<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Assessment and Information Security Provision of the Decision Support Process in Technogenic Object Management Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Viktor Perederyi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Eugene Borchik</string-name>
          <email>borchikeu@gmail.com</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Waldemar Wójcik</string-name>
          <email>waldemar.wojcik@pollub.pl</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>аnd Oksana Ohnieva</string-name>
          <email>oksana_ognieva@meta.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Kherson National Technical University</institution>
          ,
          <addr-line>Beryslavske shose 24, Kherson, 73008</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Lublin University of Technology</institution>
          ,
          <addr-line>Nadbystrzycka 38d, Lublin, 20-618</addr-line>
          ,
          <country country="PL">Poland</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Mykolaiv National Agrarian University</institution>
          ,
          <addr-line>Heorhiia Honhadze street 9, Mykolaiv, 54000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The paper considers the information technology of assessment and provision of complex information security of decision-making process in human-machine management systems for technogenic objects, which complements the theory and methods of solving reliability and survivability problems of multilevel systems, based on the interaction of the set of their workability indicators, human factor and information security indicators in the decision-making process to ensure the efficiency of critical object management. To assess the impact of a set of indicators of non-factors of information security, external, production, and human factors on the decision-making process of decision-maker in the management of critical objects, a fuzzy Bayesian network was built, which allowed, based on expert knowledge, to assess the probability of the critical object's information security states. To practically substantiate the obtained results, an experiment was carried out, the results of which confirmed the practical value of the information technology, which can be used to assess and ensure comprehensive information security of the decision support process in man-machine management systems for technogenic objects.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Complex multilevel systems</kwd>
        <kwd>complex organizational and technical objects</kwd>
        <kwd>decision-maker</kwd>
        <kwd>functional stability</kwd>
        <kwd>human factor</kwd>
        <kwd>relevant decisions</kwd>
        <kwd>fuzzy risk in decision-making</kwd>
        <kwd>Bayesian network</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Currently, when creating and operating complex multilevel systems (CMS) for the management
of complex technogenic objects (CTO), the main task is to improve efficiency, which is associated
with increasing technical and software complexity. In this regard, the requirements for both the
reliability of the components that make up the system and the reliability and performance of the
decision-maker (DM) are being raised.</p>
      <p>Although the decision-making process is significantly influenced by the human factor, the
efficiency and quality of management also depend on the speed and timeliness of receiving the
necessary and reliable information about objects and processes by operational and control
personnel (OCP) responsible for decision-making in emergencies.</p>
      <p>The safe operation of man-machine systems (MMS) depends significantly on information and
communication technologies and their cyberinfrastructure. At present, traditional security
measures are mainly used, such as authentication, access control, authorization, data encryption,
public key infrastructure, firewalls, intrusion detection systems, network security protocols, etc.
However, recent cyber attacks on critical systems around the world have shown a significant gap
between the ability to protect and restore traditional systems and new security requirements,
especially in the context of the intellectualization of the technologies of MMS for the management
of critical objects.</p>
      <p>Moreover, insufficient attention has been paid to the issues of assessing and providing
comprehensive information security for the process of relevant decision making support (RDM),
in distributed MMS for management of technogenic objects, associated with the occurrence of
