<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Information Technology of Risk Assessment for Automated Control Systems of Printing Production</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Lubomir</forename><surname>Sikora</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12, Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Natalia</forename><surname>Lysa</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12, Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Rostislav</forename><surname>Tkachuk</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Lviv State University of Life Safety</orgName>
								<address>
									<addrLine>35, Kleparivska str</addrLine>
									<postCode>79007</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Volodymyr</forename><surname>Sabat</surname></persName>
							<affiliation key="aff2">
								<orgName type="institution">Ukrainian academy of printing</orgName>
								<address>
									<addrLine>19 Pid Goloskom str</addrLine>
									<postCode>79020</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Olga</forename><surname>Fedevych</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12, Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Information Technology of Risk Assessment for Automated Control Systems of Printing Production</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">4F0C5D2F7995E8EA12BF937FD3D4B884</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-19T16:27+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>System</term>
					<term>information</term>
					<term>assets</term>
					<term>risks</term>
					<term>threats</term>
					<term>vulnerabilities</term>
					<term>management</term>
					<term>printing production</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The article considers construction methods of risk assessment information technology for automated control systems of printing production (ACSPP) on the basis of detection of threats and vulnerabilities of the company assets. It is substantiated that ACSPP is one of the production assets and the risk assessment problems in the security system are reduced to determining ACSPP threats and vulnerabilities levels and countermeasures to counter possible attacks on production. In addition to the above-mentioned ACAPP security problems related to the threats and vulnerabilities inherent in most IS, a number of organizational and psychological issues should also be noted. In particular, weak awareness of the information importance and its protection by the management staff and employees of printing companies. Accordingly, the management staff is reluctant to invest in information protection and make any organizational decisions on this issue, and the employees show misunderstanding and failure to take most protection measures, which leads to negligence, and then complete disregard for protection measures. This attitude to the information security can cause significant losses to the company, which will be simply disproportionate to the cost of information security in their values. Another important problem is the imperfection of Ukrainian legislation in the information protection area and almost complete absence of domestic standards in this area. In order to achieve the required level of ACSPP protection, it is necessary to reduce the risks level to an acceptable one or eliminate the risks altogether. This can be achieved by reducing the criticality, probability and/or frequency of threats.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The main security purpose is to protect the company assets from attacks due to existing threats. Threats are assessed according to the amount of damage that may be caused to the company as a CITRisk'2021: 2nd International Workshop on Computational &amp; Information Technologies for Risk-Informed Systems, September 16-17, 2021, Kherson, Ukraine EMAIL: lssikora@gmail.com (L.Sikora); lysa.nataly@gmail.com (N.Lysa); rlvtk@ukr.net (R.Tkachuk); v_sabat@ukr.net (V.Sabat); olha.y.fedevych@lpnu.ua (O.Fedevych) ORCID: 0000-0002-7446-1980 lssikora@gmail.com (L.Sikora); 0000-0001-5513-9614 (N.Lysa); 0000-0001-9137-1891 (R.Tkachuk); 0000-0001-8130-7837 (V.Sabat); 0000-0002-8170-3001 (O.Fedevych) result of the attacks. Losses can consist of loss of public trust or decrease in the company image in a society, responsibility before the law, threat to the personnel safety, etc. However, in the end they are somehow reduced to financial losses. The ability to implement a threat is characterized by the risk level, which in turn is directly proportional to the system vulnerability. That is, to protect the company assets it is necessary to reduce its vulnerability to an acceptable level. At the same time, the cost of measures aimed at reducing the assets vulnerability should not exceed the amount of damage that may be caused by threats to this asset as a result of attacks.</p><p>In this case, automated control systems of printing production (ACSPP) is considered as one of the company assets. In turn, ACSPP also consists of other assets. Therefore, in order to achieve the required protection level of ACSPP, it is sufficient to achieve the required protection level of its main assets: personnel, information component and hardware of the management process, goals and strategies.</p><p>The aim of study. The development of the information technology, based on the system analysis, to assess the functional dependencies between the company assets to create risk management systems in ACSPP under threat.