<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Assessment and Information Security Provision of the Decision Support Process in Technogenic Object Management Systems</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Viktor</forename><surname>Perederyi</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Kherson National Technical University</orgName>
								<address>
									<addrLine>Beryslavske shose 24</addrLine>
									<postCode>73008</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Eugene</forename><surname>Borchik</surname></persName>
							<email>borchikeu@gmail.com</email>
							<affiliation key="aff1">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Heorhiia Honhadze street 9</addrLine>
									<postCode>54000</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Waldemar</forename><surname>Wójcik</surname></persName>
							<email>waldemar.wojcik@pollub.pl</email>
							<affiliation key="aff2">
								<orgName type="institution">Lublin University of Technology</orgName>
								<address>
									<addrLine>Nadbystrzycka 38d</addrLine>
									<postCode>20-618</postCode>
									<settlement>Lublin</settlement>
									<country key="PL">Poland</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Oksana</forename><surname>Ohnieva</surname></persName>
							<email>oksana_ognieva@meta.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Kherson National Technical University</orgName>
								<address>
									<addrLine>Beryslavske shose 24</addrLine>
									<postCode>73008</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Assessment and Information Security Provision of the Decision Support Process in Technogenic Object Management Systems</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">02B3FD01FBD5FEDBA64CAF78FCC621D0</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-19T16:27+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The paper considers the information technology of assessment and provision of complex information security of decision-making process in human-machine management systems for technogenic objects, which complements the theory and methods of solving reliability and survivability problems of multilevel systems, based on the interaction of the set of their workability indicators, human factor and information security indicators in the decision-making process to ensure the efficiency of critical object management.</p><p>To assess the impact of a set of indicators of non-factors of information security, external, production, and human factors on the decision-making process of decision-maker in the management of critical objects, a fuzzy Bayesian network was built, which allowed, based on expert knowledge, to assess the probability of the critical object's information security states.</p><p>To practically substantiate the obtained results, an experiment was carried out, the results of which confirmed the practical value of the information technology, which can be used to assess and ensure comprehensive information security of the decision support process in man-machine management systems for technogenic objects.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Keywords1</head><p>Complex multilevel systems, complex organizational and technical objects, decision-maker, functional stability, human factor, relevant decisions, fuzzy risk in decision-making, Bayesian network.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Currently, when creating and operating complex multilevel systems (CMS) for the management of complex technogenic objects (CTO), the main task is to improve efficiency, which is associated with increasing technical and software complexity. In this regard, the requirements for both the reliability of the components that make up the system and the reliability and performance of the decision-maker (DM) are being raised.</p><p>Although the decision-making process is significantly influenced by the human factor, the efficiency and quality of management also depend on the speed and timeliness of receiving the necessary and reliable information about objects and processes by operational and control personnel (OCP) responsible for decision-making in emergencies.</p><p>The safe operation of man-machine systems (MMS) depends significantly on information and communication technologies and their cyberinfrastructure. At present, traditional security measures are mainly used, such as authentication, access control, authorization, data encryption, public key infrastructure, firewalls, intrusion detection systems, network security protocols, etc. However, recent cyber attacks on critical systems around the world have shown a significant gap between the ability to protect and restore traditional systems and new security requirements, especially in the context of the intellectualization of the technologies of MMS for the management of critical objects.