hazardous situations under uncertainty and the impact of non-factors on the process of managerial
decision-making and implementing due to the imperfection of the mathematical, statistical and
intellectual tools used to solve this problem.</p>
      <p>Thus, an urgent scientific problem is to improve the functional security of MMS for the
management of technogenic objects through the development and implementation of methods
and technologies for monitoring, assessment, and provision of comprehensive information
security of the RDM support process.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Literature review</title>
      <p>The solution to this problem is presented in the results of the following scientific studies.</p>
      <p>
        Cybersecurity Risk Assessment [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] states that cybersecurity in the management of a
technogenic object is an important issue that can lead to serious hazards in the event of an accident.
To assess the cybersecurity risks of nuclear plant control systems, the paper proposes a
probabilistic method using the Bayesian network (BN) model and event tree.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] the methods of risk assessment for SCADA systems are considered and analyzed in
detail. The essence of methods is described, stages of risk management are considered, the scheme
of classification of methods for the estimation of risks of cybersecurity is proposed. In [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], a wide
range of threats that lead to cybersecurity risk was studied, a database of actual losses in the event
of these threats was created, and a loss analysis was performed using statistical and actuarial
mathematics methods. Improving the model of cybersecurity risk assessment using a fuzzy logic
apparatus that takes into account four risk factors: vulnerability, threat, probability, and impact
was proposed in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref5 ref6 ref7">5-7</xref>
        ] methods are proposed that enable determining the total risk of cybersecurity of critical
infrastructure, the total damage due to multiple cyber threats, the total amount of damage due to
cyber threats over a period of time, the probability of maximum losses as a result actions of cyber
threats. It is also noted that the process of identifying and assessing the risk of irrelevant decisions
under the influence of cyber threats is the basis and grounds for research in the field of analysis
and improvement of existing and invention of new methods of risk assessment, its accuracy, and
applying mathematical operations to risks.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], the human factor was noted to play an important role in modern complex dynamical
systems (CDS), in accidents and catastrophes. It is noted that little attention is paid to the problems
of risks associated with the informational and cognitive aspects of human-machine interaction. It
is recommended that the design and operation of CDS take into account the risks of irrelevant
decision-making arising in unpredictable conditions, as well as special requirements for the human
psychophysiological state and his or her admission to perform particularly responsible work. It is
also noted that the informational and cognitive aspects of human factor engineering play a key
role in the safety, reliability, and efficiency of CDS in the management of critical objects.
      </p>
      <p>Therewith, the analysis of the research subject area showed the lack of effective information
technology capable of providing comprehensive information security in the process of supporting
RDM in the distributed MMS for the management of technogenic objects.</p>
      <p>In this regard, to develop the theory of assessment and provision of the effective management
of critical objects, we propose the information technology to assess and ensure comprehensive
information security of the process of supporting RDM in the MMS for the management of
technogenic objects.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Problem statement</title>
      <p>A review, systematization, and generalization of publications on the analysis, assessment, and
management of critical MMS show that in addition to system parameters, the impact of non-factors
of the external and production environment on the human factor, management efficiency depends
on the impact of information indicators security for the RDM support process during the operation
of the system.</p>
      <p>
