INFORMATION SECURITY POLICY MODEL FOR CRITICAL INFRASTRUCTURE OBJECTS

Authors

  • Leonid KUPERSHTEIN Vinnytsia National Technical University
  • ANDREY DUDATYEV Vinnytsia National Technical University
  • OLESIA VOITOVYCH Vinnytsia National Technical University
  • YANA YASINSKA Vinnytsia National Technical University

DOI:

https://doi.org/10.31891/2219-9365-2021-68-2-4

Keywords:

critical infrastructure, information security policy, information security threat, expert risks assessment

Abstract

The approach to creating an information security policy of information object, which belongs to the critical infrastructure is proposed in the article. The safety status analysis of the critical infrastructure (the primary health care center) shows it to be sufficiently low. To quantify the object security, a logical-probabilistic model, which takes into account the threats of categories: confidentiality, integrity, accessibility is developed. The level of the current state of studied object cybersecurity is investigated by logical-probabilistic modeling. The ranking allows identifying the most significant threats and, as a result, allows developing an information security policy that legislates the current requirements and capabilities of the investigating object. The purpose of the security policy is to ensure that the critical infrastructure is protected from possible threats types e.g. internal, external, accidental, and intentional. The basic principles of security policy are as follows: protection against breaches of confidentiality, integrity, availability of critical information resources; responsibility introduction of officials on providing cyber protection of the critical infrastructure; periodic training of employees on information security; ensuring the functioning and prevention of disturbances in the operation of the critical infrastructure facility; delimitation of user access rights; minimization of privileges; responding to the security incident. The rules and policy recommendations implementation help to organize the advanced secure operation of the critical infrastructure and reduce the risks of typical threats and leaks of critical information. It is significant to maintain the continuity of information security processes to keep it up to date due to the possibility of new threats and channels of information leakage.

Published

2021-12-15

How to Cite

KUPERSHTEIN Л., DUDATYEV А., VOITOVYCH О., & YASINSKA Я. (2021). INFORMATION SECURITY POLICY MODEL FOR CRITICAL INFRASTRUCTURE OBJECTS. MEASURING AND COMPUTING DEVICES IN TECHNOLOGICAL PROCESSES, (2), 30–38. https://doi.org/10.31891/2219-9365-2021-68-2-4