Abstract

The aim of the article is to develop a method that would allow for a quantitative evaluation of stability risks of hardware and software systems under simulated information technology interference and simulation of real management process cycle. The article shows the relevance and importance of the methods for risk evaluation of hardware and software systems stability in the context of targeted and coordinated information technology interference. Information technology interference is understood as targeted and coordinated hardware and software, as well as software actions aimed at temporary disruption of operation or logical defeat of hardware and software systems. Successful information technology interference is conditioned by the presence of vulnerabilities in the hardware and software systems that include IP and MAC addresses and communication equipment ports available to the intruder. The method presented in the article is based on the following: risk evaluation is performed using a test bed or active facilities with the involvement of respectively a fixed and portable information technology measures simulation system. The risk of destabilization of hardware and software systems is evaluated experimentally as the combination of frequency and consequences of successful information technology interference. The preliminary risk evaluation allows choosing the solution for information protection in order to eliminate potential vulnerabilities. The residual risk is evaluated based on the ability of hardware and software systems to eliminate the consequences of information technology interference through various inbuilt resilience features. The research resulted in the proposed method of evaluation hardware and software system security risks under information technology interference as a logical sequence of steps: risk analysis of information technology interference; identification of vulnerabilities, simulation of system operation processes under information technology interference at the trial facility; selection of the best information protection and system fault tolerance facilities; preliminary an final evaluation of system stability risks. As part of the method, probability and temporal indicators of hardware and software systems stability risk evaluation were developed that enable analysis of recovery from threats of combined information technology interference, selection of rational information protection and fault tolerance measures. As part of the method, it is proposed to use a cubic analysis scheme of elimination of vulnerabilities of critical elements of hardware and software systems that allows identifying the levels of tolerable risk and levels of reference model of interaction of open systems required for elimination of vulnerability subject to the frequency of information technology interference. Additionally, a certificate of evaluation of stability risks of hardware and software systems subject to the frequency of successful interferences was developed. In the conclusion it is noted that the developed method allows using the knowledge regarding potential vulnerabilities and experimental studies to identify the probabilistic values of security risks in order to determine the most hazardous threats and adoption of respective information protection measures.

Highlights

  • Рядом государств и хакерским сообществом активно создаются программные средства для подготовки, доставки и скрытного проникновения программного кода информационно-технических воздействий (ИТВ) на автоматизированные системы управления технологическими процессами на транспорте, в энергетике, связи и других отраслях промышленности [4]

  • От информационно-технических воздействий (ИТВ) позволяет на основе знаний о потенциальных уязвимостях и результатов экспериментальных исследований определить значение вероятностных показателей риска нарушения защищенности для установления наиболее опасных угроз и принятия, соответствующих мер защиты информации

Read more

Summary

Introduction

Методика оценки рисков нарушения устойчивости функционирования программно-аппаратных комплексов в условиях информационно-технических воздействий // Надежность. Методика оценки рисков нарушения устойчивости функционирования программно-аппаратных комплексов в условиях информационно-технических воздействий В связи тем, что указанные уязвимости обуславливают потенциальную возможность для реализации ИТВ, приводящих к нарушению функционирования ПАК, разработка методики, позволяющей количественно оценить уровень рисков нарушения устойчивости ПАК в условиях имитации ИТВ, является актуальной.

Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.