Abstract

The article proposes a model for evaluation of investment strategies in the information and educational environment of the University (IOCC). One of the options for solving such problems, and, in particular, assessing the risks associated with the financing of information security systems and cyber security of IOCC, is the implementation of intelligent decision support systems. Such systems allow the management of educational institutions to make rational decisions on investing financial resources in the development of the IOCC protection tools. The article proposes a model for the IDSP for a discrete procedure for financing the information protection and cyber security systems of the IOCC. Difference of the model from existing ones is the assumption of limited financial resources as the protection side of IOCC and attackers. The model is based on the use of the tools of the theory of multi-step games. The article describes the solution of a bilinear multistep game of quality with dependent motions within the framework of IOCC protection strategies. The results of the simulation experiment within the framework of the choice of financial strategies for cyber defense of IOCC are described. The developed intellectualized decision support system (IDSP) will allow the user to evaluate financial strategies when the investment directions in the information and cyber security information systems of the IOCC are aligned. Unlike existing models, a bilinear multistep game of quality in a class of pure strategies has been solved, and it makes it possible to assess the risks for players who accordingly represent the sides of defense and attack for IOCC. Various ratios of the parameters describing the financing process in the information protection and cyber security protection facilities of the IOCC were taken into account. In the course of the simulation experiment based on the results of the simulation experiment and the test results of the IDSP, a conclusion was made about the risks of loss of financial resources for players, respectively, by means of cyber defense and hacking the IOCC.

Highlights

  • В соответствии с [10,11,12] две терминальные поверхности – M 0, N0

  • Цель защитник ИОСУ (ЗИОСУ) привести динамическую систему с помощью своих стратегий управления на терминальную поверхность

  • Цель атакующих (хакера(ов))привести динамическую систему с помощью своих стратегий управления ФиР, выделяемыми на взлом, на терминальную поверхность N0, как бы финансово ни действовал ЗИОСУ

Read more

Summary

Introduction

Цель атакующих (хакера(ов))привести динамическую систему с помощью своих стратегий управления ФиР, выделяемыми на взлом, на терминальную поверхность N0 , как бы финансово ни действовал ЗИОСУ. В эпоху глобализации и цифровизациисферы образования, задача оценки эффективности финансирования СКБ ИОСУ становиться одной из приоритетных для служб кибербезопасности и защиты информации современных образовательных учреждений, в частности университетов. В ходе исследования были рассмотрены работы, посвящённые применению различных экспертных [13, 14] и систем поддержки принятия решений [15, 16] для выбора стратегий финансирования СКБ, в частности ИОСУ.

Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.