Abstract

Based on the conducted research of the influence of various parameters on the values of information and cybersecurity risks in the functioning of enterprises and organizations that widely use elements of the digital economy and have a network structure, the need for timely identification of critical nodes in the network structures used has been established. The authors propose the methodology for determining the most critical nodes of network information infrastructures to ensure their operability and the necessary level of cybersecurity. The methodology bases on the combined use of fuzzy logic, regression analysis and ranking methods in the context of the dependence of information and cybersecurity risk on many different parameters. The authors propose to solve the problem of determining the most critical nodes of network information infrastructures in two stages. At the first stage, the methods of fuzzy logic and regression analysis determine the set of parameters that most affect the value of the cybersecurity risk for the considerate network nodes. At the second stage, we identify the most critical nodes by the method of ranking nodes according to the parameters determined at the first stage. The use of the proposed methodology makes it possible to identify the most critical nodes of the network infrastructure in a timely manner, to plan the set of measures to maintain it at the required level of operability, as well as minimize possible damage and consequences from the implementation of existing threats.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.