Critical Information Infrastructures Security Modeling
The paper discusses the modeling of various aspects of the security of critical information infrastructures (CII) in the assumption of creating a reference model of CII security in the future. The features of CII in terms of goals and safety criteria based on the analysis of various regulatory and m...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
FRUCT
2019-04-01
|
Series: | Proceedings of the XXth Conference of Open Innovations Association FRUCT |
Subjects: | |
Online Access: | https://fruct.org/publications/fruct24/files/Ero.pdf
|
id |
doaj-ce7a1107d9d84aaf878c49ed8896ad69 |
---|---|
record_format |
Article |
spelling |
doaj-ce7a1107d9d84aaf878c49ed8896ad692020-11-24T21:30:36ZengFRUCTProceedings of the XXth Conference of Open Innovations Association FRUCT2305-72542343-07372019-04-01854248288Critical Information Infrastructures Security ModelingSergey Erokhin0Andrey Petukhov1Pavel Pilyugin2Moscow Technical University of Communications and Informatics, Moscow, RussiaMoscow Technical University of Communications and Informatics, Moscow, RussiaMoscow Technical University of Communications and Informatics, Moscow, RussiaThe paper discusses the modeling of various aspects of the security of critical information infrastructures (CII) in the assumption of creating a reference model of CII security in the future. The features of CII in terms of goals and safety criteria based on the analysis of various regulatory and methodically established definitions and descriptions of CII are established. The contradictions arising in the attempts to use the traditional methodology of information security in relation to CII are shown. The problems of using the methods and models of classical risk analysis are discussed, in particular, the impossibility of applying the concept of residual risk to the formation of CII safety objectives. The conclusion is made about the expediency of basing these goals on the exhaustion of possible protective measures (controls and activities), the concept of asymptotic safety management of CII , which guarantees the trend of security growth without its current assessment. Changes in the role and place of the threat model in ensuring the security of CII related to the lack of evidence of the completeness of this model are considered. The attractiveness of using the SDL technique for forming elements of the threat model in the conditions of a specific CII is indicated. The structure of the future reference model of safety of the CII including definition of the purposes and criteria of safety (including functional), multilevel static model of functioning of the CII (including security factors), a dynamic model of the spread of security incidents within the CII, the typology of the result of aggressive manifestations of the CII functioning environment (threat model) and the model (methodology) of the spread of protective activities within the information infrastructure.https://fruct.org/publications/fruct24/files/Ero.pdf monitoringcritical information infrastructuresoftware-defined networksecurity |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Sergey Erokhin Andrey Petukhov Pavel Pilyugin |
spellingShingle |
Sergey Erokhin Andrey Petukhov Pavel Pilyugin Critical Information Infrastructures Security Modeling Proceedings of the XXth Conference of Open Innovations Association FRUCT monitoring critical information infrastructure software-defined network security |
author_facet |
Sergey Erokhin Andrey Petukhov Pavel Pilyugin |
author_sort |
Sergey Erokhin |
title |
Critical Information Infrastructures Security Modeling |
title_short |
Critical Information Infrastructures Security Modeling |
title_full |
Critical Information Infrastructures Security Modeling |
title_fullStr |
Critical Information Infrastructures Security Modeling |
title_full_unstemmed |
Critical Information Infrastructures Security Modeling |
title_sort |
critical information infrastructures security modeling |
publisher |
FRUCT |
series |
Proceedings of the XXth Conference of Open Innovations Association FRUCT |
issn |
2305-7254 2343-0737 |
publishDate |
2019-04-01 |
description |
The paper discusses the modeling of various aspects of the security of critical information infrastructures (CII) in the assumption of creating a reference model of CII security in the future. The features of CII in terms of goals and safety criteria based on the analysis of various regulatory and methodically established definitions and descriptions of CII are established. The contradictions arising in the attempts to use the traditional methodology of information security in relation to CII are shown. The problems of using the methods and models of classical risk analysis are discussed, in particular, the impossibility of applying the concept of residual risk to the formation of CII safety objectives. The conclusion is made about the expediency of basing these goals on the exhaustion of possible protective measures (controls and activities), the concept of asymptotic safety management of CII , which guarantees the trend of security growth without its current assessment. Changes in the role and place of the threat model in ensuring the security of CII related to the lack of evidence of the completeness of this model are considered. The attractiveness of using the SDL technique for forming elements of the threat model in the conditions of a specific CII is indicated. The structure of the future reference model of safety of the CII including definition of the purposes and criteria of safety (including functional), multilevel static model of functioning of the CII (including security factors), a dynamic model of the spread of security incidents within the CII, the typology of the result of aggressive manifestations of the CII functioning environment (threat model) and the model (methodology) of the spread of protective activities within the information infrastructure. |
topic |
monitoring critical information infrastructure software-defined network security |
url |
https://fruct.org/publications/fruct24/files/Ero.pdf
|
work_keys_str_mv |
AT sergeyerokhin criticalinformationinfrastructuressecuritymodeling AT andreypetukhov criticalinformationinfrastructuressecuritymodeling AT pavelpilyugin criticalinformationinfrastructuressecuritymodeling |
_version_ |
1725962641261723648 |