Davydiuk A. Methods and means of enhancing the level of cybersecurity for critical infrastructure objects

Українська версія

Thesis for the degree of Doctor of Philosophy (PhD)

State registration number

0823U101023

Applicant for

Specialization

  • 125 - Кібербезпека та захист інформації

09-11-2023

Specialized Academic Board

Разова спецрада 2575

National Aviation University

Essay

This dissertation is dedicated to the development of methods and tools to enhance the level of cybersecurity for critical infrastructure objects. Ensuring cybersecurity is a crucial task outlined in the Presidential Decree of Ukraine on the Decision of the National Security and Defense Council of Ukraine dated May 14, 2021, «On the Cybersecurity Strategy of Ukraine», the Law of Ukraine «On the Fundamental Principles of Ensuring Cybersecurity of Ukraine», and the Law of Ukraine «On Critical Infrastructure». Cybersecurity also plays a significant role in the Law of Ukraine «On National Security of Ukraine», underscoring the dependence of the safeguarding of state sovereignty, territorial integrity, democratic constitutional order, and other national interests of Ukraine on actual and potential cyber threats to critical infrastructure. Especially during times of war and heightened risks in information and cybersecurity, developing new and enhancing existing methods and tools for cybersecurity becomes urgent to elevate the country's cybersecurity. The security of critical information infrastructure objects (hereinafter referred to as CIIOs), as an integral part of critical infrastructure, directly impacts the safety of the population and the successful execution of military tasks. The existing methods and tools for ensuring the cybersecurity of critical information infrastructure (hereinafter referred to as CII), developed based on international standards and best practices, are quite effective in peacetime conditions. However, they do not account for the hybrid nature of warfare, which introduces new threats, including physical destruction, enemy takeover, lack of continuous monitoring and control, limitations in protective resources and available personnel, issues with equipment supply for recovery, disruptions in information exchange processes, the need for frequent changes in operational conditions, dynamic growth in the quantity and quality of cyberattacks, and more. As a result, their effectiveness diminishes significantly. Considering this, there is a need to develop new and enhanced existing methods and tools for cyber defence with the goal of elevating the level of cybersecurity for critical infrastructure. The cybersecurity of critical information infrastructure (hereinafter referred to as CII), being an integral part of critical infrastructure, is crucial for the safety of the population and the successful execution of military objectives. The relevance of this research is also driven by the sharp increase in the number of cyberattacks on the information and communication systems and technological networks of CII, government institutions, and the private sector during times of war. Vulnerabilities in the information and communication systems and technological networks of CII contribute to the success of such cyberattacks. Within the existing information security paradigm (ensuring confidentiality, integrity, and availability), information protection and cyber defence should encompass risk management, vulnerability management, and state cyber defence measures

Research papers

1. Zvaritch V. M., Davydiuk A. V. The method of color formalization of the level of information security risk. Èlektronnoe modelirovanie. 2019. Vol. 41, no. 2. P. 121–126. URL: https://doi.org/10.15407/emodel.41.02.121 (date of access: 31.08.2023)

2. Давидюк А., Зубок В. Застосування логіки предикатів для верифікації артефактів кіберзахисту під час проєктування систем критичного призначення. Реєстрація, зберігання і обробка даних. 2021. Т. 23, № 4. С. 37–46. URL: http://drsp.ipri.kiev.ua/article/view/265714 (дата звернення: 31.08.2023)

3. Давидюк А. Підходи до верифікації артефактів процесу забезпечення кібербезпеки об’єктів критичного призначення. Електронне моделювання. 2022. Т. 44, № 1. С. 107–117. URL: https://doi.org/10.15407/emodel.44.01.107 (дата звернення: 31.08.2023)

4. Requirements for a taxonomy of cyber threats of critical infrastructure facilities and an analysis of existing approaches / M. Komarov et al. Systems, decision and control in energy II. studies in systems, decision and control. 2021. Vol. 346. P. 189–205. URL: https://doi.org/10.1007/978-3-030-69189-9_11 (date of access: 31.08.2023)

5. Davydiuk A., Zubok V. Analytical review of the resilience of Ukraine’s critical energy infrastructure to cyber threats in times of war. 2023 15th international conference on cyber conflict: meeting reality (cycon), Tallinn, Estonia, 30 May – 2 June 2023. 2023. URL: https://doi.org/10.23919/cycon58705.2023.10181813 (date of access: 31.08.2023)

6. Давидюк А. Впровадження нових засобів і методів підвищення рівня кібербезпеки об’єктів критичної інфраструктури. Захист інформації. 2023. Т. 25, № 3. С. 122–132. URL: https://doi.org/10.18372/2410-7840.25.17937 (дата звернення: 19.10.2023)

Files

Similar theses