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">References analysis</head><p>The main analysis of ACSPP in the domestic market is presented in <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref>, which indicates the advantages and disadvantages of certain control systems and their functions in the printing industry. Since the purpose of ACSPP is important for the organization of its activities, it requires a detailed risk analysis. The monograph <ref type="bibr" target="#b2">[3]</ref> highlights the fundamentals of information technology of the formation of methods and models for determining the security level of technological processes in the printing industry on the basis of risk assessment. Scientific works <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b4">5]</ref> cover conceptual aspects of risk -a qualitative and quantitative risk analysis, the system of indicators of its quantitative assessment, basic approaches to modelling, management and methods of risk reduction, and in <ref type="bibr" target="#b5">[6]</ref> a functional scheme of risk management for automated document management systems is presented, which can also be used for ACSPP. In <ref type="bibr" target="#b6">[7]</ref>, much attention is paid to the coverage of risk management tools and their consideration in making management decisions in conditions of uncertainty and risk. A typical regulation on the information protection service in the automated system is presented in the Normative documents of the information technical protection system <ref type="bibr" target="#b7">[8]</ref><ref type="bibr" target="#b8">[9]</ref><ref type="bibr" target="#b9">[10]</ref>. In <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b11">12]</ref> a novel extensible Multihazard Risk Assessment Framework that is a skeleton containing the multihazard risk assessment toolkit dealing with threat/danger, vulnerability, damage, coping capacity, risk, and multi-risk are presented. The risk scenarios within this framework can describe multi-hazards as a multitude of spatially distributed dynamic processes influenced by various drivers. The implementation of the proposed models and framework is also considered. The proposed eventbased scenario representation model provides sufficient detailization in space and time and can properly represent multi-hazards, including compound events, cascading effects, and risk-related processes driven by environmental and societal changes. In <ref type="bibr" target="#b12">[13]</ref> construction methods of information technology of formation and decision-making under risk conditions are considered for management of technogenic systems with use of cognitive model of operator activity. In <ref type="bibr" target="#b13">[14]</ref> the problem of decision-making in the risk conditions and conflict situations in the presence of terminal restrictions is considered at the time of resolving the crisis in the complex system management structure.</p><p>Problem setting. Risk assessment in automated control systems of the company is a basic task in the development of protection systems with an appropriate level that would meet the optimal security requirements of the company in the process of its operation. This task is solved by determining the features of technical and information processes that are performed at the company during its operation, threats and vulnerabilities of objects and subjects of operation at each technological stage, the occurrence of emergencies after external attacks or other negative incidents. Therefore, to solve the problems of risk management in the company, it is necessary to determine its assets and functional features in detail. This process should be done according to the functional scheme shown in Figure <ref type="figure" target="#fig_0">1</ref>. The detailed risk analysis for ACSPP involves the identification of all possible risks and assessment of their level <ref type="bibr" target="#b5">[6]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Presentation of the main research material</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Method of defining possible limits to assess the risks, losses and failures of complex systems under threat</head><p>Defining possible limits for risk assessment aims to clearly determine which of the resources should be taken into account when considering the results of risk analysis. When considering ACSPP risks it is necessary to take into account the following factors:</p><p>-the information technology assets (hardware, information support, information), as they make the software and hardware base for ACSPP operation;</p><p>-the personnel of the organization (who works with ACSPP and maintains it) as a source of possible threats;</p><p>-he conditions for carrying out the production activities, as they affect ACSPP proper operation;</p><p>-the business activity, which is the main purpose of ACSPP <ref type="bibr" target="#b0">[1]</ref>.</p><p>ACSPP operation is not possible if at least one of its components is not functioning, i.e. the failure of the proper operation of at least one of them will cause the failure of the other components and the system as a whole. Each of the components of ACSPP is considered in more detail -Figure <ref type="figure" target="#fig_0">1</ref>. ACSPP information component combines all the information that functions within ACSPP, as well as input and output information flows -Figure <ref type="figure">2</ref>. The software is a separate integral part of ACSPP information component. With the help of software, the transfer and conversion of information that operates in ACSPP are carried out. The software can be divided into main and auxiliary ones.