SIMULATION OF INFORMATION SECURITY RISKS OF AVAILABILITY OF PROJECT DOCUMENTS BASED ON FUZZY LOGIC
Article Sidebar
Open full text
Issue Vol. 12 No. 3 (2022)
-
ABSORPTION CHARACTERISTICS OF THERMAL RADIATION FOR CARBON DIOXIDE
Jan Kubicki, Krzysztof Kopczyński, Jarosław Młyńczak4-7
-
SWITCH-FILTER ON A RECTANGULAR WAVEGUIDE PARTIALLY FILLED BY DIELECTRIC
Vitaly Pochernyaev, Nataliia Syvkova, Mariia Mahomedova8-11
-
GIANT MAGNETORESISTANCE OBSERVED IN THIN FILM NiFe/Cu/NiFe STRUCTURES
Jakub Kisała, Andrzej Kociubiński, Karolina Czarnacka, Mateusz Gęca12-15
-
EXPANSION OF THE ZONE OF PRACTICAL APPLICATION OF PLC WITH PARALLEL ARCHITECTURE
Sergiy Tymchuk, Oleksiy Piskarev, Oleksandr Miroshnyk, Serhii Halko, Taras Shchur16-19
-
FEATURES OF THE ANGULAR SPEED DYNAMIC MEASUREMENTS WITH THE USE OF AN ENCODER
Vasyl Kukharchuk, Waldemar Wójcik, Sergii Pavlov, Samoil Katsyv, Volodymyr Holodiuk, Oleksandr Reyda, Ainur Kozbakova, Gaukhar Borankulova20-26
-
APPLICATION OF PREDICTIVE MAINTENANCE IN THE PACKAGING PRODUCTION
Bogdan Palchevskyi, Lyubov Krestyanpol27-33
-
PREDICTION MODEL OF PUBLIC HOUSES’ HEATING SYSTEMS: A COMPARISON OF SUPPORT VECTOR MACHINE METHOD AND RANDOM FOREST METHOD
Andrii Perekrest, Vladimir Chenchevoi, Olga Chencheva, Alexandr Kovalenko, Mykhailo Kushch-Zhyrko, Aliya Kalizhanova, Yedilkhan Amirgaliyev34-39
-
NATURAL-SIMULATION MODEL OF PHOTOVOLTAIC STATION GENERATION IN PROCESS OF ELECTRICITY BALANCING IN ELECTRICAL POWER SYSTEM
Petr Lezhniuk, Viacheslav Komar, Iryna Hunko, Daniyar Jarykbassov, Dinara Tussupzhanova, Bakhyt Yeraliyeva, Nazbek Katayev40-45
-
APPLICATION FOR VIBRATION DIAGNOSTICS
Anzhelika Stakhova46-49
-
DEEP NEURAL NETWORKS FOR SKIN LESIONS DIAGNOSTICS
Magdalena Michalska-Ciekańska50-53
-
DYNAMIC AND MATHEMATICAL MODELS OF THE HYDROIMPULSIVE VIBRO-CUTTING DEVICE WITH A PRESSURE PULSE GENERATOR BULT INTO THE RING SPRING
Roman Obertyukh, Andrіі Slabkyі, Leonid Polishchuk, Oleksandr Povstianoi, Saule Kumargazhanova, Maxatbek Satymbekov54-58
-
EXPERT FUZZY SYSTEMS FOR EVALUATION OF INTENSITY OF REACTIVE EDEMA OF SOFT TISSUES IN PATIENTS WITH DIABETES
Liudmyla Shkilniak, Waldemar Wójcik, Sergii Pavlov, Oleg Vlasenko, Tetiana Kanishyna, Irina Khomyuk, Oleh Bezverkhyi, Sofia Dembitska, Orken Mamyrbayev, Aigul Iskakova59-63
-
SIMULATION OF INFORMATION SECURITY RISKS OF AVAILABILITY OF PROJECT DOCUMENTS BASED ON FUZZY LOGIC
Oleksii M. Shushura, Liudmyla A. Asieieva, Oleksiy L. Nedashkivskiy, Yevhen V. Havrylko, Yevheniia O. Moroz, Saule S. Smailova, Magzhan Sarsembayev64-68
-
MANAGEMENT OF THE WORKPLACES BY THE FACILITIES OF OPERATIONS RESEARCH
Nataliia Geseleva, Ganna Proniuk, Olexander Romanyuk, Olga Akimova, Tetiana Troianovska-Korobeynikova, Liudmyla Savytska, Saule Rakhmetullina, Nurbapa Mekebayev69-73
-
MODELING OF LABOR POTENTIAL OF UKRAINE: FORMATION OF KNOWLEDGE BASE
Ivan V. Zayukov, Iryna M. Kobylianska, Alexandr Kobylianskyi, Sofia V. Dembitska74-78
Archives
-
Vol. 14 No. 4
2024-12-21 25
-
Vol. 14 No. 3
2024-09-30 24
-
Vol. 14 No. 2
2024-06-30 24
-
Vol. 14 No. 1
2024-03-31 23
-
Vol. 13 No. 4
2023-12-20 24
-
