
THE INFORMATION SYSTEM CYBERSECURITY CONCEPT OF THE STATE BORDER GUARD SERVICE OF UKRAINE AT THE MODERNIZATION STAGE
Author(s) -
Mykhailo Strelbitskyi
Publication year - 2019
Publication title -
bezpeka ìnformacìjnih sistem ì tehnologìj
Language(s) - English
Resource type - Journals
ISSN - 2707-1758
DOI - 10.17721/ists.2019.1.3-10
Subject(s) - modernization theory , guard (computer science) , computer security , information system , computer science , risk analysis (engineering) , service (business) , information security , process (computing) , information technology , operations research , business , engineering , political science , law , marketing , programming language , operating system , electrical engineering
The article analyzes the functions of the Border Guard Service of Ukraine and its information systems. It is determined that the modernization of the components of the integrated information system causes a violation of the existing system of cyber defense. The analysis of existing approaches to ensuring the protection of information in information systems has shown a sufficiently deep study of research separately for each information system. However, unexperienced features of the interaction of these systems remain, in particular, with the modernization of certain information systems in terms of providing cyber defense in general. The process of modernization of information systems is carried out according to individual components of the system or complex and requires their coordination in the process of joint operation. The article gives the justification of modernization strategies according to the groups of criteria: the level of cyber security, the peculiarities of the functioning of information systems. It is noted that the value of the probability of violating the properties of the information resource varies over the entire period of modernization. Therefore, to choose the strategy of modernization at the value of probability at any time is not correct. It is necessary to take into account the general tendency of the function of changing this probability. The most expedient is the distribution of this group of criteria into three components of the criteria for the level of cyber security: the normative - the criterion in which the current value of the probability of violating cybersecurity does not exceed the given; average - the criterion for which the average probability of a violation of cybersecurity does not exceed the prescribed; weighted - a criterion for which the average weighted probability of cybersecurity violation will not exceed the given. The article presents functional dependencies for determining the probability of cyber security violations for each of the groups. As a result of the study, it was determined that the priority indicator of the effectiveness of the process of modernizing the information systems of the border agency is the maximum value of the probability of violating the properties of information in the process of modernization