CYBER SPACE PROTECTION MODEL CYBERSEC
DOI:
https://doi.org/10.18372/2410-7840.22.15255Keywords:
cyberspace, protection model, national security, protected cyberspaceAbstract
The article proposes a cyberspace protection model CyberSec, which is focused on performing the function of
"cyber protection". This model is functional, consists of
five stages, combines a number of methods and models,
is cyclical, and therefore allows you to create a selfconfiguring protection system in cyberspace. At the first
stage of "Intelligence and Detection" is a description of
the security environment, ie a threat model is formed,
which is a complete list of all possible threats that exist or
may arise in this situation, then assumptions are made
about the attacker, and therefore the violator model is
formed. The second stage of "Armament" is the choice of
means of protection and construction of a system of cyberspace protection (SSC). To do this, it is necessary to
develop an approach that will make the optimal (which
provides the best (optimal) protection) choice of the
functional profile of cybersecurity, while spending less
time than usual. Carrying out control of the system (cyberspace) is the third stage of "Control". To do this, the
analysis of the main tasks of information security, determines the real level of interest of security entities in compliance with all requirements for the security of each of
the properties of information (for example, sufficient,
low, unacceptable). At the fourth stage of "Counteraction" to the construction of secure cyberspace, the
evaluation of the effectiveness of the proposed SZK is
performed. In the fifth stage of "Active Counteraction",
normative documents are prepared, corporations are informed about cybersecurity incidents, active counteraction is carried out at the state level, ie countermeasures are applied. The CyberSec cyberspace protection model allows you to build a secure cyberspace in practice for both an individual corporation and the state as a whole.
References
ISO/IEC 15408-99 [Електронний ресурс]. – 2020. – Режим доступу до ресурсу: https://infobezlikbez. ru/terminy/standarty/266-mezhdunarodnyj-standart-iso-15408-obshchij-kriterij.
Державна служба спеціального зв’язку та захисту інформації України [Електронний ресурс]. – 2020. – Режим доступу до ресурсу: www.dsszzi.gov.ua.
Домарев В.В. Безопасность информационных технологий. Системный подход / Домарев В. В. – К.: ДиаСофт, 2006. – 904 с.
Синенко М.А. Математична модель методів активного захисту інформації / Синенко М.А., Ткач Ю.М. // Технічні науки та технології : науковий журнал / Чернігів. нац. технол. ун-т. – Чернігів: ЧНТУ, 2020. – № 2 (20). – С.109-115.
Ткач Ю.М. Моделі систем захисту інформаційної сфери держави // Сучасна спеціальна техніка. – 2020. – №2 (61). – С.59-66.
Ткач Ю.М. О развитии киберпространства и его защищенности // Безпека ресурсів інформаційних систем : збірник тез I Міжнародної науково-практичної конференції (м. Чернігів 16-17 квітня 2020 р.). – Чернігів: НУЧП, 2020. – С.173-177.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal adheres to the principles of Open Access and provides free, immediate, and permanent access to all published materials without financial, technical, or legal barriers for readers.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.