CYBERSECURITY MANAGEMENT MODEL FOR SOFTWARE IMPLEMENTATION

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.28.841

Keywords:

cybersecurity, management model, management requirements, risk modeling, risk assessment, requirements prioritization, software, fuzzy logic, Bayesian network, mathematical programming, resource optimization, international standards, cybersecurity standards

Abstract

In today’s digital world, cybersecurity has become a critical factor in software implementation across various domains. The increasing complexity of systems, the dynamic threat landscape, and limited resources require software developers and stakeholders to adopt effective mechanisms for managing cybersecurity requirements. This article presents an integrated mathematical model for managing cybersecurity requirements during software implementation. The relevance of this problem is driven by the growing complexity of modern information systems, the need for compliance with international security standards, and resource constraints during project execution. The proposed model combines several mathematical techniques, including the Analytic Hierarchy Process (AHP), fuzzy logic, Bayesian networks, and mathematical programming, ensuring a systematic decision-making approach. The model developed by the authors enables prioritization of requirements, evaluation of compliance under uncertainty, risk modeling, and optimal resource allocation while considering budget constraints and security objectives. An experimental study based on the NIST SP 800-53 standard confirmed the effectiveness of the proposed approach in reducing risks without exceeding available resources. The results are practically significant for organizations implementing software solutions in alignment with modern cybersecurity requirements. Future research will focus on optimizing the model and applying it to other international standards.

Downloads

Download data is not yet available.

References

Li, L., et al. (2024). LogicEdu: Enhancing computational logic understanding through web-based Boolean logic simplification tool. 2024 21st International SoC Design Conference (ISOCC), Sapporo, Japan, 390–391. https://doi.org/10.1109/ISOCC62682.2024.10762040

Deepak, S., Shah, J. A., Chetan, N., & Sharda, H. (2023). New decision-making process based on set theory: Towards application of set theory. 2023 IEEE International Conference on ICT in Business Industry & Government (ICTBIG), Indore, India, 1–6. https://doi.org/10.1109/ICTBIG59752.2023.10456045

Wang, H. (2022). Network graph theory and organization model analysis based on mathematical modeling with the dynamic systematic data perspective. 2022 6th International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, India, 915–919. https://doi.org/10.1109/ICOEI53556.2022.9776767

Bhadra, S. (2022). A stochastic Petri net model of continuous integration and continuous delivery. 2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), Charlotte, NC, USA, 114–117. https://doi.org/10.1109/ISSREW55968.2022.00050

Suresh Kumar, K., Sudha, R., Suguna, T., & Dharani, M. K. (n.d.). An intelligent heartbeat management system utilizing fuzzy logic. In Advances in Fuzzy-Based Internet of Medical Things (IoMT), 211–223. Wiley. https://doi.org/10.1002/9781394242252.ch14

Yu, Q., & Li, Z. (2020). A Bayesian model averaging method for software reliability assessment. 2020 Asia-Pacific International Symposium on Advanced Reliability and Maintenance Modeling (APARM), Vancouver, BC, Canada, 1–5. https://doi.org/10.1109/APARM49247.2020.9209504

Yang, B., et al. (2024). A critical and comprehensive handbook for game theory applications on new power systems: Structure, methodology, and challenges. Protection and Control of Modern Power Systems. https://doi.org/10.23919/PCMP.2024.000297

Shukla, P., Singh, S. K., Khamparia, A., & Goyal, A. (n.d.). Nature-inspired optimization techniques. In Nature-Inspired Optimization Algorithms: Recent Advances in Natural Computing and Biomedical Applications, 137–152. De Gruyter.

Beniwal, R., Kumar, V., & Sharma, V. (2024). Metaheuristics approaches towards secure and optimized routing in IoT: A systematic literature review. 2024 International Conference on Electrical Electronics and Computing Technologies (ICEECT), Greater Noida, India, 1–6. https://doi.org/10.1109/ICEECT61758.2024.10739076

Zin, T. T., Moe, A. S. T., Phyo, C. N., & Tin, P. (2024). Fusion of strategic queueing theory and AI for smart city telecommunication system. 2024 IEEE 21st International Conference on Mobile Ad-Hoc and Smart Systems (MASS), Seoul, Republic of Korea, 653–657. https://doi.org/10.1109/MASS62177.2024.00104

Zhang, N., Chen, Y., Yang, W., Zhang, Z., Liu, Y., & Mao, W. (2021). Application of fault tree analysis for reliability evaluation and weak link identification of stadium power supply system using Monte Carlo simulation. 2021 IEEE Sustainable Power and Energy Conference (iSPEC), Nanjing, China, 4209–4214. https://doi.org/10.1109/iSPEC53008.2021.9735815

Kim, D., Jeon, B., & Koo, K. C. (2023). Addressing timely AI technology standardization challenges through a hierarchical analysis approach. 2023 14th International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Republic of Korea, 1431–1433. https://doi.org/10.1109/ICTC58733.2023.10393654

Sydorenko, V., Gnatyuk, S., Tolbatov, A., Fesenko, A., Yevchenko, Y., & Sotnichenko, Y. (2020). Experimental FMECA-based assessment of the critical information infrastructure importance in aviation. CEUR Workshop Proceedings, 2732, 136–156.

Hnatyuk, S. O., Berdybayev, R. Sh., Sydorenko, V. M., Zhigarevych, O. K., & Smirnova, T. V. (2023). Event correlation and cybersecurity incident management system at critical infrastructure facilities. Cybersecurity: Education, Science, Technology, 3(19), 176–196.

Polozhentsev, A. A., & Sydorenko, V. M. (2024). IT threat management method for critical information infrastructure facilities. Science-Intensive Technologies, 2(62), 143–153.

Downloads


Abstract views: 0

Published

2025-06-26

How to Cite

Gnatyuk, S., Sydorenko, V., & Skurativskyi, A. (2025). CYBERSECURITY MANAGEMENT MODEL FOR SOFTWARE IMPLEMENTATION. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(28), 715–726. https://doi.org/10.28925/2663-4023.2025.28.841

Most read articles by the same author(s)

1 2 > >>