</p><p>The main software includes the software modules for processing the information that operates in ACSPP, as well as a central database (DB) -the core of ACSPP. It can store a variety of information needed in the operation process.</p><p>The auxiliary software provides the operation of the main software. These are the operating system, drivers, various utilities, etc.</p><p>According to the scheme shown in Figure <ref type="figure">2</ref>, the operation of a typical ACSPP is as follows. The input information (customer requirements, commercial information, financial accounting data, various input documents) is processed by ACSPP software modules and entered into the central database. In the course of work, various internal company departments address to the central database through the corresponding software modules -there is an internal information exchange. In addition, during ACSPP operation, the relevant modules generate the output information (requests for materials, documents on product sales, operational accounting data). To ensure the reliability of the work, the central database information is periodically archived.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 2: Information component of the automated control system of printing production</head><p>The information in ACSPP can function both in electronic non-material form and in the form of hard copies. A hard copy means a medium that contains valuable information (DVD, flash drive, paper documents, etc.).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Hardware means of the automated control system</head><p>ACSPP hardware part. ACSPP hardware part includes the devices that provide the information exchange between the components within ACSPP, as well as between ACSPP and the external environment. That is, ACSPP hardware can include:</p><p>-resources: servers, workstations, mobile computers; -peripherals: printers, scanners, barcode readers, etc.; -communication equipment: networks and network equipment; -devices for communication with production equipment: controllers.</p><p>A server is a resource which contains valuable information and to which remote access is possible. Accordingly, a workstation is a resource that contains valuable information and to which only local access is possible, a mobile computer is a resource that contains valuable information and can be carried by the user outside the organization.</p><p>Personnel. The term "personnel" is understood as people who maintain ACSPP (such as system administrators) and those who work directly with it (users). Method of the system assets identification An asset of an information technology system is a component or part of the overall system in which the organization directly invests material and information resources, and which, accordingly, requires protection by the organization. The following groups of assets can be distinguished as a typical ACSPP:</p><p>1. Information/data. This category includes the central database, internal data, output files, archives, as well as information on hard copies.</p><p>2. Software: ACSPP software modules and auxiliary software (OS, drivers, utilities, etc.); 3. Hardware resources: servers, workstations, mobile PCs. 4. Communication equipment: networks. 5. Services: information and production ones. 6. Prestige (image) of the organization <ref type="bibr" target="#b4">[5]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">Hardware means of the automated control system</head><p>For certain ACSPP assets, it is possible to define functional dependencies between them within the printing company -Figure <ref type="figure">3</ref>.</p><p>The proper operation of the software and the information part of the assets depends on the operation of the hardware component. Since ACSPP in most cases is located on several resources, the information exchange between them will depend entirely on the network equipment. For a typical ACSPP, it is standard to have one or more servers for centralized management of information processes. In this case, the operation of workstations and mobile PCs as a part of ACSPP will depend on the proper operation of the servers.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 3: Functional dependencies between the information components of ACSPP structure</head><p>The operation of ACSPP information part will completely depend on the proper operation of the auxiliary software, which forms the internal information environment of ACSPP together with the software modules and provides the communication of the information part with the hardware. That is, the proper operation of the auxiliary software will depend on the operation of ACSPP software modules, the correctness of ACSPP internal data, the operation of the central database, as well as the information correctness on hard copies.</p><p>ACSPP software modules are used to convert the information and are also an intermediate link between the users and the central database. That is, the condition of the central database and internal data will depend on the correct operation of ACSPP software modules, which in turn will also affect the operation of ACSPP software modules. In addition, through ACSPP software modules the information is exported both in electronic form (output files) and in hard copies. Almost the whole range of information and production services provided by the company, and hence the company prestige, will also depend on the operation of ACSPP software modules.</p><p>In ACSPP working process, the information is periodically archived on hard discs, the condition of which will depend on the condition of the archives.