΌΠΈΠ½ΠΈΠΌΠ°Π»ΡŒΠ½Ρ‹Ρ… Π²Ρ‹Ρ‡ΠΈΡΠ»ΠΈΡ‚Π΅Π»ΡŒΠ½Ρ‹Ρ…, Π»ΡŽΠ΄ΡΠΊΠΈΡ… ΠΈ экономичСских Π·Π°Ρ‚Ρ€Π°Ρ‚. Разработанная ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΈΠΊΠ° опрСдСлСния ΠΊΠ°Ρ‚Π΅Π³ΠΎΡ€ΠΈΠΈ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΠ° позволяСт ΡΠΈΡΡ‚Π΅ΠΌΠ°Ρ‚ΠΈΠ·ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΠ° ΠΈ Π½Π° основС Π°Π½Π°Π»ΠΈΠ·Π° вСсовых коэффициСнтов ΡΡ„ΠΎΡ€ΠΌΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ ΠΌΠ°Ρ‚Ρ€ΠΈΡ†Ρƒ соотвСтствия ΠΌΠ΅ΠΆΠ΄Ρƒ возмоТностями Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΠΎΠ² Ρ€Π°Π·Π»ΠΈΡ‡Π½Ρ‹Ρ… ΠΊΠ°Ρ‚Π΅Π³ΠΎΡ€ΠΈΠΉ ΠΈ тСхничСскими срСдствами Π·Π°Ρ‰ΠΈΡ‚Ρ‹ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ (Π’Π‘Π—Π˜). Π­Ρ‚ΠΈ дСйствия сущСствСнно ΡΠ½ΠΈΠΆΠ°ΡŽΡ‚ ΡƒΡ€ΠΎΠ²Π΅Π½ΡŒ риска Ρ€Π΅Π°Π»ΠΈΠ·Π°Ρ†ΠΈΠΈ Π°Ρ‚Π°ΠΊΠΈ ΠΎΠΏΡ€Π΅Π΄Π΅Π»Π΅Π½Π½Ρ‹ΠΌΠΈ катСгориями Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΠΎΠ² ΠΈ ΠΏΠΎΠ·Π²ΠΎΠ»ΡŽΡ‚ ΠΎΠ±Π΅ΡΠΏΠ΅Ρ‡ΠΈΡ‚ΡŒ ΠΏΠ»Π°Π½ΠΎΠ²ΠΎΡΡ‚ΡŒ Π² Ρ„ΠΎΡ€ΠΌΠΈΡ€ΠΎΠ²Π°Π½ΠΈΠΈ ΠΊΠ°ΠΊ ΠΏΠΎΠ»ΠΈΡ‚ΠΈΠΊΠΈ Π˜Π‘, Ρ‚Π°ΠΊ ΠΈ ΡΠΎΠΎΡ‚Π²Π΅Ρ‚ΡΡ‚Π²ΡƒΡŽΡ‰ΠΈΡ… ΠΏΡ€ΠΎΡ„ΠΈΠ»Π΅ΠΉ Π·Π°Ρ‰ΠΈΡ‚Ρ‹Π’ ΡƒΠΌΠΎΠ²Π°Ρ… появи ΠΏΠΎΠ²Π½ΠΎΠΌΠ°ΡΡˆΡ‚Π°Π±Π½ΠΎΠ³ΠΎ ΠΊΠ²Π°Π½Ρ‚ΠΎΠ²ΠΎΠ³ΠΎ ΠΊΠΎΠΌΠΏ'ΡŽΡ‚Π΅Ρ€Π° ΡΡ‚Π°Π²ΠΈΡ‚ΡŒΡΡ ΠΏΡ–Π΄ сумнів ΡΡ‚Ρ–ΠΉΠΊΡ–ΡΡ‚ΡŒ ΠΏΡ€Π°ΠΊΡ‚ΠΈΡ‡Π½ΠΎ всіх Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΡ–Π² симСтричної Ρ– нСсимСтричної ΠΊΡ€ΠΈΠΏΡ‚ΠΎΠ³Ρ€Π°Ρ„Ρ–Ρ—. ΠŸΡ€ΠΈ Ρ†ΡŒΠΎΠΌΡƒ Π±ΡƒΡ€Ρ…Π»ΠΈΠ²Π΅ зростання ΠΎΠ±Ρ‡ΠΈΡΠ»ΡŽΠ²Π°Π»ΡŒΠ½ΠΈΡ… рСсурсів Π†Π’ Ρ– Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³Ρ–ΠΉ "G" сприяє Π·Π±Ρ–Π»ΡŒΡˆΠ΅Π½Π½ΡŽ зростання Π°Ρ‚Π°ΠΊ Π½Π° Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½ΠΎ-ΠΊΠΎΠΌΡƒΠ½Ρ–ΠΊΠ°Ρ†Ρ–ΠΉΠ½Ρ– (ICS) Ρ– ΠΊΡ–Π±Π΅Ρ€Ρ„Ρ–Π·Ρ–Ρ‡Π½Ρ– систСми (CPS). Π¦Ρ– систСми Ρ” ядром сучасних Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½ΠΎ-ΠΊΡ€ΠΈΡ‚ΠΈΡ‡Π½ΠΈΡ… ΠΊΡ–Π±Π΅Ρ€Π½Π΅Ρ‚ΠΈΡ‡Π½ΠΈΡ… систСм (CCIS). Π’ Ρ‚Π°ΠΊΠΈΡ… ΡƒΠΌΠΎΠ²Π°Ρ… ΠΏΠ΅Ρ€ΡˆΠΎΡ‡Π΅Ρ€Π³ΠΎΠ²ΠΈΠΌ завданням ΠΏΡ–Π΄Ρ‚Ρ€ΠΈΠΌΠΊΠΈ Π½Π΅ΠΎΠ±Ρ…Ρ–Π΄Π½ΠΎΠ³ΠΎ рівня Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Ρ” класифікація сучасних Π·Π°Π³Ρ€ΠΎΠ·, які ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠΈΡ€ΡƒΡŽΡ‚ΡΡ Π· ΠΌΠ΅Ρ‚ΠΎΠ΄Π°ΠΌΠΈ ΡΠΎΡ†Ρ–Π°Π»ΡŒΠ½ΠΎΡ— Ρ–Π½ΠΆΠ΅Π½Π΅Ρ€Ρ–Ρ— Ρ– Π½Π°Π±ΡƒΠ²Π°ΡŽΡ‚ΡŒ ΠΎΠ·Π½Π°ΠΊ синСргії Ρ– гибридности. Π£ Ρ€ΠΎΠ±ΠΎΡ‚Ρ– ΠΏΡ€ΠΎΠΏΠΎΠ½ΡƒΡ”Ρ‚ΡŒΡΡ синСргСтична модСль Π·Π°Π³Ρ€ΠΎΠ· Π½Π° ICS/CPS, яка Π²Ρ€Π°Ρ…ΠΎΠ²ΡƒΡ” ΡΠΏΡ€ΡΠΌΠΎΠ²Π°Π½Ρ–ΡΡ‚ΡŒ Π·Π°Π³Ρ€ΠΎΠ· Π½Π° ΡΠΈΠ½Π΅Ρ€Π³Ρ–ΡŽ Ρ– Π³ΠΈΠ±Ρ€ΠΈΠ΄Π½ΠΎΡΡ‚ΡŒ, Ρ– комплСксірований Π²ΠΏΠ»ΠΈΠ² складових Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ: Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½Ρƒ Π±Π΅Π·ΠΏΠ΅ΠΊΡƒ (Π†Π‘), ΠΊΡ–Π±Π΅Ρ€Π±Π΅Π·ΠΏΠ΅ΠΊΡƒ (ΠšΠ‘), Π±Π΅Π·ΠΏΠ΅ΠΊΡƒ Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–Ρ— (Π‘Π†). Π’Π°ΠΊΠΈΠΉ ΠΏΡ–Π΄Ρ…Ρ–Π΄ дозволяє Ρ€ΠΎΠ·Ρ€ΠΎΠ±ΠΈΡ‚ΠΈ ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΎΠ»ΠΎΠ³Ρ–Ρ‡Π½Ρ– основи ΠΏΠΎΠ±ΡƒΠ΄ΠΎΠ²ΠΈ ΡƒΠ½Ρ–Ρ„Ρ–ΠΊΠΎΠ²Π°Π½ΠΎΠ³ΠΎ класифікатора Π·Π°Π³Ρ€ΠΎΠ· ΠΊΡ–Π±Π΅Ρ€Ρ„Ρ–Π·ΠΈΡ‡Π½ΠΈΡ… систСм, Π·Π°Π±Π΅Π·ΠΏΠ΅Ρ‡ΠΈΡ‚ΠΈ формування ΠΌΠ½ΠΎΠΆΠΈΠ½ ΠΊΡ€ΠΈΡ‚ΠΈΡ‡Π½ΠΈΡ… Π·Π°Π³Ρ€ΠΎΠ·, ΠΊΡ€ΠΈΡ‚ΠΈΡ‡Π½ΠΈΡ… Ρ‚ΠΎΡ‡ΠΎΠΊ Π² Π΅Π»Π΅ΠΌΠ΅Π½Ρ‚Π°Ρ… інфраструктури ICS/CPS, Π½Π° основі ΠΌΡ–Π½Ρ–ΠΌΠ°Π»ΡŒΠ½ΠΈΡ… ΠΎΠ±Ρ‡ΠΈΡΠ»ΡŽΠ²Π°Π»ΡŒΠ½ΠΈΡ…, Π»ΡŽΠ΄ΡΡŒΠΊΠΈΡ… Ρ– Π΅ΠΊΠΎΠ½ΠΎΠΌΡ–Ρ‡Π½ΠΈΡ… Π²ΠΈΡ‚Ρ€Π°Ρ‚. Π ΠΎΠ·Ρ€ΠΎΠ±Π»Π΅Π½Π° ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΈΠΊΠ° визначСння ΠΊΠ°Ρ‚Π΅Π³ΠΎΡ€Ρ–Ρ— зловмисника дозволяє систСматизувати зловмисника Ρ– Π½Π° основі Π°Π½Π°Π»Ρ–Π·Ρƒ Π²Π°Π³ΠΎΠ²ΠΈΡ… ΠΊΠΎΠ΅Ρ„Ρ–Ρ†Ρ–Ρ”Π½Ρ‚Ρ–Π² сформувати ΠΌΠ°Ρ‚Ρ€ΠΈΡ†ΡŽ відповідності ΠΌΡ–ΠΆ моТливостями зловмисників Ρ€Ρ–Π·Π½ΠΈΡ… ΠΊΠ°Ρ‚Π΅Π³ΠΎΡ€Ρ–ΠΉ Ρ– Ρ‚Π΅Ρ…Π½Ρ–Ρ‡Π½ΠΈΠΌΠΈ засобами захисту Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–Ρ— (Π’Π‘Π—Π†). Π¦Ρ– Π΄Ρ–Ρ— істотно Π·Π½ΠΈΠΆΡƒΡŽΡ‚ΡŒ Ρ€Ρ–Π²Π΅Π½ΡŒ Ρ€ΠΈΠ·ΠΈΠΊΡƒ Ρ€Π΅Π°Π»Ρ–Π·Π°Ρ†Ρ–Ρ— Π°Ρ‚Π°ΠΊΠΈ ΠΏΠ΅Π²Π½ΠΈΠΌΠΈ катСгоріями зловмисників Ρ– Π΄ΠΎΠ·Π²ΠΎΠ»ΡΡ‚ΡŒ Π·Π°Π±Π΅Π·ΠΏΠ΅Ρ‡ΠΈΡ‚ΠΈ ΠΏΠ»Π°Π½ΠΎΠ²Ρ–ΡΡ‚ΡŒ Ρƒ Ρ„ΠΎΡ€ΠΌΡƒΠ²Π°Π½Π½Ρ– як ΠΏΠΎΠ»Ρ–Ρ‚ΠΈΠΊΠΈ Π†Π‘, Ρ‚Π°ΠΊ Ρ– Π²Ρ–Π΄ΠΏΠΎΠ²Ρ–Π΄Π½ΠΈΡ… ΠΏΡ€ΠΎΡ„Ρ–Π»Ρ–Π² захист

