Problem of Developing an Early-Warning Cybersecurity System for Critically Important Governmental Information Assets

The article considers possible solutions of to the relatively new scientific-technical problem of developing an earlywarning cybersecurity system for critically important governmental information assets. The solutions proposed are based on the results of exploratory studies conducted by the authors in the areas of Big data acquisition, cognitive information technologies (cogno-technologies), and “computational cognitivism,” involving a number of existing models and methods. The results obtained permitted the design of an early-warning cybersecurity system. Keywords—Сyberspace; critically important infrastructure; information confrontation; hybrid wars; cyberattacks; information security; cybersecurity system; early-warning; Big Data; Big Data Analytics; cogno-technologies; computational cognitivism; scenarios of an early-warning; synthesize scenarios.

[1]  Petr V. Chetyrbok,et al.  About readiness for digital economy , 2017, 2017 IEEE II International Conference on Control in Technical Systems (CTS).

[2]  Sergey Senderov,et al.  Cyber Danger as One of the Strategic Threats to Russia's Energy Security , 2016 .

[3]  Alexey Shcherbakov,et al.  Mapping the Application Security Terrain , 2014 .

[4]  Valentin Tsirlov,et al.  Procedure for substantiated development of measures to design secure software for automated process control systems , 2016, 2016 International Siberian Conference on Control and Communications (SIBCON).

[5]  Valentin Tsirlov,et al.  Social Media in Identifying Threats to Ensure Safe Life in a Modern City , 2016 .

[6]  Louis Hébert,et al.  An Introduction to Applied Semiotics , 2019 .

[7]  Aleksandr Kozachok,et al.  First order logic for program code functional requirements description , 2017 .

[8]  E. G. Vorobiev,et al.  Organization of the entrusted calculations in crucial objects of informatization under uncertainty , 2017, 2017 XX IEEE International Conference on Soft Computing and Measurements (SCM).

[9]  Nicola Guarino Services as Activities: Towards a Unified Definition for (Public) Services , 2017, 2017 IEEE 21st International Enterprise Distributed Object Computing Workshop (EDOCW).

[10]  G. S. Pospelov Artificial Intelligence as a Basis for a New Information Technology , 1983 .

[11]  E. G. Vorobiev,et al.  Analysis of computer security incidents using fuzzy logic , 2017, 2017 XX IEEE International Conference on Soft Computing and Measurements (SCM).

[12]  E. V. Grechishnikov,et al.  USE OF NEURAL NETWORKS TO ENSURE STABILITY OF COMMUNICATION NETWORKS IN CONDITIONS OF EXTERNAL IMPACTS , 2011 .

[13]  Nicola Guarino,et al.  An Ontological Analysis of Value Propositions , 2017, 2017 IEEE 21st International Enterprise Distributed Object Computing Conference (EDOC).

[14]  Petr V. Chetyrbok,et al.  The IIoT/IoT device control model based on narrow-band IoT (NB-IoT) , 2018, 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus).