Loading…

Research of the impact on the ecology of the state of cybersecurity of the critical infrastructure objects

The analysis of the impact on the ecology of the state of cybersecurity of critical infrastructure objects and the factors influencing the state of cybersecurity of the information system of the critical infrastructure object is performed. An explanation is given of why cybersecurity violations in a...

Full description

Saved in:
Bibliographic Details
Main Authors: Mokhor, Volodymyr, Korchenko, Oleksandr, Honchar, Serhii, Komarov, Maxsim, Onyskova, Alla
Format: Conference Proceeding
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The analysis of the impact on the ecology of the state of cybersecurity of critical infrastructure objects and the factors influencing the state of cybersecurity of the information system of the critical infrastructure object is performed. An explanation is given of why cybersecurity violations in automated process control systems can lead to consequences in the industrial sector and environmental impact. The need to develop effective and adequate proposals and measures for cybersecurity of information systems of the critical infrastructure objects is shown. The classification of assets that are the objects of cyberattacks by attackers and the categories of impact on the critical infrastructure objects are given. Approaches to determining the cyber threat risk factor of the critical infrastructure object and the relevance of threats are presented. The method of assessing the degree of possible damage from the implementation of information security threats is considered. The results of this analysis can be used to develop proposals and measures to avoid the effects of cyberattacks on the critical infrastructure objects. The prospect of further research is to develop a methodology for determining the relationship between specific cyberattacks and possible quantitative damage.
ISSN:2267-1242
2555-0403
2267-1242
DOI:10.1051/e3sconf/202128009009