Model of cybersecurity means financing with the procedure of additional data obtaining by the protection side

Lakhno, V та Malyukov, V та Yerekesheva, M та Kydyralina, L та Sarsimbayeva, S та Zhumadilova, M та Buriachok, Volodymyr та Sabyrbayeva, G (2020) Model of cybersecurity means financing with the procedure of additional data obtaining by the protection side Journal of Theoretical and Applied Information Technology, 98 (1). с. 1-14. ISSN 1992-8645

[thumbnail of LAKHNO _V_MALYUKOV _V_YEREKESHEVA_M_KYDYRALINA_L_SARSIMBAYEVA_S_ZHUMADILOVA_M_BURIACHOK_V_SABYRBAYEVA_G_JTAIT_VOL_98_No_01.pdf]
Перегляд
Текст
LAKHNO _V_MALYUKOV _V_YEREKESHEVA_M_KYDYRALINA_L_SARSIMBAYEVA_S_ZHUMADILOVA_M_BURIACHOK_V_SABYRBAYEVA_G_JTAIT_VOL_98_No_01.pdf

Download (466kB) | Перегляд
Офіційне посилання: http://www.jatit.org/volumes/Vol98No1/1Vol98No1.pd...

Анотація

The article describes the model of cybersecurity means financing strategies of the information object with incomplete information about the financial resources of the attacking side. The proposed model is the core of the module of the developed decision support system in the problems of choosing rational investing variants for information protection and cybersecurity of various information objects. The model allows to find financial solutions using the tools of the theory of multistep games with several terminal surfaces. The authors proposed an approach that allows information security management to make a preliminary assessment of strategies for financing the effective cybersecurity systems. The model is distinguished by the assumption that the protection side does not have complete information, both about the financing strategies of the attacking side, and about its financial resources state aimed at overcoming cybersecurity lines of the information object. At the same time, the protection side has the opportunity to obtain additional information by the part of its financial resources. This makes it possible for the protection side to obtain a positive result for itself in the case when it can not be received without this procedure. The solution was found using a mathematical apparatus of a nonlinear multistep quality game with several terminal surfaces with alternate moves. In order to verify the adequacy of the model there was implemented a multivariate computational experiment. The results of this experiment are described in the article. © 2005 - ongoing JATIT & LLS

Тип елементу : Стаття
Ключові слова: Cybersecurity; Information Protection; Informatization Object; Theory Of Games; The Choice Of Financing Strategy; Procedure Of Additional Data Obtaining; Decision Support System
Типологія: Це архівна тематика Київського університету імені Бориса Грінченка > Статті у наукометричних базах > Scopus
Підрозділи: Це архівні підрозділи Київського університету імені Бориса Грінченка > Факультет інформаційних технологій та математики > Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка
Користувач, що депонує: Павло Миколайович Складанний
Дата внесення: 16 Бер 2020 07:11
Останні зміни: 16 Бер 2020 07:11
URI: https://elibrary.kubg.edu.ua/id/eprint/31057

Actions (login required)

Перегляд елементу Перегляд елементу