
MODEL OF THE INVESTMENT PROCESS IN CYBER SECURITY DEVELOPMENT FOR BUILDING A DECISION SUPPORT SYSTEM
Author(s) -
Hennadii Hulak,
Valeriy Lakhno
Publication year - 2019
Publication title -
kìberbezpeka. osvìta, nauka, tehnìka
Language(s) - English
Resource type - Journals
ISSN - 2663-4023
DOI - 10.28925/2663-4023.2019.6.154163
Subject(s) - computer security , process (computing) , computer science , hacker , investment (military) , quality (philosophy) , decision support system , field (mathematics) , differential (mechanical device) , differential game , risk analysis (engineering) , operations research , business , engineering , artificial intelligence , mathematical optimization , philosophy , mathematics , epistemology , politics , political science , pure mathematics , law , aerospace engineering , operating system
The topical problem of making the optimal decision on financing pro-jects in the field of cybersecurity in the conditions of active actions of cybersecu-rity violators is considered. A model has been developed for a decision support system for financing projects for the creation and development of cybersecurity management centers for critical infrastructure facilities. The model assumes meth-ods and means of actively countering the attacking side. In contrast to existing approaches, the model is based on solving a bilinear differential quality game with several terminal surfaces. A discrete approximation method was used in the solution. This made it possible to find a solution to the bilinear differential quality game with dependent movements. The results of a computational experiment within the framework of the software implementation of a decision support sys-tem in the field of financing projects in the field of cybersecurity, in particular, in the creation and development of cybersecurity management centers for critical in-frastructure facilities are described. The developed decision support system al-lows obtaining optimal financing strategies by the side of cybersecurity protec-tion. In this case, any ratio of parameters describing the financing process is con-sidered, no matter how financially the attacker (hackers) acted.