ENSURING THE SECURITY OF COMPLEX INFORMATION AND TECHNOLOGICAL SYSTEMS OF CRITICAL INFRASTRUCTURE FACILITIES
DOI:
https://doi.org/10.28925/2663-4023.2025.28.859Keywords:
security, cybersecurity, security, risk, failure, information system, critical infrastructure, cyberspace, cyberattack.Abstract
This article highlights the critical aspects of ensuring the security of complex information systems of critical infrastructure (CI) facilities in the face of modern threats, in particular, armed aggression and cyberattacks. The author emphasizes the high interdependence of CI elements and their vulnerability to new types of threats despite significant protection efforts. The author identifies four types of objects according to the level of potential danger and the peculiarities of CI functioning as a set of interconnected cyber-physical elements that require an integrated approach to protection. Three main approaches to ensuring security are analyzed in detail: the normative approach, which is based on the use of clearly defined norms, standards and regulations. Probabilistic approach (reliability): based on an assessment of the probability of reaching a threshold state under cyber impact. Risk approach (risk management): an integral approach based on an assessment of the probability of realization of limit states (P) and possible losses (L) from such realization. The article provides a comparative analysis of these approaches, identifies their advantages and disadvantages, and considers the conditions under which they may be equivalent.
It is shown that although the normative approach is basic, the probabilistic and risk approaches provide more reasonable and mathematically correct means of taking into account uncertainties and optimizing protection. The author emphasizes the need to combine the advantages of different approaches to create truly secure CI systems.
Downloads
References
Evseev, S.P. (). Methodology for synthesizing models of intelligent control and security systems for critical infrastructure facilities: monograph. Kharkiv: Novyi Svit-2000 Publishing House.
Yevseev, S.P., Zakovorotnyi, O.Y., Milov, O.V., Kuchuk, G.A., Galuza, O.A., Koval, M.V., Voitko, O.V., & Hryshchuk,R.V.(2024).Methodology for synthesizing models of intelligent control and security systems for critical infrastructure facilities:monograph. Kharkiv: Novyi Svit-2000 Publishing House.
Lukova-Chuyko, N. V, Toliupa, S.V., Nakonechnyi, V.S., & Brailovsky, M.M. (2021). Intrusion Detection Systems and Functional Resilience of Distributed Information Systems to Cyber Threats: monograph. K.: Format.
Lande, D.V., Subach, I.Y., & Boyarynova, Y.E. (2018). Fundamentals of the theory and practice of data mining in the field of cybersecurity: a textbook. K.: ISZZI KPI.5.
Brailovskyi, M.M., Zybin, S.V., Kobozeva, A.A., Khoroshko, V.O., & Khokhlachova, Y.E. (2021). Analysis of cybersecurity of information systems: monograph. K.: FOP Yamchynskyi O.V.
Abdalla, A., Aleshyn, G.V., Vdovychenko, I.N., et al. (2020). Cybersecurity and Information Technology: a monograph. Kh.: DISA PLUS LLC.
On Approval of Methodological Recommendations for Categorization of Critical Infrastructure Objects. (n.d.). https://zakon.rada.gov.ua/rada/show/v0023519-21#Text
On Critical Infrastructure, Law of Ukraine No. 1882-IX (2021) (Ukraine). https://zakon.rada.gov.ua/laws/show/1882-20#Text.
Yang, Z., Barroca, B., Laffréchine, K., Weppe, A., Bony-Dandrieux, A., Daclin N. (2023). A multi-criteria framework for critical infrastructure systems resilience. International Journal of Critical Infrastructure Protection, 42, 100616.
Information Technology. Methods and means of security. Information security management systems. Requirements. (DSTU ISO/IEC 27001:2022) (2022). https://my-itspecialist.com/iso-iec-27001-2022-standard.
Vorona, V.A., Kravchenko, M.O. (2017). Decision support systems in information security management: KNURE.
Jain, R. (2016). The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation, and Modeling. Wiley.
Lukova-Chuyko, N.V., Tolyupa, S.V., Nakonechnyi, V.S., & Brailovsky, M.M. (2021). Intrusion Detection Systems and Functional Resilience of Distributed Information Systems to Cyber Threats: monograph. K.: Format.
Gulkov, M. & Gannenko, S. (2024). An improved method for determining the residual risk in information and communication systems in assessing information vulnerability. Modern Information Technologies in the Field of Security and Defense, 50(2), 29–36. https://doi.org/10.33099/2311-7249/2024-50-2-29-36.
Sidorenko, V., & Maksymets, A. (2025). Model of ensuring the stability of critical information systems under the influence of internal and external destabilizing factors. Electronic professional scientific publication “Cybersecurity: Education, Science, Technology”, 3(27), 560–571. https://doi.org/10.28925/2663-4023.2025.27.779/
Mandziy, B. A. (2013). Software implementation of the reliability model of a renewable technical system with a constant loaded reserve. East-European Journal of Advanced Technologies, 3(9), 18–23.
Murphy, K. (2011). A brief introduction to graphical models and Bayesian networks. Technical report 2001-5-10, department of computer science, University of British Columbia. http://genie.sis.pitt.edu/
Douglas, B. (2014). West. Introduction to Graph Theory. 2nd edition.
Siewiorek, D. P., & Swarz, R. S. (1998). Reliable Computer Systems: Design and Evaluation. A K Peters/CRC Press.
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Сергій Толюпа, Андрій Кулько

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.