        Based on the results of the analysis of the literature sources, it is noted that in the RDM support
process, the following groups of factors, shown in the information model below, have the most
significant impact on the set of information security indicators (Figure 1) [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
Provision of the information security of the RDM support process is characterized by the following
important non-factors.
      </p>
      <p>
        12 - assignment of access rights (privileged) - the process of determining access rights to the
DB or DBMS. Privilege is based on a hierarchical structure; it has a flexible scenario that allows
maximizing the database security; N - the impact of user actions. Unintentional actions lead to
changes in parameters and algorithms of system functioning. Intentional actions are aimed at
obtaining unauthorized access to information or violation of the system operation; 7. Hardware
failures are equipment failures, physical impacts on the system, and equipment integrity. Having
different degrees of protection from external impacts, complete data protection or operability of
all system is not guaranteed; X - state of the technological process; Z - the influence of the external
environment on the DM; Y - indicators of psychological and mental factors of DM; E - software
failures; V - consistency of data in the database and the relationships between tables; W - data
availability, correct work with the database; 3 - confidentiality of data in the system and the
database, 1 - the integrity of the data stored in the database; T - the impact of the actions of
administrators, provides an assessment of the negative impact of users with administrator rights
on the information in the database and system; 11 - data security, provides an assessment of the
security of the database from hacking and data substitution; 5 - reference value - information on
the quality of the relational database, which consists in the absence in any respect of foreign keys
that refer to non-existent tuples; D - risk assessment of making irrelevant decisions; alternatives
(A) - a sample of relevant alternatives to DMS from KB; P - the result of the search for relevant
solutions of the RDM, taking into account the relevant impact factors; R - state of information
security for making relevant decisions by DM.
Since the risk of irrelevant decision making is determined by the simultaneous impact of a set of
information security non-factors, one of the stages of its assessment is to identify causal
relationships and dependencies between these factors, which will make it possible to assess the
change in the probability of risk in the event of a change in the probability of the occurrence of
some events. The traditionally used probabilistic approach to uncertainty determination in
Bayesian models is not always applicable due to the lack of statistical information about the state
of a complex system. To solve this problem, fuzziness was introduced into the BN in the following
way [
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ]. The unconditional and conditional probabilities at the BN's vertices are represented
by fuzzy numbers obtained as a result of expert evaluation of a vertex's ability to take a particular
value, and the common operations of BN-based calculation are replaced by extended operations
on fuzzy numbers [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Herewith, the introduction of fuzziness will make it possible to analyze
poorly formalized information.
      </p>
      <p>For the assessment of complex information security of the DMS process in the MMS for the
management of technogenic objects, the following BN was built (Figure 2).</p>
    </sec>
    <sec id="sec-4">
      <title>4. Materials and methods</title>
      <p>It is assumed that all the vertices of the proposed Bayesian network (Figure 3) take only two values.
vertex N takes values n1 - "low", n2 - "high";
vertex T takes values t1 - "low", t2 - "high";
vertex E takes values e1 - "does not occur", e2 - "occur";
vertex X takes values x1 - "workable", x2 - "unworkable";
vertex Y takes values y1 - "norm", y2 - "non-norm";
vertex Z takes values z1 - "norm", z2 - "non-norm";
vertex D takes values d1 - "low", d2 - "high";
vertex A takes values a1 - "sufficient", a2 - "insufficient";
vertex V takes values v1 - "consistency", v2 - "inconsistency";
vertex W takes values w1 - "sufficient", w2 - "insufficient";
vertex Q takes values q1 -"reliable ", q2 - " unreliable ";
vertex R takes values r1 -"protected", r2 - "unprotected"</p>
      <p>
        Since the values of the unconditional probabilities of the root vertices N, T, E and the
conditional probabilities of the remaining vertices are established on the basis of the results of the
expert survey, they are determined vaguely, i.e. are fuzzy sets. Therefore, fuzziness is introduced
into the Bayesian network (1) as follows [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <p>All unconditional and conditional probabilities of the considered Bayesian network are given
in the form of fuzzy trapezoidal numbers L(l1, l2, l3, l4), having a distribution function set by the
formula:</p>
      <p>0,  &lt;  1 
⎧⎪  −  1
⎪</p>
      <p>&gt;  4,
,  1 ≤  ≤  2,
 2 −  1
  ( ) = ⎨ 1,  2 ≤  ≤  3,
⎪  4 − 
⎪ ,  3 &lt;  ≤  4,
⎩  4 −  3
where: l1≤ l2≤l3≤l4– certain real numbers.</p>
      <p>~</p>
      <p>
        A fuzzy trapezoidal number L (l1, l2 , l3, l4 ) is also represented [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] as a tuple of four numbers:
~
L (a, b,α ,β ) , where a=l2 and b=l3 - respectively, the lower and upper modal values of the number
~
L~ ; α = l2 − l1 and β = l4 − l3 – left and right fuzziness coefficients L .
      </p>
      <p>
        Application of the extension principle to arithmetic operations and trapezoidal fuzzy numbers
~
[
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] leads to the following rules for adding and subtracting fuzzy numbers L (l1, l2 , l3, l4 ) and
~ ~ ~
M (m1, m2 , m3 , m4 ) [ L (a1, b1,α 1,β1 ) и M (a2 ,b2 ,α 2 ,β 2 ) ]:
      </p>
      <p>L(l1,l2 ,l3,l4 ) ⊕ M (m1, m2 , m3, m4 )</p>
      <p>=m1,l2 S(l1 + + m2 ,l3 + m3,l4 + m4 ),
L(a1,b1,α1,β1) ⊗ M (a1,b1,α1,β1)</p>
      <p>=H (a1a2 ,b1b2 , a1α 2 + a2α1,b1β 2 + b2β1)</p>
      <p>It is assumed that the fuzzy numbers are positive, i.e. li≥0, mi≥0, (i = 1, n) ; signs ⊕ and ⊗
denote the operations of addition and multiplication of fuzzy numbers.
~ ~</p>
      <p>
        Fuzzy probability under (Ω,ε ) is understood [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] as a function Pf :ε → L , that satisfies
the following conditions:
      </p>
      <p>~ ~ ~
1. 0  Pf ( A)  1, ∀A ∈ε
are
inconsistent
values
from
ε ( A ∩ B = ∅) ,
then
if A and B are values from ε , and ×~ is a certain fuzzy arithmetic operation, then:
~ ~
0, if Pf ( A) ×~ P~f (B) ≤ 0
~  ~ ~ ~ ~
Pf ( A) ×~ P~f (B) = Pf ( A) ×~ P~f (B), if 0 ≤ Pf ( A) ×~ P~f (B) ≤ 1
~ ~ ~
1, if Pf ( A) ×~ P~f (B) ≥ 1</p>
      <p>Here Ω – is the universal set defining the variable A, ε ; is a set of inconsistent numbers A;
~ ~ ~ ~
L – a set of fuzzy numbers; 0 and 1 – fuzzy numbers 0 and 1; (Ω,ε , Pf ) – fuzzy probability
space.</p>
      <p>Condition 4) imposes restrictions on the result of fuzzy operations with values of fuzzy
probabilities so that condition 1) is guaranteed to be fulfilled.</p>
      <p>To compare fuzzy numbers in condition 4), the following approach is used. It is considered,
that of two fuzzy numbers, the greater is the one, the defuzzification value of which is greater. For
fuzzy numbers ~0 and ~1 , defuzzification values are taken equal to crisp numbers 0 and 1,
respectively.</p>
      <p>
        For the rest of the fuzzy numbers, the center of gravity method is chosen as the defuzzification
~
method, which for trapezoidal fuzzy numbers L (l1,l2 ,l3 ,l4 ) takes the following form [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]:
n1
n2
N
n1
n2
T
t1
t2
      </p>
      <p>= ∫∫1414   (( ))   = 13 ⋅ − 1 −  2 +  3 +  4 ~
where L – defuzzification result, "exact" value of a fuzzy number L .</p>
      <p>− 12 −  22 +  32 +  42 −  1 2 +  3 4</p>
      <p>Pf ( X = x1 | N )</p>
      <p>(0.00; 0.05; 0.15; 0.2)
The procedure for calculating the value of probabilities of a fuzzy Bayesian network includes the
following stages. At the first stage, fuzzy unconditional probabilities of vertices X, Y, Z, D, A that
have one parent vertex are calculated as follows:</p>
      <p>Pf ( X
=xi ) =⊕ Pf ( N , X</p>
      <p>N</p>
      <p>2
=xi ) =⊕ Pf ( N =nk , X
k=1</p>
      <p>=xi ) =
2
=⊕ Pf ( N
k=1
Pf (Y</p>
      <p>2
=yi ) =⊕</p>
      <p>k=1
=nk ) ⊗ Pf ( X
=xi | N</p>
      <p>=nk ),
Pf ( N
=nk ) ⊗ Pf (Y
=yi | N
=nk ) ,
Pf (Z
=zi )</p>
      <p>2
=⊕ Pf ( N
k=1
=n ) ⊗ Pf (Z
k
=zi | N
=nk ) ,
(2)
(2)
Pf (D
=di )</p>
      <p>2
=⊕ Pf (T
k=1
=tk ) ⊗ Pf (D
=di | T</p>
      <p>=tk ) ,
2
Pf ( A =ai ) =⊕ Pf (T =tk ) ⊗ Pf ( A =ai | T =tk ) , (i =1, 2 ).</p>
      <p>k=1</p>
      <p>At the second stage, fuzzy unconditional probabilities of vertices Q, V, W having three parent
vertices are calculated as follows:</p>
      <p>X,T,E
P (Q =q ) =  P (X,T,E,Q =q ) =
 </p>
      <p>⊕
f i f i
   
=P (X =x ,T =t ,E =e ,Q =q )⊕ P (X =x ,T =t ,E =e ,Q =q )⊕</p>
      <p>f 1 1 1 i f 1 1 2 i
    
⊕P (X =x ,T =t ,E =e ,Q =q )⊕ P (X =x ,T =t ,E =e ,Q =q )⊕</p>
      <p>f 1 2 1 i f 1 2 2 i
    
⊕P (X =x ,T =t ,E =e ,Q =q )⊕ P (X =x ,T =t ,E =e ,Q =q )⊕</p>
      <p>f 2 1 1 i f 2 1 2 i
   
⊕P (X =x ,T =t ,E =e ,Q =q )⊕ P (X =x ,T =t ,E =e ,Q =q ) =
f 2 2 1 i f 2 2 2 i
       
= P (x )⊗ P (t )⊗ P (e )⊗ P (q | x ,t ,e )⊕</p>
      <p>f 1 f 1 f 1 f i 1 1 1
        
⊕P (x )⊗ P (t )⊗ P (e )⊗ P (q | x ,t ,e )⊕</p>
      <p>f 1 f 1 f 2 f i 1 1 2
        
⊕P (x ) ⊗ P (t ) ⊗ P (e ) ⊗ P (q | x ,t ,e ) ⊕</p>
      <p>f 1 f 2 f 1 f i 1 2 1
        
⊕P (x )⊗ P (t ) ⊗ P (e )⊗ P (q | x ,t ,e )⊕</p>
      <p>f 1 f 2 f 2 f i 1 2 2
        
⊕P (x )⊗ P (t )⊗ P (e )⊗ P (q | x ,t ,e )⊕</p>
      <p>f 2 f 1 f 1 f i 2 1 1
        
⊕P (x )⊗ P (t )⊗ P (e )⊗ P (q | x ,t ,e )⊕</p>
      <p>f 2 f 1 f 2 f i 2 1 2
        
⊕P (x )⊗ P (t )⊗ P (e )⊗ P (q | x ,t ,e )⊕</p>
      <p>f 2 f 2 f 1 f i 2 2 1
       
⊕P (x )⊗ P (t ) ⊗ P (e )⊗ P (q | x ,t ,e ) ,
f 2 f 2 f 2 f i 2 2 2</p>
      <p>D,E,Q
P (V =v ) =  P (D,E,Q,V =v ) =
 </p>
      <p>⊕
f i f i
(3)
   
=P (D =d ,E =e ,Q =q ,V =v ) ⊕ P (D =d ,E =e ,Q =q ,V =v ) ⊕</p>
      <p>f 1 1 1 i f 1 1 2 i
    
⊕P (D =d ,E =e ,Q =q ,V =v ) ⊕ P (D =d ,E =e ,Q =q ,V =v ) ⊕</p>
      <p>f 2 1 1 i f 2 1 2 i
   
⊕P (D = d ,E =e ,Q = q ,V =v ) ⊕ P (D = d ,E =e ,Q = q ,V =v ) =
f 2 2 1 i f 2 2 2 i</p>
      <p>       
==P(d )⊗ P (e )⊗ P (q )⊗ P (v | d ,e ,q )⊕</p>
      <p>f 1 f 1 f 1 f i 1 1 1
        
⊕P (d ) ⊗ P (e ) ⊗ P (q ) ⊗ P (v | d ,e ,q ) ⊕</p>
      <p>f 1 f 1 f 2 f i 1 1 2
        
⊕P (d ) ⊗ P (e ) ⊗ P (q ) ⊗ P (v | d ,e ,q ) ⊕
f 1 f 2 f 1 f i 1 2 1
(4)
        
⊕P (d ) ⊗ P (e ) ⊗ P (q ) ⊗ P (v | d ,e ,q ) ⊕</p>
      <p>f 1 f 2 f 2 f i 1 2 2
        
⊕P (d ) ⊗ P (e ) ⊗ P (q ) ⊗ P (v | d ,e ,q ) ⊕</p>
      <p>f 2 f 1 f 1 f i 2 1 1
        
⊕P (d ) ⊗ P (e ) ⊗ P (q ) ⊗ P (v | d ,e ,q ) ⊕</p>
      <p>f 2 f 1 f 2 f i 2 1 2
        
⊕P (d ) ⊗ P (e ) ⊗ P (q ) ⊗ P (v | d ,e ,q ) ⊕</p>
      <p>f 2 f 2 f 1 f i 2 2 1
       
⊕P (d ) ⊗ P (e ) ⊗ P (q ) ⊗ P (v | d ,e ,q ) ,</p>
      <p>f 2 f 2 f 2 f i 2 2 2</p>
      <p>At the third stage, fuzzy unconditional probabilities of a leaf vertex R which has two parent
vertices are calculated as follows:
   
= P (V = v ,W = w ,R = r ) ⊕ P (V = v ,W = w ,R = r ) ⊕
f 1 1 i f 1 2 i
(3)
(5)
⊕ Pf (V = v2 ,W = w1, R = ri ) ⊕ Pf (V = v2 ,W = w2 , R = ri ) =</p>
      <p>==Pf(v1) ⊗ Pf (w1) ⊗ Pf (ri | v1, w1) ⊕
⊕ Pf (v1) ⊗ Pf (w2 ) ⊗ Pf (ri | v1, w2 ) ⊕
⊕ Pf (v2 ) ⊗ Pf (w1) ⊗ Pf (ri | v2 , w1) ⊕
⊕ Pf (v2 ) ⊗ Pf (w2 ) ⊗ Pf (ri | v2 , w2 ) ,
(i =1,2 ).</p>
      <p>(6)</p>
    </sec>
    <sec id="sec-5">
      <title>5. Experiment</title>
      <p>For the practical evaluation of the proposed models, the following experiment was carried out.</p>
      <p>Let information security be influenced by the actions of users (factor N) and administrators
(factor T) in the system and database with a low probability value, and software failure (factor E)
is of low probability. The result of estimating the probability of the influence of the above factors
~ ~ ~
is presented in the form of fuzzy probabilities Pf ( N ), Pf (T ), Pf (E) , given by trapezoidal fuzzy
numbers in Table 4. Taking into account the expert estimates of the conditional probabilities of
the mutual influence of the factors presented in Tables 1-3, calculations of fuzzy probability values
of the considered network nodes are performed using formulas (2-6) in the MATLAB
environment. In addition, formula (1) calculates the defuzzification values of fuzzy probabilities
at the nodes of the network. The calculation results are presented in Table 4.</p>
      <p>As it is seen from Table 4, the probability that the information security is in the "protected"
state P(R=r1)=0.97, which, following the regulatory recommendations (P(R=r1)≥0.95), is
considered as a sufficient value.
(0.59; 0.69; 0.91; 1.04)
tca lt
iifzz rseu
u n
feD io
P(N )
0.6
0.4</p>
      <p>P(E)
0.7
0.3
a1
a2
r2
t1
t2
x1
x2
Suppose that information security is influenced by the actions of users (factor N) and the
administrator (factor T) on information in the system and the database with a probability value
much greater than in the first case, and the failure of the software (factor E) is quite probable. The
result of evaluating the probabilities of factors N, T, E by experts is presented in the form of fuzzy
~ ~ ~
probabilities Pf ( N ), Pf (T ), Pf (E) given by trapezoidal fuzzy numbers in Table 5.</p>
      <p>The results of calculating the values of the fuzzy probability of the nodes of the network under
consideration are presented in Table 5. As it is seen from Table 5 the probability that the
information security is in the "protected" state P(R=r1)=0.77. Consequently, in this case, it cannot
be assumed that the information security is in the "protected" state.</p>
      <p>D
Pf (D)</p>
      <p>Q</p>
      <p>Pf (Q)
(0.37; 0.64; 0.75; 1.32)
(0.07; 0.17; 0.28; 0.41)</p>
      <p>W</p>
      <p>Pf (W )
(0.27; 0.66; 0.87; 1.4)</p>
      <p>A
Pf ( A)</p>
      <p>V
Pf (V )</p>
      <p>R</p>
      <p>Pf (R)
(0.49; 0.65; 0.95; 1.14)
(0.02; 0.13; 0.31; 0.45)
(0.09; 0.43; 0.74; 1.11)
(0.12; 0.36; 0.48; 0.63)
(0.33; 0.68; 0.92; 1.34)
(0.04; 0.15; 0.6; 0.39)
(0.27; 0.69; 0.8; 1.29)
(0.04; 0.15; 0.38; 0.49)</p>
      <p>P(Z )</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusions</title>
      <p>The information technology was proposed for the assessment and provision of complex
information security of decision-making support process in man-machine systems for the
management of technogenic objects, which complements the theory and methods of solving the
issues of maintaining reliability and survivability of multilevel systems, based on the interaction
of its workability indicator set, human factor and the indicators of information security in the
decision-making process, to ensure the management efficiency of critical objects.</p>
      <p>To assess the impact of a set of indicators of information security non-factors, as well as
external, production, and human factors on the decision-making process of DM in the management
of critical objects, a fuzzy BN was proposed. A fuzzy BN was proposed to assess the complex
information security of the DMS process in the MMS for managing a technogenic object. An
algorithm for calculating fuzzy probabilities of the nodes of this network was developed. In the
MATLAB environment, a numerical experiment was carried out for various values of the degrees
of influence of factors on the information system.</p>
      <p>Thus, if the impact on the information security of users (factor N) and the administrator (factor
T), as well as software failure (factor E), are unlikely, then information security with a sufficient
degree of probability is in a protected state. If the impact on the information security of users
(factor N) and the administrator (factor T), as well as software failure (factor E), are quite probable,
then information security is in a protected state with an insufficient degree of probability, that is,
it is not protected. To bring it into a protected state, it is necessary to reduce the degree of impact
of negative factors T, N, E on it to a certain level. Thus, the fuzzy model built for analyzing the
impact of non-factors on the degree of information security allows assessing the degree of its
protection, taking into account the causal relationships of these factors.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>J.</given-names>
            <surname>Shin</surname>
          </string-name>
          .,
          <string-name>
            <given-names>H.</given-names>
            <surname>Son</surname>
          </string-name>
          , G.Heo,
          <article-title>Cyber security risk evaluation of a nuclear I&amp;C using BN</article-title>
          and ET, Nuclear Engineering and Technology, No.
          <volume>49</volume>
          (
          <issue>3</issue>
          ),
          <year>2017</year>
          , pp.
          <fpage>517</fpage>
          -
          <lpage>524</lpage>
          . https://doi.org/10.1016/j.net.
          <year>2016</year>
          .
          <volume>11</volume>
          .004
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Yu</surname>
            .Cherdantseva,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Burnap</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Blyth</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Eden</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Jones</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Soulsby</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Stoddart</surname>
          </string-name>
          ,
          <article-title>A review of cyber security risk assessment methods for SCADA systems</article-title>
          , Computers &amp; Security, No.
          <volume>56</volume>
          ,
          <year>2016</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>27</lpage>
          . https://doi.org/10.1016/j.cose.
          <year>2015</year>
          .
          <volume>09</volume>
          .009
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Eling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wirfs</surname>
          </string-name>
          ,
          <article-title>What are the actual costs of cyber risk events?</article-title>
          <source>European Journal of Operational Research</source>
          , No.
          <volume>272</volume>
          (
          <issue>3</issue>
          ),
          <year>2019</year>
          , pp.
          <fpage>1109</fpage>
          -
          <lpage>1119</lpage>
          . DOI:
          <volume>10</volume>
          .1016/j.ejor.
          <year>2018</year>
          .
          <volume>07</volume>
          .021
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Alali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Almogren</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.M.</given-names>
            <surname>Mehedi</surname>
          </string-name>
          ,
          <string-name>
            <surname>I.Rassan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.Z.</given-names>
            <surname>Bhuiyan</surname>
          </string-name>
          ,
          <article-title>Improving risk assessment model of cyber security using fuzzy logic inference system</article-title>
          ,
          <source>Computers &amp; Security, No. 74</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>323</fpage>
          -
          <lpage>339</lpage>
          . DOI:
          <volume>10</volume>
          .1016/j.cose.
          <year>2017</year>
          .
          <volume>09</volume>
          .011
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Terje</surname>
          </string-name>
          ,
          <article-title>Risk assessment and risk management: Review of recent advances on their foundation</article-title>
          ,
          <source>European Journal of Operational Research</source>
          , Volume
          <volume>253</volume>
          , No.
          <volume>1</volume>
          ,
          <issue>2016</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>13</lpage>
          . https://doi.org/10.1016/j.ejor.
          <year>2015</year>
          .
          <volume>12</volume>
          .023
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>P.</given-names>
            <surname>Jain</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.J.</given-names>
            <surname>Pasman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Waldram</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.N.</given-names>
            <surname>Pistikopoulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.S.</given-names>
            <surname>Mannan</surname>
          </string-name>
          ,
          <article-title>Process Resilience Analysis Framework (PRAF): A systems approach for improved risk and safety management</article-title>
          ,
          <source>Journal of Loss Prevention in the Process Industries</source>
          , Volume
          <volume>53</volume>
          ,
          <year>2018</year>
          , pp.
          <fpage>61</fpage>
          -
          <lpage>73</lpage>
          . https://doi.org/10.1016/j.jlp.
          <year>2017</year>
          .
          <volume>08</volume>
          .006
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>V.</given-names>
            <surname>Mokhor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Bakalynskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Bohdanov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Tsurkan</surname>
          </string-name>
          ,
          <article-title>Interpretation of the simple risk level dependence of its implementation in the terms of analytic geometry, Information technology, and security</article-title>
          . Volume
          <volume>5</volume>
          , No.
          <volume>1</volume>
          ,
          <issue>2017</issue>
          , pp.
          <fpage>71</fpage>
          -
          <lpage>82</lpage>
          . DOI:
          <volume>10</volume>
          .20535/
          <fpage>2411</fpage>
          -
          <lpage>1031</lpage>
          .
          <year>2017</year>
          .
          <volume>5</volume>
          .1.
          <fpage>120574</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>G.</given-names>
            <surname>Mygal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Mygal</surname>
          </string-name>
          ,
          <article-title>Interdisciplinary approach to the human factor problem</article-title>
          ,
          <source>Municipal economy of cities? No. 3</source>
          ,
          <issue>2020</issue>
          , pp.
          <fpage>149</fpage>
          -
          <lpage>157</lpage>
          .
          <fpage>10</fpage>
          .33042/
          <fpage>2522</fpage>
          -1809
          <source>-2020-3-156-149-157</source>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>V.</given-names>
            <surname>Perederyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Borchik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Ohnieva</surname>
          </string-name>
          ,
          <source>Information Technology of Control and Support for Functional Sustainability of Distributed Man-Machine Systems of Critical Application, Lecture Notes in Computational Intelligence</source>
          and
          <article-title>Decision Making.Proceedings of the XV International Scientific Conference “Intellectual Systems of Decision Making and Problems of Computational Intelligence” (ISDMCI'</article-title>
          <year>2019</year>
          ), Ukraine, May
          <volume>21</volume>
          -25,
          <year>2019</year>
          , pp.
          <fpage>461</fpage>
          -
          <lpage>477</lpage>
          . https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -26474-1_
          <fpage>33</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>J.</given-names>
            <surname>Ren</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Jenkinson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.L.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.B.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <article-title>An offshore risk analysis method based on fuzzy Bayesian networks</article-title>
          ,
          <source>EPSRC report</source>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>С.Fogelberg</surname>
          </string-name>
          ,
          <article-title>Fuzzy bayesian networks for network inference</article-title>
          ,
          <source>Transfer Report</source>
          , Computing Laboratory, Wolfson Building, Parks Road, Oxford, OX13QD,
          <year>October 2008</year>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>H.</given-names>
            <surname>Pan</surname>
          </string-name>
          , L.Liu, Fuzzy Bayesian networks
          <article-title>- a general formalism for representation, inference and learning with hybrid Bayesian networks</article-title>
          ,
          <source>IJPRAI</source>
          , Vol.
          <volume>14</volume>
          (
          <issue>7</issue>
          ),
          <year>2000</year>
          , pp.
          <fpage>941</fpage>
          -
          <lpage>962</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>J.</given-names>
            <surname>Halliwell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Keppens</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Shen</surname>
          </string-name>
          ,
          <article-title>Linguistic Bayesian networks for reasoning with subjective probabilities in forensic statistics</article-title>
          ,
          <source>Proc. of the 5th International Confer-ence on AI and Law</source>
          ,
          <year>2003</year>
          , pp.
          <fpage>42</fpage>
          -
          <lpage>50</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.V.</given-names>
            <surname>Leonenkov</surname>
          </string-name>
          ,
          <article-title>Fuzzy modeling in MATLAB and fuzzyTECH, St</article-title>
          . Petersburg: BHVPetersburg,
          <year>2005</year>
          , 736 p
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>