- Cybersecurity and Information Systems
- Advanced Data Processing Techniques
- Information Systems and Technology Applications
- Network Security and Intrusion Detection
- Information and Cyber Security
- Banking, Crisis Management, COVID-19 Impact
- Risk and Safety Analysis
- Economic Issues in Ukraine
- Smart Grid Security and Resilience
- Military Technology and Strategies
- Air Traffic Management and Optimization
- Technology Assessment and Management
- Advanced Decision-Making Techniques
- Cloud Data Security Solutions
- Coding theory and cryptography
- Quantum Computing Algorithms and Architecture
- Advanced Control and Stabilization in Aerospace Systems
- Systems Engineering Methodologies and Applications
- Engineering Diagnostics and Reliability
- Aerospace Engineering and Applications
- Big Data and Business Intelligence
- Military Strategy and Technology
- Software System Performance and Reliability
- Transportation Systems and Safety
- Safety Systems Engineering in Autonomy
National Aviation University
2016-2023
State critical systems and resources can be damaged. By this means most of world leader states have attended to methods identifying, systematization security assurance for infrastructure objects. Loss or operational breakdown these objects cause significant irreparably damage national the state. However, as shown by analysis domestic normative base, today in Ukraine an exhaustive list information state is not yet formed there no clear mechanism defining. Given above, paper proposes a unified...
In this paper the method of network-centric monitoring cyberincidents was developed, which is based on concept and implements in 8 stages.This allows to determine most important objects for protection, predict category cyberincidents, will arise as a result cyberattack, their level criticality.
Today world leading states began to focus on methods and tools of identifying, systematizing securing critical infrastructure objects. The loss or failure normal functioning these objects will lead significant even irreparable negative consequences for the national security. For application adequate protection methods, it is important determine level importance (criticality) state information in a certain sphere. From this viewpoint, method determining civil aviation was developed paper....
Modern information infrastructure consists of a large number systems and components that require constant monitoring control. To identify, analyze eliminate possible cyber threats, it is recommended to use single common solution - the so-called SIEM systems. technology collects event log data, detects unusual activity through real-time analysis, identifies generates alerts, suggests appropriate action scenarios. Today, quality has grown significantly, latest technologies artificial...
In today's world, it's almost impossible to find a sphere of human life in which information technologies would not be used. On the one hand, it simplifies - virtually everyone carries mini-computer his pocket and allows perform many operations, that took lot time, minutes. addition, IT has simplified promptly developed areas such as medicine, banking, document circulation, military, other infrastructures state. Nevertheless, even today, privacy remains major problem transactions. One most...
Стаття присвячена розробці методу визначення пріоритетів ІТ-інцидентів на об'єктах критичної інформаційної інфраструктури держави. У дослідженні розглянуто основні підходи до класифікації та управління ІТ-інцидентами, такі як ITIL, COBIT, ISO/IEC 20000 NIST Cybersecurity Framework. Запропонований метод базується використанні попарних порівнянь (AHP) для оцінки пріоритизації загроз, враховуючи їхній вплив різні рівні функціонування критичних об'єктів. детально описує етапи розробки методу,...
Critical information infrastructure protection is a complex process, which requires effective tools for entities' identification, criticality estimation, threat and vulnerability assessment, as well security ensuring against threats determining the cybersecurity level. The conducted analysis has shown that today there no complex, multifunctional method helps to evaluate level of critical entity or certain industry state. From this viewpoint, in paper advantages disadvantages known approaches...
Modern critical infrastructure with diverse systems requires a security information and event management (SIEM) system for unified monitoring against cyber threats. This collects log data, performs real-time analysis, flags threats, triggers alerts, advises response strategies. Enhanced by AI, Internet of Things, cloud technologies, modern SIEM have significantly improved optimized threat detection. research examines the functionality, basic operation, comparative capabilities current...
The subject of the article is methods and models for assessing criticality industry information telecommunications systems (ITS). purpose this to analyze existing assessment use its results propose a functional model calculating quantitative criterion security ITS. Results. Based on known method hierarchy analysis, ITS proposed, which, through processing expert assessments, allows obtain indicator security. This makes it possible simplify procedure selecting experts, avoid specifics data, as...
In recent times all over the world number of different emergency situations was increased. Every day mass media informs about natural and man-caused disasters, weapon conflicts, acts terrorism, global crimes, piracy that were committed by both crime organizations single offenders. Increasingly frequently as a result these events many people fall victim also state critical importance systems resources can be damaged. According that, civil aviation industry requires special attention, just...
Global trends to increase and improve the quality of cyber attacks have led actualization protection information telecommunications systems (ITS), in particular, sectoral, which are critical for functioning society, socio-economic development ensuring component national security. Taking into account needs security need introduce a systematic approach solving problems infrastructure protection, at level, creation such is one priorities reforming defense sector Ukraine. Thus, there develop...
Національний авіаційний
The rapid development of information and communication technologies has increased the vulnerabilities various networks, systems objects as well made it much more difficult to ensure their reliable protection security. All these factors have led fact that world's leading countries begun pay considerable attention cybersecurity critical infrastructure protection. However, types with restricted access (in particular, confidential information) at remains unexplored. With this in mind, paper...