
CONCEPTUAL MODEL OF CYBER SPACE SECURITY
Author(s) -
Yuliia Tkach
Publication year - 2020
Publication title -
tehnìčnì nauki ta tehnologìï
Language(s) - English
Resource type - Journals
eISSN - 2519-4569
pISSN - 2411-5363
DOI - 10.25140/2411-5363-2020-4(22)-96-108
Subject(s) - cyberspace , computer security , computer science , information security , conceptual model , confidentiality , state (computer science) , server , the internet , world wide web , algorithm , database
Urgency of the research. Public information resources and means of electronic network transactions (servers, routers, remote access servers, communication channels, operating systems, databases and applications) must be protected reliably and efficiently: the price of each "break" of protection is growing rapidly and this growth will continue in the near future.Target setting. Ensuring information security of networks and processing systems is a priority for the state leadership, as the quality and efficiency of strategic decision-making and the effectiveness of their implementation largelydepend on main-taining the confidentiality, integrity and availability of state information resources.Actual scientific researches and issues analysis. Despite the ever-increasing number of publications on information se-curity, the problem of security in cyberspace, especially a state one, remains unresolved.Uninvestigated parts of general matters defining. Currently, in the works of domestic and foreign scientists, insufficient attention is paid to the development of systems and models of cybersecurity of the state.The research objective. The aim of the article is to build a conceptual model of security within cyberspace, which will describe the components of national cybersecurity and will establish the strength of the connection between its relevant com-ponents, as well as determine the level of cybersecurity.The statement of basic materials. Using Euler-Venn diagrams, the cyberspace of the state is graphically represented and a more rigorous description of the model is proposed on the basis of set theory. In general, the conceptual model of cyberse-curity is formed on the basis of three components: a person who processes information, owns it or protects it; regulations that provide legal protection of information; information resources, where the information in need of protection is concentrated, and within which means of information protection function.Conclusions. The article builds a conceptual model of state security, which describes the components of cybersecurity of the state and allows to establish the strength of the connection between its relevant components, as well as to determine the level of cybersecurity.