z-logo
open-access-imgOpen Access
Model of the States of Critical Information Infrastructure Subjects under Destructive Influences in Static Mode
Author(s) -
Е. А. Максимова
Publication year - 2021
Publication title -
trudy učebnyh zavedenij svâzi
Language(s) - English
Resource type - Journals
eISSN - 2712-8830
pISSN - 1813-324X
DOI - 10.31854/1813-324x-2021-7-3-65-72
Subject(s) - critical infrastructure , mode (computer interface) , risk analysis (engineering) , computer science , object (grammar) , russian federation , subject (documents) , computer security , critical infrastructure protection , information security , development (topology) , business , artificial intelligence , mathematics , mathematical analysis , library science , economic policy , operating system
With the introduction of 187-FL "On the security of critical information infrastructure in the Russian Federation", a class of tasks requiring new approaches was determined. This is due to the solution of not only practical problems with the introduction of this law, but also with the development of its scientific and methodological support, which is one of the tasks of regulators. The main regulatory problem in ensuring the security of critical information infrastructure (CII), in our opinion, is associated with the lack of a systematic approach as a methodological basis for developing requirements for the development of CII. This leads to gross errors and errors in the course of making managerial decisions, therefore, to an increase in information security risks. When considering the subject of CII as a system, there is a need to consider inter-object relationships as sources of destructive influences that can lead to the effect of infrastructural "destructivism", i.e. to the self-destruction of infrastructure. To study this issue at the initial stage, it is proposed to build a model of the states of CII subjects in a static mode. In the course of working with this model, it is possible to predict the development of the situation of self-destruction of the infrastructure of the CII subject in a situation of uncertainty.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here