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4.">Component assessment of the company assets under threat</head><p>The asset value is determined by its importance to the business activities of the organization, and the assessment level of business activities may be based on security considerations, i.e. how much the business activities of the organization and other IS assets may suffer from leakage, distortion, unavailability and destruction of information. Thus, the assets identification and the assessment, based on the business interests of the organization, is a key factor in the risk determining. The asset value also depends on the cost of the asset formation and maintaining. The identified assets are valuable to the organization. However, it is not possible to directly determine the financial value of each of them. It is also necessary to determine the value or degree of importance of the asset to the organization in non-profit activities. Otherwise, it will be difficult to determine the protection level required and the amount of funds that organizations should spend on protection measures <ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref>.</p><p>To assess the assets, a three-level scale is selected: 1 -low asset value; 2 -average asset value; 3 -high asset value -Table <ref type="table" target="#tab_0">1</ref>. It should be noted that some assets cannot be valued on a material scale. In addition, not all assets are subject to replacement, so its value cannot be assessed. The overall asset assessment is determined by the highest assessment -the total value assigned to one of the assessment scales. As mentioned above, the material assessment may not be determined for all assets, as it is difficult to assess the value of such assets as the prestige of the organization, services, output files, internal data, central database, in monetary terms. The cost of archives and hard copies is assessed at the cost of media. The cost of ACSPP software and modules is not high compared to the value of other company assets (e.g. premises, printing equipment), but it is not as low as the cost of media. The same can be said for the assessment of workstations and mobile PCs. The cost of the server equipment is usually higher than the cost of other computer equipment, so it is rated "high". At the same time, the cost of networks per workplace will be quite low. Non-material assessment is necessary in order to assess the criticality of a particular asset for the company proper operation From this point of view, most assets are critical because they are interconnected. However, the criticality of assets such as archives and hard copies will be relatively low, provided that the remaining assets function properly. The criticality of mobile PCs and workstations is rated as "average", because the failure of these assets will only lead to some slowdown in the company activity, as all important information is stored on servers.</p><p>When assessing the cost of replacing assets, both the material assessment of assets and the cost of replacing the asset are taken into account. In particular, the replacement of information assets (output files, auxiliary software, ACSPP software modules) will not require high costs. Some assets, such as the prestige of the organization, services, archives, internal data, central database, are not subject to replacement.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Component method for assessing the risks of system failure under active threat</head><p>To select adequate protection measures, it is necessary to assess the risk level. <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref> The risk level depends on the asset value, the threat criticality, the threat probability and frequency. The risk level will be determined by the formula:</p><formula xml:id="formula_0">, , , , j i j j i j i j i i R V K P W T Σ = × × × × ,</formula><p>where j V -is the value of the j-th asset; , j i K -is the criticality of the і-th threat for the j-th asset; , j i P -is the probability of occurrence of the і-th threat for the j-th asset; , j i W -is the frequency of occurrence of the і-th threat for the j-th asset during a year; i T Σ -is the total value, obtained by assessing vulnerabilities for the і-th threat. It is calculated by the formula:</p><formula xml:id="formula_1">1 , n T i q q T P Σ = = ∑</formula><p>where T q P -is the probability of occurrence of vulnerability q for the i-th threat;</p><p>n -is a number of vulnerabilities used by the i-th threat.</p><p>The total risk value for the і-th threat:</p><formula xml:id="formula_2">, 1 , k i j i j R R Σ = = ∑</formula><p>where k -is a total number of assets.</p><p>The probability of the j-th asset to the risk is calculated by the formula:</p><formula xml:id="formula_3">, 1 , s j j i i R R Σ = = ∑</formula><p>where s -is a total number of threats.</p><p>The results of the risk assessment are presented in Table <ref type="table" target="#tab_1">2</ref>. As a result of risk assessment, a certain number is obtained for each threat, which characterizes the risk level caused by this threat. Thus, it is possible to rank threats in order to reduce the risk caused by them -Table <ref type="table" target="#tab_2">3</ref>. This is necessary for the correct choice of adequate protection measures. Cross-reference 590</p><p>The risk propensity of assets shows how vulnerable an asset is. Its level will affect the selection of protection measures and means for the asset, as well as the priority of their implementation. The list of assets in their risk propensity descending order is presented in Table <ref type="table" target="#tab_3">4</ref>. Archives 947</p><p>In addition to the above-mentioned ACAPP security problems related to the threats and vulnerabilities inherent in most IS, a number of organizational and psychological issues should also be noted. In particular, weak awareness of the information importance and its protection by the management staff and employees of printing companies. Accordingly, the management staff is reluctant to invest in information protection and make any organizational decisions on this issue, and the employees show misunderstanding and failure to take most protection measures, which leads to negligence, and then complete disregard for protection measures. This attitude to the information security can cause significant losses to the company, which will be simply disproportionate to the cost of information security in their values.</p><p>Another important problem is the imperfection of Ukrainian legislation in the information protection area and almost complete absence of domestic standards in this area.</p><p>In order to achieve the required level of ACSPP protection, it is necessary to reduce the risks level to an acceptable one or eliminate the risks altogether. This can be achieved by reducing the criticality, probability and/or frequency of threats. One can also reduce the probability of vulnerabilities to this threat or eliminate them altogether. This is achieved by implementing appropriate protection measures.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusion</head><p>The functional scheme of risk management for ACSPP is constructed with a detailed definition of various risk components. The assets identification and the analysis of their functional dependency are carried out. A three-level scale is selected to assess ACSPP assets and, accordingly, the risks.</p><p>The risk level assessment is made for each of ACSPP assets on the basis of identified threats and their vulnerabilities. As a result of risk assessment, threats are ranked in order of risk reduction and the dependency of assets on their risk propensity is revealed.</p><p>The risk assessment process for automated control systems of printing production is studied. The following results are obtained: methods of risk assessment for ACSPP are analysed, which are based on the identification and assessment of assets, threats and vulnerabilities of the printing company; the assets of a typical ACSPP are determined, the dependencies between them are defined and their assessment is carried out. For ACSPP assets, the value of which is assessed as "high", methods of providing the additional protection are suggested; the risk assessment for ACSPP is carried out, as a result of which a list of 27 main threats of ACSPP is obtained, which require the introduction of additional protection measures. It is defined that the threats to ACSPP with the greatest risk are unauthorized use of equipment, unintentional deletion of critical information, unintentional violation of the information integrity; the risk propensity of ACSPP assets is analysed. As a result, the most risk propensity assets are the prestige and services provided by the company, as well as internal data circulating in ACSPP and the central database of ACSPP.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Block diagram of the intelligent systems interaction (ACS-LPR)</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc></figDesc><table><row><cell cols="2">Component assessment of assets</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>№</cell><cell>Name of the asset</cell><cell>Material</cell><cell>Non-material</cell><cell>Replacement</cell><cell>Total</cell></row><row><cell></cell><cell></cell><cell>assessment</cell><cell>assessment</cell><cell>cost</cell><cell>assessment</cell></row><row><cell>1</cell><cell>Prestige of the</cell><cell>-</cell><cell>3</cell><cell>-</cell><cell>3</cell></row><row><cell></cell><cell>organization</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>2</cell><cell>Services</cell><cell>-</cell><cell>3</cell><cell>-</cell><cell>3</cell></row><row><cell>3</cell><cell>Output files</cell><cell>-</cell><cell>3</cell><cell>1</cell><cell>3</cell></row><row><cell>4</cell><cell>Archives</cell><cell>1</cell><cell>1</cell><cell>-</cell><cell>1</cell></row><row><cell>5</cell><cell>Hard copies</cell><cell>1</cell><cell>1</cell><cell>1</cell><cell>1</cell></row><row><cell>6</cell><cell>Internal data</cell><cell>-</cell><cell>3</cell><cell>-</cell><cell>3</cell></row><row><cell>7</cell><cell>Central database</cell><cell>-</cell><cell>3</cell><cell>-</cell><cell>3</cell></row><row><cell>8</cell><cell>Auxiliary software</cell><cell>2</cell><cell>3</cell><cell>1</cell><cell>3</cell></row><row><cell>9</cell><cell>ACSPP software</cell><cell>2</cell><cell>3</cell><cell>1</cell><cell>3</cell></row><row><cell></cell><cell>modules</cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2</head><label>2</label><figDesc>Identification and assessment of risks of losses under threat</figDesc><table><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell cols="5">Risk value R for the asset j</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Threat</cell><cell>Networks</cell><cell>Servers</cell><cell>Mobile PCs</cell><cell>Workstations</cell><cell>ACSPP software</cell><cell>modules</cell><cell>Auxiliary software</cell><cell>Central database</cell><cell>Internal data</cell><cell>Hard copies</cell><cell>Archives</cell><cell>Output files</cell><cell>Services</cell><cell>Prestige