DESTRUCTURIZATION OF CRITICAL INFORMATION INFRASTRUCTURE FOR ASSESSING THE INFRASTRUCTURAL STABILITY OF THE SUBJECT OF CRITICAL INFORMATION INFRASTRUCTURE UNDER DESTRUCTIVE INFLUENCES
Abstract
With the adoption of Federal Law No. 187 "On the Security of Critical Information Infrastructure",
the implementation of which in practice is not possible without a comprehensive assessment
of information security (IS) of subjects of critical information infrastructure (SСII).However, the currently existing regulatory documents of regulators do not consider SСII from the
point of view of a systematic approach, the infrastructural component of SСII is not taken into
account when building an information protection system. At the same time, the assessment of IS
SСII without taking into account the effect on the state and behavior of the system of inter-object
and intersubject connections arising in the system leads to an error in the assessment, since the
system itself, under certain conditions, can generate infrastructural destructivism. Thus, the error
in assessing the ISSII arises due to the failure to take into account the indicator of the SСII's inability
to implement its functionality in full under the influence of infrastructure risks, i.e. infrastructural
destructivism. From the point of view of the theory of sustainability, this indicator can
be correlated with the category of “infrastructure sustainability of SСII”. The proposed by the
authors of the study, the model for assessing the infrastructure sustainability (IS) of SСII is presented
1) using the apparatus of cognitive modeling, 2) using the apparatus of the theory of reliability
of technical systems. Within the framework of cognitive modeling, the power of concepts is
set by experts. In the presented study, for this assessment, it is proposed to use the apparatus of
logical-probabilistic modeling, through a clear structuring of the system - SСII. Thus, the assessment
of the infrastructure stability of the SCII is characterized by the possibility of assessing the
probability of no-failure operation of the facilities of the CII and preventing failures in the functioning
of the CII spheres, which guarantees stability and the required level of information security.
In this case, the problem of assessing IS in this case acquires a key character in the comprehensive
assessment of IS SСII.
References
zakon ot 26 iyulya 2017g. N 187-FZ (s izm. i dop.) [On the security of the critical Information Infrastructure
of the Russian Federation: Federal Law No. 187-FZ of July 26, 2017 (ed. and add.)].
Available at: http://www.consultant.ru/document/cons_doc_LAW_220885/.
2. Robertc F.S. Diskretnye matematicheskie modeli s prilozheniyami k sotsial'nym, biologicheskim i
ekologicheskim zadacham [Discrete mathematical models with applications to social, biological and
environmental problems]: transl. from engl. Moscow: Nauka, 1986, 496 p.
3. Kosko V. Fuzzy Cognitive Maps, International Journal of Man-Machine Studies, 1986,
Vol. 24, pp. 65-75.
4. Azhmuhamedov I.M. Informacionnaya bezopasnost'. Sistemnyj analiz i nechetkoe kognitivnoe
modelirovanie [Information security. System analysis and fuzzy cognitive modeling.]. Moscow:
Izd-vo LAP, 2012, 385 p.
5. Azhmuhamedov I.M. Analiz i upravlenie kompleksnoj bezopasnost'yu na osnove kognitivnogo
modelirovaniya [Analysis and management of complex security based on cognitive modeling],
Upravlenie bol'shimi sistemami [Managing large systems], 2010, Issue 29, pp. 5-15.
6. Azhmukhamedov I.M. Dinamicheskaya nechѐtkaya kognitivnaya model' vliyaniya ugroz na
informatsionnuyu bezopasnost' sistemy [Dynamic fuzzy cognitive model of the impact of
threats on the information security of the system], Bezopasnost' informatsionnykh tekhnologiy
[Information technology security], 2010, No. 2, pp. 8-72.
7. Sadovnikova N.P., Zhidkova N.P. Vybor strategiy territorial'nogo razvitiya na osnove
kognitivnogo analiza i stsenarnogo modelirovaniya [Selection of territorial development strategies
based on cognitive analysis and scenario modeling], Internet-vestnik VolgGASU : seriya
Stroitel'naya informatika [VolgGASU Internet Bulletin : Construction Informatics series],
2012, No. 7 (21). Available at: http://vestnik.vgasu.ru/attachments/SadovnikovaZhidkova-
2012_7(21).pdf.
8. Sadovnikova N.P., Kikteev A.S. Primenenie agentnogo modelirovaniya dlya postroeniya
stsenariev strategicheskogo razvitiya [Application of agent-based modeling to build strategic
development scenarios], Izvestiya VolgGTU. Seriya «Aktual'nye problemy upravleniya,
vychislitel'noy tekhniki i informatiki v tekhnicheskikh sistemakh» [Izvestiya VolgSTU. The series
"Actual problems of management, computer engineering and computer science in technical
systems"], 2012, No. 4 (91), pp. 144-147.