</p><p>Moreover, insufficient attention has been paid to the issues of assessing and providing comprehensive information security for the process of relevant decision making support (RDM), in distributed MMS for management of technogenic objects, associated with the occurrence of hazardous situations under uncertainty and the impact of non-factors on the process of managerial decision-making and implementing due to the imperfection of the mathematical, statistical and intellectual tools used to solve this problem.</p><p>Thus, an urgent scientific problem is to improve the functional security of MMS for the management of technogenic objects through the development and implementation of methods and technologies for monitoring, assessment, and provision of comprehensive information security of the RDM support process.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Literature review</head><p>The solution to this problem is presented in the results of the following scientific studies.</p><p>Cybersecurity Risk Assessment <ref type="bibr" target="#b0">[1]</ref> states that cybersecurity in the management of a technogenic object is an important issue that can lead to serious hazards in the event of an accident. To assess the cybersecurity risks of nuclear plant control systems, the paper proposes a probabilistic method using the Bayesian network (BN) model and event tree.</p><p>In <ref type="bibr" target="#b1">[2]</ref> the methods of risk assessment for SCADA systems are considered and analyzed in detail. The essence of methods is described, stages of risk management are considered, the scheme of classification of methods for the estimation of risks of cybersecurity is proposed. In <ref type="bibr" target="#b2">[3]</ref>, a wide range of threats that lead to cybersecurity risk was studied, a database of actual losses in the event of these threats was created, and a loss analysis was performed using statistical and actuarial mathematics methods. Improving the model of cybersecurity risk assessment using a fuzzy logic apparatus that takes into account four risk factors: vulnerability, threat, probability, and impact was proposed in <ref type="bibr" target="#b3">[4]</ref>.</p><p>In <ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b6">[7]</ref> methods are proposed that enable determining the total risk of cybersecurity of critical infrastructure, the total damage due to multiple cyber threats, the total amount of damage due to cyber threats over a period of time, the probability of maximum losses as a result actions of cyber threats. It is also noted that the process of identifying and assessing the risk of irrelevant decisions under the influence of cyber threats is the basis and grounds for research in the field of analysis and improvement of existing and invention of new methods of risk assessment, its accuracy, and applying mathematical operations to risks.</p><p>In <ref type="bibr" target="#b7">[8]</ref>, the human factor was noted to play an important role in modern complex dynamical systems (CDS), in accidents and catastrophes. It is noted that little attention is paid to the problems of risks associated with the informational and cognitive aspects of human-machine interaction. It is recommended that the design and operation of CDS take into account the risks of irrelevant decision-making arising in unpredictable conditions, as well as special requirements for the human psychophysiological state and his or her admission to perform particularly responsible work. It is also noted that the informational and cognitive aspects of human factor engineering play a key role in the safety, reliability, and efficiency of CDS in the management of critical objects.</p><p>Therewith, the analysis of the research subject area showed the lack of effective information technology capable of providing comprehensive information security in the process of supporting RDM in the distributed MMS for the management of technogenic objects.</p><p>In this regard, to develop the theory of assessment and provision of the effective management of critical objects, we propose the information technology to assess and ensure comprehensive information security of the process of supporting RDM in the MMS for the management of technogenic objects.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Problem statement</head><p>A review, systematization, and generalization of publications on the analysis, assessment, and management of critical MMS show that in addition to system parameters, the impact of non-factors of the external and production environment on the human factor, management efficiency depends on the impact of information indicators security for the RDM support process during the operation of the system.</p><p>Based on the results of the analysis of the literature sources, it is noted that in the RDM support process, the following groups of factors, shown in the information model below, have the most significant impact on the set of information security indicators (Figure <ref type="figure" target="#fig_0">1</ref>) <ref type="bibr" target="#b8">[9]</ref>. 12 -assignment of access rights (privileged) -the process of determining access rights to the DB or DBMS. Privilege is based on a hierarchical structure; it has a flexible scenario that allows maximizing the database security; N -the impact of user actions. Unintentional actions lead to changes in parameters and algorithms of system functioning. Intentional actions are aimed at obtaining unauthorized access to information or violation of the system operation; 7. Hardware failures are equipment failures, physical impacts on the system, and equipment integrity. Having different degrees of protection from external impacts, complete data protection or operability of all system is not guaranteed; X -state of the technological process; Z -the influence of the external environment on the DM; Y -indicators of psychological and mental factors of DM; E -software failures; V -consistency of data in the database and the relationships between tables; W -data availability, correct work with the database; 3 -confidentiality of data in the system and the database, 1 -the integrity of the data stored in the database; T -the impact of the actions of administrators, provides an assessment of the negative impact of users with administrator rights on the information in the database and system; 11 -data security, provides an assessment of the security of the database from hacking and data substitution; 5 -reference value -information on the quality of the relational database, which consists in the absence in any respect of foreign keys that refer to non-existent tuples; D -risk assessment of making irrelevant decisions; alternatives (A) -a sample of relevant alternatives to DMS from KB; P -the result of the search for relevant solutions of the RDM, taking into account the relevant impact factors; R -state of information security for making relevant decisions by DM. Since the risk of irrelevant decision making is determined by the simultaneous impact of a set of information security non-factors, one of the stages of its assessment is to identify causal relationships and dependencies between these factors, which will make it possible to assess the change in the probability of risk in the event of a change in the probability of the occurrence of some events. The traditionally used probabilistic approach to uncertainty determination in Bayesian models is not always applicable due to the lack of statistical information about the state of a complex system. To solve this problem, fuzziness was introduced into the BN in the following way <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b10">11]</ref>. The unconditional and conditional probabilities at the BN's vertices are represented by fuzzy numbers obtained as a result of expert evaluation of a vertex's ability to take a particular value, and the common operations of BN-based calculation are replaced by extended operations on fuzzy numbers <ref type="bibr" target="#b11">[12]</ref>. Herewith, the introduction of fuzziness will make it possible to analyze poorly formalized information.</p><p>For the assessment of complex information security of the DMS process in the MMS for the management of technogenic objects, the following BN was built (Figure <ref type="figure" target="#fig_1">2</ref>).  It is assumed that all the vertices of the proposed Bayesian network (Figure <ref type="figure" target="#fig_2">3</ref>) take only two values. vertex N takes values n1 -"low", n2 -"high"; vertex T takes values t1 -"low", t2 -"high"; vertex E takes values e1 -"does not occur", e2 -"occur"; vertex X takes values x1 -"workable", x2 -"unworkable"; vertex Y takes values y1 -"norm", y2 -"non-norm"; vertex Z takes values z1 -"norm", z2 -"non-norm"; vertex D takes values d1 -"low", d2 -"high"; vertex A takes values a1 -"sufficient", a2 -"insufficient"; vertex V takes values v1 -"consistency", v2 -"inconsistency"; vertex W takes values w1 -"sufficient", w2 -"insufficient"; vertex Q takes values q1 -"reliable ", q2 -" unreliable "; vertex R takes values r1 -"protected", r2 -"unprotected"</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Materials and methods</head><p>Since the values of the unconditional probabilities of the root vertices N, T, E and the conditional probabilities of the remaining vertices are established on the basis of the results of the expert survey, they are determined vaguely, i.e. are fuzzy sets. Therefore, fuzziness is introduced into the Bayesian network (1) as follows <ref type="bibr" target="#b12">[13]</ref>.</p><p>All unconditional and conditional probabilities of the considered Bayesian network are given in the form of fuzzy trapezoidal numbers L(l1, l2, l3, l4), having a distribution function set by the formula:</p><formula xml:id="formula_0">𝜇𝜇 𝐿𝐿 (𝑥𝑥) = ⎩ ⎪ ⎪ ⎨ ⎪ ⎪ ⎧ 0, 𝑥𝑥 &lt; 𝑙𝑙 1 𝑜𝑜𝑜𝑜 𝑥𝑥 &gt; 𝑙𝑙 4 , 𝑥𝑥 − 𝑙𝑙 1 𝑙𝑙 2 − 𝑙𝑙 1 , 𝑙𝑙 1 ≤ 𝑥𝑥 ≤ 𝑙𝑙 2 , 1, 𝑙𝑙 2 ≤ 𝑥𝑥 ≤ 𝑙𝑙 3 , 𝑙𝑙 4 − 𝑥𝑥 𝑙𝑙 4 − 𝑙𝑙 3 , 𝑙𝑙 3 &lt; 𝑥𝑥 ≤ 𝑙𝑙 4 ,</formula><p>where: l1≤ l2≤l3≤l4-certain real numbers.