    SYNERGY OF BUILDING CYBERSECURITY SYSTEMS

    Full text link
    The development of the modern world community is closely related to advances in computing resources and cyberspace. The formation and expansion of the range of services is based on the achievements of mankind in the field of high technologies. However, the rapid growth of computing resources, the emergence of a full-scale quantum computer tightens the requirements for security systems not only for information and communication systems, but also for cyber-physical systems and technologies. The methodological foundations of building security systems for critical infrastructure facilities based on modeling the processes of behavior of antagonistic agents in security systems are discussed in the first chapter. The concept of information security in social networks, based on mathematical models of data protection, taking into account the influence of specific parameters of the social network, the effects on the network are proposed in second chapter. The nonlinear relationships of the parameters of the defense system, attacks, social networks, as well as the influence of individual characteristics of users and the nature of the relationships between them, takes into account. In the third section, practical aspects of the methodology for constructing post-quantum algorithms for asymmetric McEliece and Niederreiter cryptosystems on algebraic codes (elliptic and modified elliptic codes), their mathematical models and practical algorithms are considered. Hybrid crypto-code constructions of McEliece and Niederreiter on defective codes are proposed. They can significantly reduce the energy costs for implementation, while ensuring the required level of cryptographic strength of the system as a whole. The concept of security of corporate information and educational systems based on the construction of an adaptive information security system is proposed
    corecore