<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>ORCID:</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Method for Identification of Critical Information Infrastructure Objects of the State</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Serhii Toliupa</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ivan Parkhomenko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Viktoriia Antoniuk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>1 Liubomyra Huzara ave., 03058, Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>24 Bogdana Gavrylishina Str, 04116, Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>1919</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>The progressive development of information technology in the world has caused an incredible dependence of the population on services provided by various areas of critical infrastructure. Currently, access to these services and their quality is one of the key characteristics of the country's infrastructure, and the smooth operation and protection of these services is considered a necessary and integral part of state protection of developed countries. The increase in methods and resources for protecting different infrastructures has determined the need to rank critical infrastructure. Taking this into account, the paper analyzes the regulatory framework, global approaches to the identification of critical infrastructure objects and developed a method of identifying critical information infrastructure, which will allow the identification of critical objects of a certain industry and determine the degree of their criticality, which systematizes the objects of critical infrastructure and facilitates the choice of means and ways to protect them from threats. critical infrastructure, critical information infrastructure, identification of critical infrastructure objects, method for identification of critical information infrastructure objects, critical objects To date, natural and man-made threats, the level of terrorism, the scale and complexity of cyberattacks have increased significantly. And the number of cyberattacks aimed at impressing various areas of critical infrastructure is growing steadily. The most famous cyberattack in Ukraine was Petya, which caused considerable damage to the country's financial infrastructure.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        2022 Copyright for this paper by its authors.
individual facilities, the destruction or disruption of which will have serious negative consequences for
national security. As world experience shows, the process of formation of the regulatory framework in
the field of critical infrastructure protection is quite time-consuming and lengthy. The laws of different
countries on the protection of critical infrastructure are often inconsistent, and there are some problems
with the mechanisms for classifying facilities as critical infrastructure. Each state determines its critical
infrastructure, taking into account its specifics, the criticality of individual sectors and the importance
of certain services for society and security of the state. Thus, for each country the concept of "critical
infrastructure" has its own meaning and specificity [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>Therefore, research in the field of detection and protection of critical infrastructure from cyber
threats is relevant and necessary. That is why there is a need to develop a critical information
infrastructure identification method, which will allow the identification of critical objects of a particular
industry and determine the degree of their criticality, which systematizes critical infrastructure and
facilitate the choice of means and ways to protect them from threats .</p>
    </sec>
    <sec id="sec-2">
      <title>2. Analysis of existing research and approaches</title>
      <p>
        In Ukrainian legislation, the term critical infrastructure (CI) is understood as a set of state
infrastructure facilities that are most important for the economy and industry, the functioning of society
and public safety and the decommissioning or destruction of which may affect national security and
defense, natural environment, lead to significant financial losses and human casualties. Objects of CI
are enterprises and institutions (regardless of ownership) of such industries as energy, chemical
industry, transport, banks and finance, information technology and telecommunications (electronic
communications), food, health care, utilities, which are strategically important for the functioning of
the economy and security of the state, society and population [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <sec id="sec-2-1">
        <title>CI sectors are are presented in Fig. 1:</title>
        <p>
          To ensure the protection of the most important critical information infrastructure (CII) objects, it is
necessary, first of all, to identify these objects according to certain criteria or critical parameters. In [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]
an analytical study of the regulatory framework of developed countries on various variations of key
concepts in the field of CII protection (critical infrastructure, CII, critical infrastructure protection, CII).
        </p>
        <p>
          The United States deserves the most attention from the world experience. An important component
of critical infrastructure is its information component - critical information infrastructure, the concept
of protection of which, first developed in the United States, was later developed and adapted in most of
the world's leading countries. As world practice shows, the process of formation of the regulatory
framework in the field of critical infrastructure protection is quite time-consuming and lengthy. Each
state determines its critical infrastructure, taking into account the criticality of individual sectors and
the importance of certain services for the state's economy and the security of its society. Despite all the
differences, there is a common feature of the critical infrastructure of different countries, namely: its
undeniable importance for the security of citizens, society and the state [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ].
        </p>
        <p>
          Since Ukraine is joining the European Union, it is impossible not to mention the recommended
measures to protect CI, which should be followed by Ukraine:
• develop a national CI protection program;
• ensure a level of health, technological security, socio-economic well-being that would guarantee
the "resilience" of the nation to threats;
• unify efforts aimed at protecting CIs by providing a single state body reporting on this issue to
coordinate the actions of public authorities responsible for individual industries to which CI facilities
belong;
• identify public authorities responsible for CI sectors and relevant private companies;
• create conditions for effective interaction and exchange of information, data and experience
between EU member states, government agencies and the private sector;
• to contribute to the creation of a harmonized methodology of risk analysis [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ].
        </p>
        <p>
          Examining scientific publications and analytical materials related to international experience in the
formation and implementation of critical infrastructure protection, we can conclude that the
organization of activities for critical infrastructure protection in different countries is implemented
differently. In some countries, the organizational model is defined and forms a certain structure, and
measures - targeted and systemic, and in others it is unsystematic, when activities are carried out
informally [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]. The document [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] introduces new concepts of "critical information infrastructure" (CII)
and is interpreted as "a set of objects of critical information infrastructure" and "object of critical
information infrastructure", which reveals more clearly the previous term, and means communication
or technological system of a critical infrastructure object, a cyberattack which will directly affect the
sustainable functioning of such a critical infrastructure object ”. The document [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] provided a new term
"identification of the object of critical information infrastructure", which means "the procedure of
assigning the object of information infrastructure to the objects of critical information infrastructure".
        </p>
        <p>
          As for the Ukrainian legislation, there is currently no complete definition of the term "critical
information infrastructure", and as a result, there is no list of objects of this category. It should be noted
that in Ukraine the protection of objects, which according to world practice belong to this category, is
regulated by numerous regulations, which are mainly internal [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ].
        </p>
        <p>
          With regard to approaches to CII identification, given the work [
          <xref ref-type="bibr" rid="ref10 ref6 ref7 ref8 ref9">6-10</xref>
          ], today in developed countries
there are some methods and models that can provide managers with relevant management opportunities
to make informed and correct decisions on the protection of critical infrastructures. A special link for
critical objects is the method of their detection. Known approaches include:
        </p>
        <p>
          • Clausewitz's theory - the meaning of which is to find the "central point" or "central place" of the
enemy's system, where its main forces and powers are concentrated. This theory assumes that the
objects of study have several mandatory parameters - critical capabilities, critical needs, critical
vulnerabilities [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
        </p>
        <p>
          • A. Barabashi's theory - The essence of the approach is that each unstructured network under the
action of a set of known rules and laws, primarily financial and social, after some time perceives the
appropriate structure, without any external influence, organized by a circle of more valuable or
important knots. The centers of gravity in this theory are formed for each of the sectors under the
influence of the laws of economics, evolution, social development and other rules that allow
unstructured networks to become self-organizing [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
        </p>
        <p>
          • Graph theory - in the identification of CI objects, graph theory represents CI as an oriented graph.
The vertices of this graph are critical objects, and the edges of the graph symbolize the relationships
between these objects [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ].
        </p>
        <p>
          • Priority model - According to [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ], the essence of this model is to calculate the risk index of the
object, which depends on the rating of the object on the scale of the category of factors and the
significance of this factor.
        </p>
        <p>
          • Categorization - to identify dangerous objects, it is necessary to determine the criterion of
unacceptable damage - the lower level of damage, after which the object should be classified as
dangerous (critical) [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ].
        </p>
        <p>
          • CIMS system - is a simulation system that combines geospatial information and four-dimensional
(space-time) effect [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
        </p>
        <p>
          • The Athena model is a software tool designed to analyze large complex systems of strategic scale,
as well as to identify the interdependence and interrelationships of their elements. This model uses the
methods of Barlow and Warden. The Barlow method determines the horizontal correlation of elements
with weights. Warden's method determines the vertical connection of interdependence [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
        </p>
        <p>
          • Methodology of assignment critical important objects (CIO) - In the process of identification of
objects for the purpose of their assignment to the category of CIO the system of criteria of assignment
of objects of the state and non-state property to CIO is used [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
        </p>
        <p>As we can see, in the modern world there are enough methods of identification of CI objects, but for
their further use it is necessary to evaluate them according to the following criteria: (1) clarity of
mathematical calculations, (2) independent evaluation, (3) proximity to exact values, (4) universality,
(5) the lack of complexity of implementation, (6) taking into account the architecture of systems and
networks and (7) the speed of calculations. Comparison of CI object identification methods are shown
in table 1.</p>
        <p>After analyzing the data obtained in the table, we can draw reasoned conclusions that most of the
methods considered are difficult to implement and do not take into account the architecture of systems
and networks. The most successful approaches are those developed on the basis of graph theory and
simulation. Also, some results of A. Barabashi's theory and categorization can be used to study CII
objects. With this in mind, the aim of the work is to develop a formalized method of identification of
critical information infrastructure of the state, which will assess the level of criticality of the elements
of the CII.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Description of the developed method of identification of objects of critical information infrastructure</title>
      <p>The proposed method of identification of CII objects of the state is implemented in the following 6
stages:
• Stage 1. Selection of research objects.