</p><p>A fuzzy trapezoidal number ) , , , ( ~4 3 2 1 l l l l L is also represented <ref type="bibr" target="#b13">[14]</ref> as a tuple of four numbers: Application of the extension principle to arithmetic operations and trapezoidal fuzzy numbers <ref type="bibr" target="#b13">[14]</ref> leads to the following rules for adding and subtracting fuzzy numbers  </p><formula xml:id="formula_1">m m m m M [ ) , , , ( ~1 1 1 1 β α b a L и ) , , , ( ~2 2 2 2 β α b a M ]: 1 2 3 4 1 2 3 4 ( , , , ) ( , , , ) L l l l l M m m m m ⊕ =    1 1 2 2 3 3 4 4 ( , , , ), S l m l m l m l m + + + +  1 1 1 1 1 1 1 1 1 2 1 2 1 2 2 1 1 2 2 1 ( , , , ) ( , , , ) ( , , , ) L a b M a b H a a bb a a b b α β α β α α β β ⊗ = + +     It is</formula><formula xml:id="formula_2">) ( ∅ = ∩ B A ε , then ) ( ~ ) ( ~ ) ( ~B P A P B A P f f f ⊕ = ∪ 4.</formula><p>if A and B are values from ε , and × ~ is a certain fuzzy arithmetic operation, then:</p><formula xml:id="formula_3">       ≥ × ≤ × ≤ × ≤ × = × 1 ) ( ) ( ~ if , 1 ~1 ) ( ) ( 0 ~ if ), ( ) ( ~0 ) ( ) ( ~ if , 0 ) ( ) ( ~B P A P B P A P B P A P B P A P B P A P f f f f f f f f f f</formula><p>Here Ω -is the universal set defining the variable A, ε ; is a set of inconsistent numbers A; L ~ -a set of fuzzy numbers; 0 ~ and 1 ~ -fuzzy numbers 0 and 1;</p><p>) , , (</p><formula xml:id="formula_4">f P ε Ω -fuzzy probability space.</formula><p>Condition 4) imposes restrictions on the result of fuzzy operations with values of fuzzy probabilities so that condition 1) is guaranteed to be fulfilled.</p><p>To compare fuzzy numbers in condition 4), the following approach is used. It is considered, that of two fuzzy numbers, the greater is the one, the defuzzification value of which is greater. For fuzzy numbers 0 ~ and 1 ~, defuzzification values are taken equal to crisp numbers 0 and 1, respectively.</p><p>For the rest of the fuzzy numbers, the center of gravity method is chosen as the defuzzification method, which for trapezoidal fuzzy numbers ) , , , ( ~4 3 2 1 l l l l L takes the following form <ref type="bibr" target="#b13">[14]</ref>:</p><formula xml:id="formula_5">𝐿𝐿 = ∫ 𝑥𝑥𝜇𝜇(𝑥𝑥)𝑑𝑑𝑥𝑥 𝑙𝑙 4 𝑙𝑙 1 ∫ 𝜇𝜇(𝑥𝑥)𝑑𝑑𝑥𝑥 𝑙𝑙 4 𝑙𝑙 1 = 1 3 ⋅ −𝑙𝑙 1 2 − 𝑙𝑙 2 2 + 𝑙𝑙 3 2 + 𝑙𝑙 4 2 − 𝑙𝑙 1 𝑙𝑙 2 + 𝑙𝑙 3 𝑙𝑙 4 −𝑙𝑙 1 − 𝑙𝑙 2 + 𝑙𝑙 3 + 𝑙𝑙 4<label>(1)</label></formula><p>where L -defuzzification result, "exact" value of a fuzzy number L ~.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 1</head><p>The result of assessing fuzzy conditional probabilities at nodes X, Y, Z, D, A N</p><formula xml:id="formula_6">1 ( | ) f P X x N =  2 ( | ) f P X x N =  N 1 ( | ) f P Y y N =  2 ( | ) f P Y y N = </formula><p>1 n (0.7; 0.8; 0.9; 1.0) (0.0; 0.1; 0.2; 0.3) 1 n (0.8; 0.85; 0.95 ;1.0) (0.00; 0.05; 0.15; 0.2) 2 n (0.1; 03; 0.5; 0.7) (0.3; 0.5; 0.7; 0.9) 2 n (0.1; 0.2; 0.4; 0.5) (0.5 0.6; 0.8; 0.9)</p><formula xml:id="formula_7">N 1 ( | ) f P Z z N =  2 ( | ) f P Z z N =  T 1 ( | ) f P D d T =  2 ( | ) f P D d T = </formula><p>1 n (0.7; 0.8; 0.9; 1.0) (0.0; 0.1; 0.2; 0.3) 1 t (0.75; 0.8; 0.9; 0.95) (0.05; 0.1; 0.2; 0.25) 2 n (0.5; 0.6; 0.8; 0.9) (0.1; 0.2; 0.4; 0.5) 2 t (0.1; 0.2; 0.4; 0.5) (0.5; 0.6; 0.8; 0.9)</p><formula xml:id="formula_8">T 1 ( | ) f P A a T =  2 ( | ) f P A a T = </formula><p>1 t (0.6; 0.7; 0.9; 1.0) (0.00; 0.1; 0.3; 0.4) 2 t (0.1; 0.2; 0.4; 0.5) (0.5; 0.6; 0.8; 0.9)</p><p>When calculating fuzzy probabilities in Bayesian network vertices, the following expressions are used <ref type="bibr" target="#b11">[12]</ref>:</p><formula xml:id="formula_9">1 1 ( , ..., ) ( , ( )), n f n f i i i P A A P A Parents A = = ⊗    </formula><p>where Parents(Ai) are parent variables of the variable Ai. The latter expression is called the chain rule for the fuzzy joint probability distribution;</p><formula xml:id="formula_10">( , ) ( ) ( | ) f j i f i f j i P B b A a P A a P B b A a = = = = ⊗ = = −      fuzzy joint probability; 1 ( ) ( ) ( | ) n f j f i f j i i P B b P A a P B b A a = = = = ⊗ = = − ⊕      </formula><p>fuzzy composite probability. Lower-level experts were proposed to assess the conditional probabilities of possible states of the monitoring and control modules of the system's functional sustainability (FS) in the process of its operation. The results are presented in the form of fuzzy values of conditional probabilities in Tables <ref type="table">1-3</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 2</head><p>The result of assessing fuzzy conditional probabilities at node R The result of assessing fuzzy conditional probabilities at nodes Q, V, W  The procedure for calculating the value of probabilities of a fuzzy Bayesian network includes the following stages. At the first stage, fuzzy unconditional probabilities of vertices X, Y, Z, D, A that have one parent vertex are calculated as follows:</p><formula xml:id="formula_11">V W 1 ( | , ) f P R r V W =  2 ( | , ) f P R r V W = </formula><formula xml:id="formula_12">X T E 1 ( | , , ) f P Q q X T E =  2 ( | , , ) f P Q q X T E =  1 x 1 t 1 e (0</formula><formula xml:id="formula_13">D E Q 1 ( | , , ) f P V v D E Q =  2 ( | , , ) f P V v D E Q =  1 d 1 e 1 q (0</formula><formula xml:id="formula_14">2 1 2 1 ( ) ( , )<label>( , ) ( ) ( | )</label></formula><p>,</p><formula xml:id="formula_15">f i f i f k i N k f k f i k k P X x P N X x P N n X x P N n P X x N n = = = = = = = = = = = ⊗ = = ⊕ ⊕ ⊕          2 1 ( ) ( ) ( | ) , f i f k f i k k P Y y P N n P Y y N n = = = = ⊗ = = ⊕      2 1 ( ) ( ) ( | ) ,<label>(2)</label></formula><formula xml:id="formula_16">f i f k f i k k P Z z P N n P Z z N n = = = = ⊗ = = ⊕      (2) 2 1 ( ) ( ) ( | ) , f i f k f i k k P D d P T t P D d T t = = = =⊗ = = ⊕      2 1 ( ) ( ) ( | ) , ( 1, 2 ). f i f k f i k k P A a P T t P A a T t i = = = = ⊗ = = = ⊕     </formula><p>At the second stage, fuzzy unconditional probabilities of vertices Q, V, W having three parent vertices are calculated as follows:</p><p>, ,</p><formula xml:id="formula_17">1 1 1 1 1 2 1 2 1 1 2 2 2 1 1 2 1 2 ( ) ( ,<label>, , ) ( , , , ) ( , , , ) ( , , , ) ( , , , ) ( , , , ) ( , , , ) ( f</label></formula><formula xml:id="formula_18">i f i X T E f i f i f i f i f i f i f P Q q P X T E Q q P X x T t E e Q q P X x T t E e Q q P X x T t E e Q q P X x T t E e Q q P X x T t E e Q q P X x T t E e Q q P = = = = = = = = = ⊕ = = = = ⊕ ⊕ = = = = ⊕ = = = = ⊕ ⊕ = = = = ⊕ = = = = ⊕ ⊕ ⊕                    2 2 1 2 2 2 1 1 1 1 1 1 1 1 2 1 1 2 1 2 1 1 2 1 1 , ,<label>, ) ( , , , ) ( ) ( )</label></formula><formula xml:id="formula_19">( ) ( | , , ) ( ) ( ) ( ) ( | , , ) ( ) ( ) ( ) ( | , , )<label>(3)</label></formula><p>( )</p><formula xml:id="formula_20">i f i f f f f i f f f f i f f f f i f X x</formula><p>T t E e Q q P X x T t E e Q q P x P t P e P q x t e P x P t P e P q x t e P x P t P e P q x t e </p><formula xml:id="formula_21">P x = = = = ⊕ = = = = = = ⊗ ⊗ ⊗ ⊕ ⊕ ⊗ ⊗ ⊗ ⊕ ⊕ ⊗ ⊗ ⊗ ⊕ ⊕                                2 2 1 2 2 2 1 1 2 1 1 2 1 2 2 1 2 2 2 1 2 2 1 2 2 ( ) ( ) ( | , , ) ( ) ( ) ( ) ( | , , ) ( ) ( ) ( ) ( | , , ) ( ) ( ) ( ) ( | , , ) ( ) ( ) f f f i f f f f i f f f f i f f f f i</formula><formula xml:id="formula_22">⊗ ⊗ ⊕ ⊕ ⊗ ⊗ ⊗ ⊕ ⊕ ⊗ ⊗ ⊗ ⊕ ⊕ ⊗ ⊗ ⊗ ⊕ ⊕ ⊗ ⊗                                        2 2 2 2</formula><p>( ) ( | , , ) , </p><formula xml:id="formula_23">f f i e P q x t e ⊗   (3) , ,<label>1 1 1 1 1 2 ( ) ( , , , ) ( , , , ) ( , , , )</label></formula><formula xml:id="formula_24">f i f i D E Q f i f i P V v P D E Q V v P D d E e Q q V v P D d E e Q q V v = = = = = = = = =⊕ = = = =⊕ ⊕        2 1 1 2<label>1 2 ( , , , ) ( , , , )</label></formula><formula xml:id="formula_25">f i f i P D d E e Q q V v P D d E e Q q V v ⊕ = = = = ⊕ = = = = ⊕      2 2 1 2<label>2 2 ( , , , ) ( , , , )</label></formula><formula xml:id="formula_26">f i f i P D d E e Q q V v P D d E e Q q V v ⊕ = = = = ⊕ = = = = =    <label>1</label></formula><formula xml:id="formula_27">f i f i V W P R r P V W R r = = = = ⊕    1 1 1 2 ( , , ) ( , ,<label>)</label></formula><formula xml:id="formula_28">f i f i P V v W w R r P V v W w R r = = = = ⊕ = = = ⊕    </formula></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Information model for assessment and provision of comprehensive information security of the decision-making support (DMS) process in the MMS for the management of technogenic objects</figDesc><graphic coords="3,166.55,457.78,270.75,197.97" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: BN for the assessment of comprehensive information security of the DMS process</figDesc><graphic coords="4,129.50,371.08,345.57,291.70" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3</head><label>3</label><figDesc>Figure 3 presents a simplified BN as an example of calculation for a fuzzy Bayesian network. The fuzzy probabilities of variables are obtained based on expert assessment.The results of the assessment are presented in the form of fuzzy values of conditional probabilities in tables 1-3.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: A fragment of a fuzzy BN</figDesc><graphic coords="5,142.15,365.08,334.45,295.16" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head></head><label></label><figDesc>a=l2 and b=l3 -respectively, the lower and upper modal values of the number right fuzziness coefficients L ~.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>assumed that the fuzzy numbers are positive, i.e. li≥0, mi≥0,</figDesc><table><row><cell>2.</cell><cell cols="6">( ~= ∅ ~ and 1 ) ( = Ω f f P P</cell><cell>0 )</cell></row><row><cell cols="2">3. if</cell><cell>A</cell><cell>and</cell><cell>B</cell><cell></cell><cell cols="2">are</cell><cell>inconsistent</cell><cell>values</cell><cell>from</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>( i =</cell><cell>, 1</cell><cell>n</cell><cell>)</cell><cell>; signs ⊕  and ⊗ </cell></row><row><cell cols="9">denote the operations of addition and multiplication of fuzzy numbers. Fuzzy probability under ) , ( ε Ω is understood [13] as a function P f ~→ ε</cell><cell>L : , that satisfies</cell></row><row><cell cols="5">the following conditions:</cell><cell></cell><cell></cell><cell></cell></row><row><cell>1.</cell><cell cols="3">( 0 ~  A P f</cell><cell>∀A ) , 1</cell><cell>∈</cell><cell>ε</cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_4"><head></head><label></label><figDesc>At the third stage, fuzzy unconditional probabilities of a leaf vertex R which has two parent vertices are calculated as follows:</figDesc><table><row><cell></cell><cell></cell><cell cols="5">1 ( ) P e f   = =⊗ ( ) f P d </cell><cell>1 ( ) P q f   ⊗</cell><cell>1 1 1 ( | , , ) i P v d e q f   ⊗</cell><cell>⊕ </cell></row><row><cell></cell><cell></cell><cell cols="2">1 ( ) P d f   ⊕</cell><cell>1 ( ) P e f   ⊗</cell><cell></cell><cell>2 ( ) P q f   ⊗</cell><cell>1 1 ( | , , ) 2 i P v d e q f   ⊗</cell><cell>⊕ </cell></row><row><cell>1 ( ) P d f   ⊕</cell><cell>2 ( ) P e f   ⊗</cell><cell>1 ( ) P q f   ⊗</cell><cell cols="4">1 2 1 ( | , , ) i P v d e q f   ⊗</cell><cell>⊕ </cell><cell>(4)</cell></row><row><cell></cell><cell></cell><cell cols="2">1 ( ) P d f   ⊕</cell><cell cols="2">2 ( ) P e f   ⊗</cell><cell>2 ( ) P q f   ⊗</cell><cell>1 2 ( | , , ) 2 i P v d e q f   ⊗</cell><cell>⊕ </cell></row><row><cell></cell><cell></cell><cell>2 ( ) P d f   ⊕</cell><cell cols="2">1 ( ) P e f   ⊗</cell><cell></cell><cell>1 ( ) P q f   ⊗</cell><cell>2 1 1 ( | , , ) i P v d e q f   ⊗</cell><cell>⊕ </cell></row><row><cell></cell><cell></cell><cell>2 ( ) P d f   ⊕</cell><cell cols="2">1 ( ) P e f   ⊗</cell><cell cols="2">2 ( ) P q f   ⊗</cell><cell>2 1 ( | , , ) 2 i P v d e q f   ⊗</cell><cell>⊕ </cell></row><row><cell></cell><cell></cell><cell>2 ( ) P d f   ⊕</cell><cell cols="3">2 ( ) P e f   ⊗</cell><cell>1 ( ) P q f   ⊗</cell><cell>2 ( | , , ) 2 1 i P v d e q f   ⊗</cell><cell>⊕ </cell></row><row><cell></cell><cell></cell><cell>2 ( ) P d f   ⊕</cell><cell cols="3">2 ( ) P e f   ⊗</cell><cell>2 ( ) P q f   ⊗</cell><cell>2 ( | , , ), 2 2 i P v d e q f   ⊗</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>(5)</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell>(</cell><cell cols="2">)</cell><cell>( , ,</cell><cell>)</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>,</cell></row></table></figure>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>)</p><p>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Experiment</head><p>For the practical evaluation of the proposed models, the following experiment was carried out. Let information security be influenced by the actions of users (factor N) and administrators (factor T) in the system and database with a low probability value, and software failure (factor E) is of low probability. The result of estimating the probability of the influence of the above factors is presented in the form of fuzzy probabilities</p><p>, given by trapezoidal fuzzy numbers in Table <ref type="table">4</ref>. Taking into account the expert estimates of the conditional probabilities of the mutual influence of the factors presented in Tables 1-3, calculations of fuzzy probability values of the considered network nodes are performed using formulas <ref type="bibr" target="#b1">(2)</ref><ref type="bibr" target="#b2">(3)</ref><ref type="bibr" target="#b3">(4)</ref><ref type="bibr" target="#b4">(5)</ref><ref type="bibr" target="#b5">(6)</ref> in the MATLAB environment. In addition, formula (1) calculates the defuzzification values of fuzzy probabilities at the nodes of the network. The calculation results are presented in Table <ref type="table">4</ref>.</p><p>As it is seen from Table <ref type="table">4</ref>, the probability that the information security is in the "protected" state P(R=r1)=0.97, which, following the regulatory recommendations (P(R=r1)≥0.95), is considered as a sufficient value.  given by trapezoidal fuzzy numbers in Table <ref type="table">5</ref>.</p><p>The results of calculating the values of the fuzzy probability of the nodes of the network under consideration are presented in Table <ref type="table">5</ref>. As it is seen from Table <ref type="table">5</ref> the probability that the information security is in the "protected" state P(R=r1)=0.77. Consequently, in this case, it cannot be assumed that the information security is in the "protected" state.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusions</head><p>The information technology was proposed for the assessment and provision of complex information security of decision-making support process in man-machine systems for the management of technogenic objects, which complements the theory and methods of solving the issues of maintaining reliability and survivability of multilevel systems, based on the interaction of its workability indicator set, human factor and the indicators of information security in the decision-making process, to ensure the management efficiency of critical objects.</p><p>To assess the impact of a set of indicators of information security non-factors, as well as external, production, and human factors on the decision-making process of DM in the management of critical objects, a fuzzy BN was proposed. A fuzzy BN was proposed to assess the complex information security of the DMS process in the MMS for managing a technogenic object. An algorithm for calculating fuzzy probabilities of the nodes of this network was developed. In the MATLAB environment, a numerical experiment was carried out for various values of the degrees of influence of factors on the information system.</p><p>Thus, if the impact on the information security of users (factor N) and the administrator (factor T), as well as software failure (factor E), are unlikely, then information security with a sufficient degree of probability is in a protected state. If the impact on the information security of users (factor N) and the administrator (factor T), as well as software failure (factor E), are quite probable, then information security is in a protected state with an insufficient degree of probability, that is, it is not protected. To bring it into a protected state, it is necessary to reduce the degree of impact of negative factors T, N, E on it to a certain level. Thus, the fuzzy model built for analyzing the impact of non-factors on the degree of information security allows assessing the degree of its protection, taking into account the causal relationships of these factors.</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Cyber security risk evaluation of a nuclear I&amp;C using BN and ET</title>
		<author>
			<persName><forename type="first">J</forename><surname>Shin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Son</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Heo</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.net.2016.11.004</idno>
		<ptr target="https://doi.org/10.1016/j.net.2016.11.004" />
	</analytic>
	<monogr>
		<title level="j">Nuclear Engineering and Technology</title>
		<imprint>
			<biblScope unit="volume">49</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="517" to="524" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">A review of cyber security risk assessment methods for SCADA systems</title>
		<author>
			<persName><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Cherdantseva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Burnap</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Blyth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Eden</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Jones</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Soulsby</surname></persName>
		</author>
		<author>
			<persName><surname>Stoddart</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.cose.2015.09.009</idno>
		<ptr target="https://doi.org/10.1016/j.cose.2015.09.009" />
	</analytic>
	<monogr>
		<title level="j">Computers &amp; Security</title>
		<imprint>
			<biblScope unit="volume">56</biblScope>
			<biblScope unit="page" from="1" to="27" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">What are the actual costs of cyber risk events?</title>
		<author>
			<persName><forename type="first">M</forename><surname>Eling</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Wirfs</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.ejor.2018.07.021</idno>
	</analytic>
	<monogr>
		<title level="j">European Journal of Operational Research</title>
		<imprint>
			<biblScope unit="volume">272</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="1109" to="1119" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Improving risk assessment model of cyber security using fuzzy logic inference system</title>
		<author>
			<persName><forename type="first">M</forename><surname>Alali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Almogren</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">M</forename><surname>Mehedi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Rassan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">Z</forename><surname>Bhuiyan</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.cose.2017.09.011</idno>
	</analytic>
	<monogr>
		<title level="j">Computers &amp; Security</title>
		<imprint>
			<biblScope unit="volume">74</biblScope>
			<biblScope unit="page" from="323" to="339" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Risk assessment and risk management: Review of recent advances on their foundation</title>
		<author>
			<persName><forename type="first">A</forename><surname>Terje</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.ejor.2015.12.023</idno>
		<ptr target="https://doi.org/10.1016/j.ejor.2015.12.023" />
	</analytic>
	<monogr>
		<title level="j">European Journal of Operational Research</title>
		<imprint>
			<biblScope unit="volume">253</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="1" to="13" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Process Resilience Analysis Framework (PRAF): A systems approach for improved risk and safety management</title>
		<author>
			<persName><forename type="first">P</forename><surname>Jain</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">J</forename><surname>Pasman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Waldram</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">N</forename><surname>Pistikopoulos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S</forename><surname>Mannan</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.jlp.2017.08.006</idno>