Vol. 13 No. 3
2023-09-30 25
-
Vol. 13 No. 2
2023-06-30 14
-
Vol. 13 No. 1
2023-03-31 12
-
Vol. 12 No. 4
2022-12-30 16
-
Vol. 12 No. 3
2022-09-30 15
-
Vol. 12 No. 2
2022-06-30 16
-
Vol. 12 No. 1
2022-03-31 9
-
Vol. 11 No. 4
2021-12-20 15
-
Vol. 11 No. 3
2021-09-30 10
-
Vol. 11 No. 2
2021-06-30 11
-
Vol. 11 No. 1
2021-03-31 14
-
Vol. 10 No. 4
2020-12-20 16
-
Vol. 10 No. 3
2020-09-30 22
-
Vol. 10 No. 2
2020-06-30 16
-
Vol. 10 No. 1
2020-03-30 19
Main Article Content
DOI
Authors
Abstract
The widespread use of computer technology, its rapid development and use in almost all areas of human activity requires constant updating of information security issues. The activities of many enterprises in the field of IT, construction, and other areas are of a project nature and therefore further research on information security management of projects is relevant. Appearance of changes and the current state of the project results at certain points of time describe the documents that accompany it. In this paper, the information structure of the project is considered as a set of specific documents. During the life cycle of each project document, which includes the creation, transfer, preservation and transformation, there are generally threats to its confidentiality, integrity, accessibility and authenticity. This paper develops a method for assessing the risks of violation of the availability of project documents in solving information security problems. A formal description of many project documents in the form of a generalized hierarchical structure is presented, the connection of documents with the operations performed on them and information systems used during these operations is formalized. Given the incompleteness and dimension of the data, the based on fuzzy logic model was developed to assess the risk of document accessibility. Approaches to the assessment of the damage from the violation of the availability of the project document and the method of calculating the overall assessment of the risk of violation of the documents availability are proposed. The results presented in this paper can be used in decision-making processes regarding information security of projects in organizations that have project activities. The approaches proposed in this paper can serve as a basis for the creation of specialized information technologies to automate the calculation of project risk assessments.
Keywords:
References
Abid H. et al.: Structuration Model of Construction Management Professionals, Use of Mobile Devices. Journal of Management in Engineering 37(4), 2021. DOI: https://doi.org/10.1061/(ASCE)ME.1943-5479.0000930
Al-Ali M. et al.: Improving risk assessment model of cyber security using fuzzy logic inference system. Computers & Security 74, 2018, 323–339. DOI: https://doi.org/10.1016/j.cose.2017.09.011
Al-Ali M., Al Mogren A.: Fuzzy logic methodology for cyber security risk mitigation approach. Journal of Networking Technology 8(3), 2017.
Alam J. et al.: Advance Cyber Security System using fuzzy logic. Journal of Management & IT ACME 10, 2014, 17–29.