• Stage 2. Assess the importance of the object on the main indicators.
• Stage 3. Early analysis of the object attribution to the CI.
• Stage 4. Assess the importance of the object on additional indicators.
• Stage 5. Final analysis of the object attribution to the CI.
• Stage 6. Assess the level of criticality.</p>
      <p>The input data of the method are: objects of research and actual values of indicators of the first and
second levels. Initial data of the method: a complex indicator of the importance of the object, by which
a particular object belongs to the CI of the state. Next, we consider in detail each of the stages of the
proposed method of identification of CII objects:</p>
      <sec id="sec-3-1">
        <title>Stage 1. Selection of research objects.</title>
        <p>This stage consists in identifying the objects that can be attributed to the CI, and their main and
additional indicators. The determination of significance coefficients is based on expert procedures of
pairwise comparisons: experts make judgments as to how much one indicator exceeds another in terms
,
|

For matrix (2.1), the eigenvector (EGV) is found  В = ( 1,  2, … ,   ′
,  ′ ), the elements of which
are the values of the weights of the indicators indicated above. To quantify the consistency of the
judgments of one expert on the differences in indicators, the indicator is used (2.2):
  =
 
( −1)∙ 
−
,
where</p>
        <p>− the maximum eigenvalue of the matrix В; k − matrix order В;   − random index k.
The closer to 0 the value of   , the more harmonious are the pairwise comparisons of the expert.</p>
        <p>As a result of the expert survey, the relevant coefficients of significance for the main and additional
indicators were determined. Significance of indicators in assessing the importance of the object are
shown in table 2.
Significance of indicators in assessing the importance of the object
of influencing the decision to include the object in the list of CI of the state. To determine the weight
of the indicators based on the results of pairwise comparisons, a positive asymmetric matrix is formed:
№
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16</p>
        <p>Indicators</p>
        <sec id="sec-3-1-1">
          <title>P1 − the cost of annual output of marketable products</title>
        </sec>
        <sec id="sec-3-1-2">
          <title>P2 − total number of production staff</title>
        </sec>
        <sec id="sec-3-1-3">
          <title>P3 − book value of fixed assets</title>
        </sec>
        <sec id="sec-3-1-4">
          <title>P4 − the share of the main products of the object in the products of the same type produced in the country</title>
        </sec>
        <sec id="sec-3-1-5">
          <title>P5 − violation of the control of the state or region in an emergency</title>
        </sec>
        <sec id="sec-3-1-6">
          <title>P6 − damaging the authority of the state, including in the international</title>
        </sec>
        <sec id="sec-3-1-7">
          <title>P7 − disclosure of state secrets of confidential scientific, technical and commercial information</title>
        </sec>
        <sec id="sec-3-1-8">
          <title>P8 − violation of combat readiness and combat capability of the Armed arena</title>
        </sec>
        <sec id="sec-3-1-9">
          <title>Forces</title>
        </sec>
        <sec id="sec-3-1-10">
          <title>P9 − violation of the stability of the financial or banking systems</title>
        </sec>
        <sec id="sec-3-1-11">
          <title>P10 − large-scale destruction of national resources (natural, agricultural, food, production, information)</title>
        </sec>
        <sec id="sec-3-1-12">
          <title>P11− territory of infection (pollution) in case of accident at the facility</title>
        </sec>
        <sec id="sec-3-1-13">
          <title>P12 − the number of people who may be affected in the event of an accident at the facility</title>
        </sec>
        <sec id="sec-3-1-14">
          <title>P13 − violation of life support systems of cities and settlements</title>
        </sec>
        <sec id="sec-3-1-15">
          <title>P14 − mass violations of law and order</title>
        </sec>
        <sec id="sec-3-1-16">
          <title>P15 − stop of continuous productions an accident at the facility</title>
        </sec>
        <sec id="sec-3-1-17">
          <title>Total</title>
        </sec>
        <sec id="sec-3-1-18">
          <title>P16 − accidents and catastrophes on a regional scale as a consequence of</title>
          <p>Coefficient of
significance, Kі
(2)</p>
        </sec>
        <sec id="sec-3-1-19">
          <title>Indicators P1 P2 P3</title>
          <p>P4
P11
P12</p>
        </sec>
        <sec id="sec-3-1-20">
          <title>Indicators P1 P2 P3</title>
          <p>P4
P11</p>
          <p>P12</p>
          <p>Also, the actual values of the indicators of the research objects, which are available in the
documentation of the research objects, are determined. Table 3 shows an example of filling in the actual