of the</cell><cell>organization</cell><cell>Total risk</cell></row><row><cell>1</cell><cell>2</cell><cell>3</cell><cell>4</cell><cell>5</cell><cell>6</cell><cell></cell><cell>7</cell><cell>8</cell><cell>9</cell><cell cols="3">10 11 12</cell><cell>13</cell><cell cols="2">14</cell><cell>15</cell></row><row><cell></cell><cell></cell><cell></cell><cell cols="9">Human physical threats aimed at IS resource</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Unauthorized</cell><cell cols="16">0 234 156 702 1053 1053 1053 1053 351 0 1053 1053 1053 8814</cell></row><row><cell>use of</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>equipment</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Disclosure,</cell><cell cols="15">0 729 486 486 729 729 729 729 243 0 729 729 729</cell><cell>7047</cell></row><row><cell>transfer or loss</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>of access</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>delimitation</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>attributes</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell cols="11">Human physical threats aimed at IS communication channel</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="3">Cable damage 513 0</cell><cell>0</cell><cell cols="6">0 114 114 114 114</cell><cell>0</cell><cell cols="5">0 513 513 513</cell><cell>2508</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell cols="7">Local physical threats aimed at IS</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Fire</cell><cell cols="4">144 144 96 96</cell><cell>0</cell><cell></cell><cell>0</cell><cell>0</cell><cell>0</cell><cell cols="6">48 48 144 144 144</cell><cell>1008</cell></row><row><cell>Cross-</cell><cell cols="4">270 45 30 30</cell><cell>0</cell><cell></cell><cell>0</cell><cell>0</cell><cell>0</cell><cell cols="3">60 20 45</cell><cell>45</cell><cell cols="2">45</cell><cell>590</cell></row><row><cell>reference</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Failure of</cell><cell cols="5">729 729 486 486 0</cell><cell></cell><cell>0</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell cols="3">729 729</cell><cell>3888</cell></row><row><cell>external</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>energy sources</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Failure of</cell><cell cols="5">972 972 648 648 0</cell><cell></cell><cell>0</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell cols="3">972 972</cell><cell>5184</cell></row><row><cell>internal</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>(reserve)</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>energy sources</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 3</head><label>3</label><figDesc>List of ACSPP main threats in risk descending order № Threat</figDesc><table><row><cell>Total risk</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>Table 4</head><label>4</label><figDesc>List of assets in their risk propensity descending order №</figDesc><table><row><cell></cell><cell>Asset</cell><cell>Risk</cell></row><row><cell></cell><cell></cell><cell>propensity</cell></row><row><cell>1</cell><cell>Prestige of the organization</cell><cell>19035</cell></row><row><cell>2</cell><cell>Services</cell><cell>19035</cell></row><row><cell>3</cell><cell>Internal data</cell><cell>15669</cell></row><row><cell>4</cell><cell>Central database</cell><cell>13506</cell></row><row><cell>5</cell><cell>Output files</cell><cell>12177</cell></row><row><cell>6</cell><cell>Auxiliary software</cell><cell>11454</cell></row><row><cell>7</cell><cell>ACSPP software modules</cell><cell>7098</cell></row><row><cell>8</cell><cell>Servers</cell><cell>4527</cell></row><row><cell>9</cell><cell>Workstations</cell><cell>3834</cell></row><row><cell>10</cell><cell>Hard copies</cell><cell>3704</cell></row><row><cell>11</cell><cell>Networks</cell><cell>3465</cell></row><row><cell>12</cell><cell>Mobile PCs</cell><cell>3288</cell></row><row><cell>13</cell><cell></cell><cell></cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Selection of the control system of the printing company, ComputerArt</title>
		<author>
			<persName><forename type="first">V</forename><surname>Kovaleva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yu</forename><surname>Samarin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal for printers and publishers</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="page" from="61" to="64" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Management systems of the printing company</title>
		<author>
			<persName><forename type="first">V</forename><surname>Kovaleva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yu</forename><surname>Samarin</surname></persName>
		</author>
		<idno>Cited: 27.08.2018</idno>
		<ptr target="http://compuart.ru/article.aspx?id=18248&amp;iid=846" />
	</analytic>
	<monogr>
		<title level="j">ComputerArt. Journal for printers and publishers</title>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<author>
			<persName><forename type="first">B</forename><surname>Durnyak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Petriashvili</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sabat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Maiba</surname></persName>
		</author>
		<title level="m">Defining the security level of technological processes on the basis of risk assessment</title>
				<meeting><address><addrLine>Lviv, UAP</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<author>
			<persName><forename type="first">V</forename><surname>Vitlinsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Velikoivanenko</surname></persName>
