The paper discusses the modeling of various aspects of the security of critical information infrastructures (CII) in the assumption of creating a reference model of CII security in the future. The features of CII in terms of goals and safety criteria based on the analysis of various regulatory and methodically established definitions and descriptions of CII are established. The contradictions arising in the attempts to use the traditional methodology of information security in relation to CII are shown. The problems of using the methods and models of classical risk analysis are discussed, in particular, the impossibility of applying the concept of residual risk to the formation of CII safety objectives. The conclusion is made about the expe...
As the information age matures, major social infrastructures such as communication, finance, militar...
The paper considers the problem of improving the reliability of estimates of indicators providing in...
He is in charge of the “Information Security of Critical Networked Infrastructures ” area within the...
Today in Russia the active work is going on the implementation of a relatively new mechanism of stat...
The world trends in increasing of threats of natural and man-made nature, a level of terrorist threa...
Understanding and managing information infrastructure (II) security risks is a priority to most orga...
As new technologies such as the Internet of Things (IoT) are integrated into Critical National Infra...
To effectively protect critical infrastructure facilities (CIF), it is important to understand the f...
This article substantiates the relevance of the development of a cognitive model for assessing the s...
Information communication and technology (ICT) systems are almost ubiquitous in the modern world. It...
The article considers the issues of stability of critical information infrastructures (CII), based o...
Wilh the protection of critical information infrastructure becoming a priority for all levels of man...
To effectively protect critical infrastructure facilities (CIF), it is important to understand the f...
At present, considerable attention is paid to protecting the critical infrastructure of Ukraine in ...
Purpose: This paper aims to create a dedicated tool for managing the level of availability of servic...
As the information age matures, major social infrastructures such as communication, finance, militar...
The paper considers the problem of improving the reliability of estimates of indicators providing in...
He is in charge of the “Information Security of Critical Networked Infrastructures ” area within the...
Today in Russia the active work is going on the implementation of a relatively new mechanism of stat...
The world trends in increasing of threats of natural and man-made nature, a level of terrorist threa...
Understanding and managing information infrastructure (II) security risks is a priority to most orga...
As new technologies such as the Internet of Things (IoT) are integrated into Critical National Infra...
To effectively protect critical infrastructure facilities (CIF), it is important to understand the f...
This article substantiates the relevance of the development of a cognitive model for assessing the s...
Information communication and technology (ICT) systems are almost ubiquitous in the modern world. It...
The article considers the issues of stability of critical information infrastructures (CII), based o...
Wilh the protection of critical information infrastructure becoming a priority for all levels of man...
To effectively protect critical infrastructure facilities (CIF), it is important to understand the f...
At present, considerable attention is paid to protecting the critical infrastructure of Ukraine in ...
Purpose: This paper aims to create a dedicated tool for managing the level of availability of servic...
As the information age matures, major social infrastructures such as communication, finance, militar...
The paper considers the problem of improving the reliability of estimates of indicators providing in...
He is in charge of the “Information Security of Critical Networked Infrastructures ” area within the...