values of indicators of research objects</p>
          <p>The values of the coefficient of significance of the main indicators and the actual values of the main
indicators of the research objects are transferred to the next stage.</p>
          <p>Stage 2. Assess the importance of the object on the main indicators.</p>
          <p>This stage is to calculate a comprehensive indicator of the importance of the object on the main
indicators. The main indicators are those that can be easily obtained from the documentation available
at the site (P1-P4; P11; P12). Let's move on to the step-by-step description of this stage:
 Step 2.1 Defining the boundaries of key indicators.</p>
          <p>This step determines the minimum (Min) and maximum (Max) values of each of the indicators,
based on the actual values on the object. That is, if there are 3 objects and 3 values, then by comparing
these values is finding the smallest and largest of them. Table 4 shows an example of filling the
minimum and maximum values.
where Ki – coefficient of significance of the indicator;
Xi – actual value of indicators;
Min and Max – respectively the lowest and highest value of the indicator.</p>
          <p>P1
P2
P3
P4
P11
P12
P1
P2
…
P15
P16
34,4
0,5
44,1
4,3
40
20
Minimum
value, Min
34,4
0,5
114,6</p>
          <p>3,2
153,5
14,1
100
100
Maximum
value, Max
114,6
3,2


114,6</p>
          <p>3,2
153,5
14,1
100
100
Actual
value, Xi
114,6
3,2</p>
          <p>This stage allows to assign the object to the CI ahead of schedule, if the assessment of the importance
of the object on the main indicators is more than 0.25, ie the condition is met:</p>
          <p>&gt; 0,25,
where Yзаг – indicators of the importance of the object.</p>
          <p>According to these calculations, for each object separately, fill in the table, for example, fill in for
the object №1. Tables 5 and 6 provide an example of calculating the importance of an object №1.
</p>
          <p>Step 2.3 Determine the assessment of the importance of the object.</p>
          <p>For each object, the amount of contributions is calculated:

№
(5)</p>
          <p>Using the example of the table data, we will determine whether the objects are suitable for CII ahead
of schedule. It is obvious that two of them belong to the CII ahead of schedule. The values of the
coefficient of significance of additional indicators and the actual values of additional indicators of the
research objects are transferred to the next stage.</p>
          <p>Stage 4. Assess the importance of the object on additional indicators.</p>
          <p>This stage consists in calculating a complex indicator of the importance of the object on additional
indicators and is implemented in three steps.</p>
          <p> Step 4.1 Determining the actual values of indicators.</p>
          <p>Additional indicators include those that are determined expertly (P5-P10; P13-P16) and are
equal to 0 or 1 depending on the expert assessment.</p>
          <p>The procedure for determining additional indicators is as follows: the situation is defined as
indicators (P5-P10; P13-P16;), which are divided into two groups "no" or "yes": if the emergency at the
facility does not lead to the situation, the actual the value of the indicator (Xi) is equal to 0, if the
emergency on the object leads to the situation, the actual value (Xi) is equal to 1.</p>
          <p>Also, the definition of additional indicators can be represented by an expression:
  = {
0,   5−10,13−16 = "
1,   5−10,13−16 = "
"</p>
          <p>,
"
where Xi – actual value of indicators.</p>
          <p>Table 8 shows an example of filling in the actual values of additional indicators of the object №3.</p>
        </sec>
        <sec id="sec-3-1-21">
          <title>P5 − violation of the control of the state or region in an emergency</title>
        </sec>
        <sec id="sec-3-1-22">
          <title>P6 − damaging the authority of the state, including in the international arena</title>
        </sec>
        <sec id="sec-3-1-23">
          <title>P7 − disclosure of state secrets of confidential scientific, technical and commercial information</title>
        </sec>
        <sec id="sec-3-1-24">
          <title>P8 − violation of combat readiness and combat capability of the Armed Forces</title>
        </sec>
        <sec id="sec-3-1-25">
          <title>P9 − violation of the stability of the financial or banking systems</title>
        </sec>
        <sec id="sec-3-1-26">
          <title>P10 − large-scale destruction of national resources (natural, agricultural, food, production, information)</title>
        </sec>
        <sec id="sec-3-1-27">
          <title>P13 − violation of life support systems of cities and settlements</title>
        </sec>
        <sec id="sec-3-1-28">
          <title>P14 − mass violations of law and order</title>
        </sec>
        <sec id="sec-3-1-29">
          <title>P15 − stop of continuous productions P16 − accidents and catastrophes on a regional scale as a consequence of an accident at the facility</title>
