Computer modeling of corporate information security of geoinformation technologies at industrial facilities

The article discusses approaches to efficient managerial decision-making in integrated information security of geoinformation technologies in industry, which is required for the information protection organization and control, and for the risk assessment. The proposed methods and models of risk assessment in information security of geoinformation technologies make it possible to identify a unified approach to specification of key risks in information security. This means that a key risk is scrutinized and fleshed out, a possible damage is identified and evaluated, and the required risk neutralization activities are undertaken within the framework of the information security control concerned with the geoinformation technologies of an industrial plant. These methods and models allow identification of threats for information assets and their protection sensibilities, evaluation of their implementability, a well as determination of impact they can exert on performance of geoinformation systems at an industrial plant. The risks in information security are neutralized by means of influencing components of these risks, i.e. sensibilities, threats, assets or safety control tools. The research demonstrates the basic effects due to the introduction of the integrated information security system concerned with geoinformation technologies in the sphere of prompt incident response: reduction in package inputs owing to technology replication and due to effect of introduction scale of a geoinformation system, improvement of information security and decrease of risks, as well as mitigation of damage because of cyberattacks.

Keywords: risks in information security of geoinformation technologies, evaluation of sensibilities, assessment of threats, information assets value, control tools in information security of geoinformation technologies, risk assessment and management, risk neutralization activities, information protection in geoinformation systems, cyberattack-inflicted damage, prompt incident response.
For citation:

Goncharenko S. N., Yakheev V. V. Computer modeling of corporate information security of geoinformation technologies at industrial facilities. MIAB. Mining Inf. Anal. Bull. 2022;(2):81-96. [In Russ]. DOI: 10.25018/0236_1493_2022_2_0_81.

Acknowledgements:
Issue number: 2
Year: 2022
Page number: 81-96
ISBN: 0236-1493
UDK: 004.056.53:65.011.56
DOI: 10.25018/0236_1493_2022_2_0_81
Article receipt date: 24.11.2021
Date of review receipt: 10.12.2021
Date of the editorial board′s decision on the article′s publishing: 10.01.2022
About authors:

S.N. Goncharenko, Dr. Sci. (Eng.), Professor, National University of Science and Technology «MISiS», 119049, Moscow, Russia, e-mail: gsn@misis.ru, http://orcid.org/0000-0001-7783-3738.
V.V. Yakheev, Cand. Sci. (Eng.), Assistant Professor, Saint-Petersburg University of State Fire Service of Emercom of Russia, 190000, Saint Petersburg, Russia, e-mail: yakvaleri@yandex.ru.

 

For contacts:

S.N. Goncharenko, e-mail: gsn@misis.ru.

Bibliography:

1. Salakhutdinova K. I., Lebedev I. S., Krivtsova I. E. An approach to the selection of an informative feature in the problem of software identification. Nauchno-tekhnicheskiy vestnik informatsionnykh tekhnologiy, mekhaniki i optiki. 2018, vol. 18, no. 2, pp. 278—285. [In Russ].

2. Alladi T., Chamola V., Parizi R. M., Kim-Kwang Raymond Choo Blockchain applications for Industry 4.0 and Industrial IoT: A review. IEEE Access. 2019, vol. 7, pp. 176935—176951.

3. Zapechnikov S. V., Miloslavskaya N. G. Informatsionnaya bezopasnost' otkrytykh sistem. T. 1. Ugrozy, uyazvimosti, ataki i podkhody k zashchite [Information security of open systems. Vol. 1 Threats, vulnerabilities, attacks and approaches to defense], Moscow, GLT, 2017, 536 p.

4. Zapechnikov S. V., Miloslavskaya N. G. Informatsionnaya bezopasnost' otkrytykh sistem. Т. 2. Sredstva zashchity v setyakh [Information security of open systems. Vol. 2 Means of protection in networks], Moscow, GLT, 2018, 558 p.

5. Minaev V. A., Sychev M. P., Vayts E. V., Gracheva Yu. V. Modeling information security threats using the principles of system dynamics. Issues of radio electronics. 2017, no. 6, pp. 75—82. [In Russ].