Azarova A.: Information Technologies and Neural Network Means for Building the Complex Goal Program Improving the Management of Intellectual Capital. Lecture Notes on Data Engineering and Communications Technologies 77, 2022, 534–547. DOI: https://doi.org/10.1007/978-3-030-82014-5_36
Barabash O. et al.: Application of Petri Networks for Support of Functional Stability of Information Systems. IEEE First International Conference on System Analysis & Intelligent Computing (SAIC), Kyiv 2018, 36–39. DOI: https://doi.org/10.1109/SAIC.2018.8516747
Bharadwaj R. K., de Sotob B. G.: Cyber security challenges and vulnerability assessment in the construction industry. Conference Creative Construction, Budapest 2019, 30–37.
Gavrylenko S. et al.: Development of a method for identifying the state of a computer system using fuzzy cluster analysis. Advanced Information Systems 4(2), 2020, 8–11. DOI: https://doi.org/10.20998/2522-9052.2020.2.02
https://www.construction-institute.org/events/education/free-webinar-cybersecurity-for-construction (available 09.02.2022).
https://www.first.org/cvss/v3.1/user-guide (available 16.02.2022).
https://www.nist.gov/cybersecurity/measurements-information-security (available 09.02.2022).
Kvyetnyy R. et al.: Blur recognition using second fundamental form of image surface. Proc. SPIE 9816, 2015, 98161A. DOI: https://doi.org/10.1117/12.2229103
Kvyetnyy R. et al.: Method of image texture segmentation using Laws' energy measures. Proc. SPIE 10445, 2017, 1044561. DOI: https://doi.org/10.1117/12.2280891
Kvyetnyy R. et al.: Modification of fractal coding algorithm by a combination of modern technologies and parallel computations. Proc. SPIE 9816, 2015, 98161R. DOI: https://doi.org/10.1117/12.2229009
Mishchenko A. V. et al.: A vague model for assessing the security of information security and the level of security of ERP systems. Telecommunications and Information Technologies 66, 2020, 142–151. DOI: https://doi.org/10.31673/2412-4338.2020.011451
Nedashkivskiy O. et al.: Mathematical support for automated design systems for passive optical networks based on the β-parametric approximation formula. International Journal of Advanced Trends in Computer Science and Engineering 9(5), 2020, 8207–8212. DOI: https://doi.org/10.30534/ijatcse/2020/186952020
Nedashkivskiy O.: Precise method of balancing passive optical networks with irregular splitter with two or more outputs. 2nd International Conference on Advanced Information and Communication Technologies (AICT), 2017, 228–231. DOI: https://doi.org/10.1109/AIACT.2017.8020107
Nedashkivskyy O. L. et al.: Methods of creating passive optical networks with the distributing bus topology. Control, Navigation and Communication Systems 2(42), 2017, 206–217.
Shushura O. M.: Infological modeling of information systems subject industries in solving of fuzzy control tasks. Link 2, 2018, 53–56.
Shyian A. A. et al.: Modeling communication between the public and the authorities while implementing innovative projects in the context of e-democracy and public administration. Science and Innovation 16(6), 2021, 18–27. DOI: https://doi.org/10.15407/scine16.06.018
Sonkor M., de Sotob B. G.: Operational Technology on Construction Sites: A Review from the Cybersecurity Perspective. Journal of Construction Engineering and Management 147(12), 2021. DOI: https://doi.org/10.1061/(ASCE)CO.1943-7862.0002193
Trishch R. et al.: Methodology for multi-criteria assessment of working conditions as an object of qualimetry. Engineering Management in Production and Services 13(2), 2021, 107–1141. DOI: https://doi.org/10.2478/emj-2021-0016
Trishch R. et al.: Qualimetric method of assessing risks of low quality products. MM Science Journal 2021, 4769–4774. DOI: https://doi.org/10.17973/MMSJ.2021_10_2021030
Zadeh L.A.: Fuzzy sets. Information and Control 8, 1965, 338–353. DOI: https://doi.org/10.1016/S0019-9958(65)90241-X
Article Details
Abstract views: 754
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
