z-logo
open-access-imgOpen Access
MODEL OF THE INVESTMENT PROCESS IN CYBER SECURITY DEVELOPMENT FOR BUILDING A DECISION SUPPORT SYSTEM
Author(s) -
Hennadii Hulak,
Valeriy Lakhno
Publication year - 2019
Publication title -
kìberbezpeka. osvìta, nauka, tehnìka
Language(s) - English
Resource type - Journals
ISSN - 2663-4023
DOI - 10.28925/2663-4023.2019.6.154163
Subject(s) - computer security , process (computing) , computer science , hacker , investment (military) , quality (philosophy) , decision support system , field (mathematics) , differential (mechanical device) , differential game , risk analysis (engineering) , operations research , business , engineering , artificial intelligence , mathematical optimization , philosophy , mathematics , epistemology , politics , political science , pure mathematics , law , aerospace engineering , operating system
The topical problem of making the optimal decision on financing pro-jects in the field of cybersecurity in the conditions of active actions of cybersecu-rity violators is considered. A model has been developed for a decision support system for financing projects for the creation and development of cybersecurity management centers for critical infrastructure facilities. The model assumes meth-ods and means of actively countering the attacking side. In contrast to existing approaches, the model is based on solving a bilinear differential quality game with several terminal surfaces. A discrete approximation method was used in the solution. This made it possible to find a solution to the bilinear differential quality game with dependent movements. The results of a computational experiment within the framework of the software implementation of a decision support sys-tem in the field of financing projects in the field of cybersecurity, in particular, in the creation and development of cybersecurity management centers for critical in-frastructure facilities are described. The developed decision support system al-lows obtaining optimal financing strategies by the side of cybersecurity protec-tion. In this case, any ratio of parameters describing the financing process is con-sidered, no matter how financially the attacker (hackers) acted.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here