9. Drobotov A.S., Sadovnikova N.P. Primenenie metoda imitatsionnogo modelirovaniya dlya
analiza riskov innovatsionnogo proekta [Application of the simulation modeling method for
risk analysis of an innovative projec], Sistemnye problemy nadѐzhnosti, kachestva, inf.-
telekommunikats. i elektron. tekhnologiy v upravl. innovatsionnymi proektami: (Innovatika-
2008): Mater. mezhdunar. konf. i ros. nauch. shkoly. Nauch. tsentr «ASONIKA» [i dr.] [Systemic
problems of reliability, quality, information and telecommunication and electronic technologies
in the management of innovative projects: (Innovatika-2008): Proceedings of the international
conference and the Russian scientific school. Scientific Center "ASONIKA" [et
al.]. Moscow, 2008, Part 2, pp. 20-22.
10. Maksimova E.A. Kognitivnoe modelirovanie destruktivnykh zloumyshlennykh vozdeystviy na
ob"ektakh kriticheskoy informatsionnoy infrastruktury [Cognitive modeling of destructive malicious
influences on objects of critical information infrastructure], Tr. uchebnykh zavedeniy
svyazi [The works of the schools of communication], 2020, Vol. 6, No. 4, pp. 91-103.
DOI:10.31854/1813-324X-2020-6-4-91-103.
11. Maksimova E.A. Otsenka informatsionnoy bezopasnosti sub"ekta kriticheskoy
informatsionnoy infrastruktury pri destruktivnykh vozdeystviyakh: monografiya [Assessment
of information security of a subject of critical information infrastructure under destructive influences:
monograph]: Feder. gos. avt. obrazovat. uchrezhdenie vyssh. obrazovaniya
«Volgogr. gos. un-t»». Volgograd: Izd-vo VolGU, 2020, 95 p.
12. Maksimova E.A. “Smart decisions” in development of a model for protecting information of a
subject of critical information infrastructure, Lecture Notes in Networks and Systems, 2021,
Vol. 155, pp. 1213-1221.
13. Ob utverzhdenii Pravil kategorirovaniya ob"ektov kriticheskoy informatsionnoy infrastruktury
Rossiyskoy Federatsii, a takzhe Perechnya pokazateley kriteriev znachimosti ob"ektov
kriticheskoy informatsionnoy infrastruktury Rossiyskoy Federatsii i ikh znacheniy:Postanovlenie Pravitel'stva RF ot 8 fevralya 2018 g. № 127 (ne vstupil v silu) [On approval of
the Rules for Categorizing Objects of Critical Information Infrastructure of the Russian Federation,
as well as the List of Indicators of Criteria for the Significance of Objects of Critical Information
Infrastructure of the Russian Federation and their Values: Decree of the Government
of the Russian Federation of February 8, 2018 No. 127 (not entered into force)]. Available at:
https://www.garant.ru/products/ipo/prime/doc/71776120/.
14. Kosolapov O.V., Ignat'eva M.N. Ustoychivost' kak odna iz osnovnykh kharakteristik sistemy
[Stability as one of the main characteristics of the system], Izvestiya Ural'skogo
gosudarstvennogo gornogo universiteta [Izvestiya Ural State Mining University], 2013, No. 4,
pp. 77-81. Available at: https://e.lanbook.com/journal/issue/290438. Zagl. s ekrana.
15. «Ustoychivyy -…» ["Steady -..."]. Available at: https:// dic.academic.ru/dic.nsf/ushakov/
1071254.
16. Kazakov L.K. Landshaftovedenie [Landscape studies]. Moscow: Izd. tsentr «Akademiya»,
2011, 336 p.
17. Klimov S.M., Polikarpov S.V., Ryzhov B.S., Tikhonov R.I., Shpyrnya I.V. Metodika
obespecheniya ustoychivosti funktsionirovaniya kriticheskoy informatsionnoy infrastruktury v
usloviyakh informatsionnykh vozdeystviy [Methodology for ensuring the stability of the functioning
of critical information infrastructure in the conditions of information impacts], Voprosy
kiberbezopasnosti [Cybersecurity issues], 2019, No. 6 (34), pp. 37-48.
18. Gadzhiev B.R., Gibina E.YU., Progulova T.B., Shchetinina D.P. Topologiya i ustoychivost'
lokal'no-mirovykh setey [Topology and stability of local-world networks], Programmnye
produkty i sistemy [Software products and systems], 2009, No. 4, pp. 51-54. Available at:
https:// topologiya-i-ustoychivost-lokalno-mirovyh-setey.pdf.
19. Balashova T.I. obespechenie otkazoustoychivosti seti povysheniem nadezhnosti ee topologii
[Ensuring network fault tolerance by increasing the reliability of its topology], Sovremennye
problemy nauki i obrazovaniya [Modern problems of science and education], 2014, No. 6.
Available at: http://science-education.ru/ru/article/view?id=16846.
20. Viktorova V.S., Stepanyants A.S. Mnogourovnevoe modelirovanie nadezhnosti sistem [Multilevel
modeling of system reliability], Datchiki i sistemy [Sensors and systems], 2014, No. 6
(181), pp. 33-37.
21. Gromov Yu.yu., Ivanova O.G., Mosyagina N.G., Nabatov K.A. Nadezhnost' informatsionnykh
system [Reliability of information systems]. Tambov: Izd-vo GOU VPO TGTU, 2010, 5 p.