		</author>
		<title level="m">Riskology in economics and entrepreneurship</title>
				<meeting><address><addrLine>Kyiv, KNEU</addrLine></address></meeting>
		<imprint>
			<publisher>Monograph</publisher>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Mathematical methods for assessing the optimal parameters of risk processes</title>
		<author>
			<persName><forename type="first">T</forename><surname>Lashev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Korolev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Shargin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Systems and means of informatics</title>
				<meeting><address><addrLine>Moscow</addrLine></address></meeting>
		<imprint>
			<publisher>IPI RAS</publisher>
			<date type="published" when="2002">2002</date>
			<biblScope unit="page" from="127" to="141" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Analysis of risks in automated document management systems, Modelling and information technology</title>
		<author>
			<persName><forename type="first">V</forename><surname>Sabat</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Collection of scientific works</title>
				<meeting><address><addrLine>Kyiv</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="volume">73</biblScope>
			<biblScope unit="page" from="198" to="204" />
		</imprint>
	</monogr>
	<note>, IPME named after H.E</note>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">Economic risks and methods of measuring them, Tutorial</title>
		<author>
			<persName><forename type="first">L</forename><surname>Donets</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006">2006</date>
			<publisher>Centre for Educational Literature</publisher>
			<pubPlace>Kyiv</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title/>
		<ptr target="https://tzi.com.ua/downloads/1.4-001-2000.pdf" />
	</analytic>
	<monogr>
		<title level="j">NDSTPI of the Department of Special Telecommunication Systems and Information Protection of the Security Service of Ukraine from</title>
		<imprint>
			<biblScope unit="volume">04</biblScope>
			<biblScope unit="page">805</biblScope>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<idno>NDTPI 1</idno>
		<title level="m">information in computer systems from unauthorized access</title>
				<imprint>
			<biblScope unit="page" from="1" to="002" />
		</imprint>
	</monogr>
	<note>General instructions for the protection of</note>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<idno>NDTPI 1</idno>
		<title level="m">Typical regulation for information protection service in an automated system</title>
				<imprint>
			<biblScope unit="page" from="4" to="5" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Density-Based Risk Assessments within Soft Safety Domains</title>
		<author>
			<persName><forename type="first">V</forename><surname>Sherstjuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zharikova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Levkivskiy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Gusev</surname></persName>
		</author>
		<ptr target="http://ceur-ws.org/Vol-2805/paper26.pdf" />
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">2805</biblScope>
			<biblScope unit="page" from="355" to="372" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Risk assessment framework based on the model of humaninfrastructure system</title>
		<author>
			<persName><forename type="first">V</forename><surname>Sherstjuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zharikova</surname></persName>
		</author>
		<ptr target="http://ceur-ws.org/Vol-2740/20200037.pdf" />
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="37" to="52" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Information technologies of formation of intellectual decision-making strategies under conditions of cognitive failures</title>
		<author>
			<persName><forename type="first">L</forename><surname>Sikora</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Lysa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Fedevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Navytka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Tkachuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Dronyuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of Computational &amp; Information Technologies for Risk-Informed Systems, CITRisk-2020</title>
				<meeting>Computational &amp; Information Technologies for Risk-Informed Systems, CITRisk-2020<address><addrLine>Kherson, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="233" to="254" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Information and logic cognitive technologies of decision-making in risk conditions</title>
		<author>
			<persName><forename type="first">L</forename><surname>Sikora</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Tkachuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Lysa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Dronyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Fedevych</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 1st International Workshop on Intelligent Information Technologies &amp; Systems of Information Security, IntellTSIS 2020</title>
				<meeting>the 1st International Workshop on Intelligent Information Technologies &amp; Systems of Information Security, IntellTSIS 2020<address><addrLine>Khmelnytskyi; Ukraine</addrLine></address></meeting>
		<imprint>
			<biblScope unit="volume">2623</biblScope>
			<biblScope unit="page" from="340" to="356" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
