INFORMATION SECURITY POLICY MODEL FOR CRITICAL INFRASTRUCTURE OBJECTS
DOI:
https://doi.org/10.31891/2219-9365-2021-68-2-4Keywords:
critical infrastructure, information security policy, information security threat, expert risks assessmentAbstract
The approach to creating an information security policy of information object, which belongs to the critical infrastructure is proposed in the article. The safety status analysis of the critical infrastructure (the primary health care center) shows it to be sufficiently low. To quantify the object security, a logical-probabilistic model, which takes into account the threats of categories: confidentiality, integrity, accessibility is developed. The level of the current state of studied object cybersecurity is investigated by logical-probabilistic modeling. The ranking allows identifying the most significant threats and, as a result, allows developing an information security policy that legislates the current requirements and capabilities of the investigating object. The purpose of the security policy is to ensure that the critical infrastructure is protected from possible threats types e.g. internal, external, accidental, and intentional. The basic principles of security policy are as follows: protection against breaches of confidentiality, integrity, availability of critical information resources; responsibility introduction of officials on providing cyber protection of the critical infrastructure; periodic training of employees on information security; ensuring the functioning and prevention of disturbances in the operation of the critical infrastructure facility; delimitation of user access rights; minimization of privileges; responding to the security incident. The rules and policy recommendations implementation help to organize the advanced secure operation of the critical infrastructure and reduce the risks of typical threats and leaks of critical information. It is significant to maintain the continuity of information security processes to keep it up to date due to the possibility of new threats and channels of information leakage.