		<ptr target="https://doi.org/10.1016/j.jlp.2017.08.006" />
	</analytic>
	<monogr>
		<title level="j">Journal of Loss Prevention in the Process Industries</title>
		<imprint>
			<biblScope unit="volume">53</biblScope>
			<biblScope unit="page" from="61" to="73" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Interpretation of the simple risk level dependence of its implementation in the terms of analytic geometry</title>
		<author>
			<persName><forename type="first">V</forename><surname>Mokhor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Bakalynskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Bohdanov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Tsurkan</surname></persName>
		</author>
		<idno type="DOI">10.20535/2411-1031.2017.5.1.120574</idno>
	</analytic>
	<monogr>
		<title level="j">Information technology, and security</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="71" to="82" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Interdisciplinary approach to the human factor problem, Municipal economy of cities?</title>
		<author>
			<persName><forename type="first">G</forename><surname>Mygal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename></persName>
		</author>
		<idno type="DOI">10.33042/2522-1809-2020-3-156-149-157</idno>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="149" to="157" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Information Technology of Control and Support for Functional Sustainability of Distributed Man-Machine Systems of Critical Application</title>
		<author>
			<persName><forename type="first">V</forename><surname>Perederyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Borchik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Ohnieva</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-26474-1_33</idno>
		<ptr target="https://doi.org/10.1007/978-3-030-26474-1_33" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the XV International Scientific Conference &quot;Intellectual Systems of Decision Making and Problems of Computational Intelligence</title>
				<meeting>the XV International Scientific Conference &quot;Intellectual Systems of Decision Making and Problems of Computational Intelligence<address><addrLine>Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">May 21-25, 2019</date>
			<biblScope unit="page" from="461" to="477" />
		</imprint>
	</monogr>
	<note>ISDMCI&apos;2019)</note>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">An offshore risk analysis method based on fuzzy Bayesian networks</title>
		<author>
			<persName><forename type="first">J</forename><surname>Ren</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Jenkinson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">L</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">B</forename><surname>Yang</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
	<note type="report_type">EPSRC report</note>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">Fuzzy bayesian networks for network inference</title>
		<author>
			<persName><forename type="first">С</forename><surname>Fogelberg</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2008-10-13">OX13QD. October 2008</date>
			<pubPlace>Parks Road, Oxford</pubPlace>
		</imprint>
		<respStmt>
			<orgName>Computing Laboratory, Wolfson Building</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Transfer Report</note>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Fuzzy Bayesian networks -a general formalism for representation, inference and learning with hybrid Bayesian networks</title>
		<author>
			<persName><forename type="first">H</forename><surname>Pan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Liu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IJPRAI</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">7</biblScope>
			<biblScope unit="page" from="941" to="962" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Linguistic Bayesian networks for reasoning with subjective probabilities in forensic statistics</title>
		<author>
			<persName><forename type="first">J</forename><surname>Halliwell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Keppens</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Shen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 5th International Confer-ence on AI and Law</title>
				<meeting>of the 5th International Confer-ence on AI and Law</meeting>
		<imprint>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="42" to="50" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<title level="m" type="main">Fuzzy modeling in MATLAB and fuzzyTECH</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Leonenkov</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2005">2005</date>
			<publisher>BHV-Petersburg</publisher>
			<biblScope unit="page">736</biblScope>
			<pubPlace>St. Petersburg</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