6. Minaev V. A., Sychev M. P., Vayts E. V., Gracheva Yu. V. Risk-based approach to modeling the process of countering information security threats. Issues of radio electronics. 2017, no. 6, pp. 83—92. [In Russ].

7. Casinoa F., Dasaklis T. K., Patsakis C. A. Systematic literature review of blockchain-based applications: Current status, classification and open issues. Telematics and Informatics. 2019, vol. 36, pp. 55—81.

8. Marques M. Decentralized decision support for intelligent manufacturing in Industry 4.0. Journal of Ambient Intelligence and Smart Environments. 2017, vol. 9, no 3, pp. 299—313.

9. Chipiga A. F. Informatsionnaya bezopasnost' avtomatizirovannykh sistem [Information security of automated systems], Moscow, Gelios ARV, 2017, 336 p.

10. Korobets B. N., Minaev V. A., Sychev M. P. Information operations and the problem of forming a modern information security culture. Sistemy vysokoy dostupnosti. 2017, vol. 13, no. 3, pp. 38—46. [In Russ].

11. Temkin I. O., Myaskov A. V., Deryabin S. A., Rzazade U. A. Digital twins and modeling of the transporting-technological processes for on-line dispatch control in open pit mining. Eurasian Mining. 2020, vol. 2, pp. 55–58.

12. Ramakrishna S., Khong T. H., Leong T. K. Smart manufacturing. Procedia Manufacturing. 2017, vol. 12, pp. 128—131.

13. Xifan Yao, Jiajun Zhou, Yingzi Lin, Yun Li, Hongnian Yu, Ying Liu Smart manufacturing based on cyber-physical systems and beyond. Journal of Intelligent Manufacturing. 2019, vol. 30, no. 1, pp. 2805—2817.

14. Umerbekov Zh. Zh., Goncharenko S. N. Validation of efficiency of the target production safety management model introduction in the mining industry. MIAB. Mining Inf. Anal. Bull. 2019, no. 8, pp. 225–234. [In Russ]. DOI: 10.25018/0236-1493-2019-08-0-225-234.

15. Bykova V. V., Kataeva A. V. Methods and tools for analyzing the informativeness of signs in the processing of medical data. Programmnye produkty i sistemy. 2016, no. 2, pp. 172—178. [In Russ].

16. Vacca J. R. Computer and Information Security Handbook. Elsevier, 2017, 1280 p.

17. Vostrikov A. V., Prokofeva E. N., Goncharenko S. N., Gribanov I. V. Analytical modeling for the modern mining industry. Eurasian Mining. 2019, no. 2, pp. 30—35. DOI: 10.17580/ em.2019.02.07.

18. Yeralin Z. M., Goncharenko S. N. Models for solving key problems of strategic development of uranium mines. MIAB. Mining Inf. Anal. Bull. 2019, no. 4, pp. 199–208. [In Russ]. DOI: 10.25018/0236-1493-2019-04-0-199-208.

19. Miloslavskaya N. G., Tolstoy A. I. Visualization of information security management processes. Nauchnaya vizualizatsiya. 2017, vol. 9, no. 5, pp. 117—136. [In Russ].

20. Revenkov P. V., Berdyugin A. A. Expansion of the operational risk profile in banks with an increase in DDoS threats. Voprosy kiberbezopasnosti. 2017, no. 3(21), pp. 16—23. [In Russ].

21. Trofimov V. B. Prototype approach to design of the automated expert systems with multistructural recognition of complex images. Automation and Remote Control. 2016, vol. 77, no. 6, pp. 1115–1121.

22. Peshkova M. KH., Popov S. M., Stoyanova I. A. Methodical basis for assessment of local market capacity for manufacture of products from mining waste. Gornyi Zhurnal. 2017, no. 4, pp. 39—43. [In Russ].

23. Goncharova A. R., Stoyanova I. A. Characteristics of geoecological local conditions for the construction of communications to ensure the transit of products from extractive industries. MIAB. Mining Inf. Anal. Bull. 2020, no. 6-1, pp. 163—175. [In Russ]. DOI: 10.25018/023614932020-61-0-163-175.

Our partners

Подписка на рассылку

Раз в месяц Вы будете получать информацию о новом номере журнала, новых книгах издательства, а также о конференциях, форумах и других профессиональных мероприятиях.