          <p> Step 4.2 Determine the contribution of each indicator of the object to the assessment of its
importance. This step is identical to step 2.2 in the second stage: the value of the contributions of each
indicator is calculated, but for additional indicators:</p>
          <p>=1…16 =   ∙ Хі,
where Ki – coefficient of significance of the indicator; Xi – actual value of indicators
 Step 4.3 Determine the assessment of the importance of the object.</p>
          <p>For each object, the sum of the contributions of all indicators, both basic and additional, is
calculated, and this amount is a complex indicator of the importance of the object.</p>
          <p>The value of the object's importance indicator is passed to the next stage.</p>
          <p>Stage 5. Final analysis of the object attribution to the CI.</p>
          <p>At this stage, you can finally determine the affiliation of the object to the CI and the same criteria as
in the early analysis: if the assessment of the importance of the object on the main indicators is more
Actual
value, Xi
0
0
(6)
1
than 0.25, the object belongs to the CI. If this value is less, even after additional calculations, then the
object can not be attributed to the CI, which should be protected more. Using the example of the table
data, we will determine whether object №3 can be attributed to CII objects after additional calculations.
Table 8 shows an example of assessing the importance of specified objects for all indicators.</p>
          <p>Obviously, after additional calculations, the latter object cannot be classified as a CI, which should
be strongly protected.</p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>Stage 6. Assess the level of criticality.</title>
        <p>At this stage, after the final analysis, it becomes possible to determine the level of criticality of the
object of study, which facilitates the choice of methods of protection of the object of CI of the state.
Table 10 shows the level of criticality of objects with color gradation.</p>
        <p>
          Criticality levels:
 IV-level – critical objects - facilities of national importance, extensive connections and
significant impact on other infrastructure. These facilities are included in the National list of critical
infrastructure facilities, requirements are formed to ensure their protection;
 III-level – vital objects, the dysfunction of which will lead to a crisis situation of regional
importance. These facilities are included in the National list of critical infrastructure facilities,
requirements are formed for the delimitation of tasks and powers of public authorities and critical
infrastructure operators, aimed at ensuring their protection and restoration of functioning.;
 II-level – important objects, the priority of protection of which is to ensure rapid recovery of
functions through diversification and reserves. Operators are responsible for the stability of the
operation of facilities in accordance with the requirements established by law for interaction with
public authorities;
 I-level – objects, the direct protection of which is the responsibility of the operator, which must
have a plan to respond to the crisis [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusions</title>
      <p>Thus, in the course of the work the analysis of normative-legal documents in the field of CI of
different countries of the world, including the legislation of Ukraine was carried out, as a result of which
it was established that Ukraine needs:
 Improving the regulatory framework in the field of CI, especially the introduction of the law on
critical infrastructure and its protection;
 Creation of a single public authority in the field of CI regulation;
 Organizations of international cooperation and public-private partnership for the exchange of
experience and support for the regulation of the field of CI.</p>
      <p>Also, an analysis of some existing methods of assigning objects to the CI was conducted, as a result
of which it was found that:
 The considered methods are difficult to implement and do not take into account the architecture
of systems and networks;
 The sphere of CI requires the creation of a single and formalized method of classifying objects
as CI of the state.</p>
      <p>
        In the context of a hybrid war against Ukraine, threats to critical infrastructure have increased
significantly, as evidenced by damage to facilities and cyberattacks on energy infrastructure, which
have shown the vulnerability of critical infrastructure of the state to new types of threats. Creating an
effective system of critical infrastructure protection in Ukraine is an urgent task to be addressed in the
framework of the overall reform of the security and defense sector, taking into account the full range of
threats and ensuring the interconnectedness of different systems [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>The result of the work is a developed method of identification of critical information infrastructure
of the state, which by assessing the importance of objects by basic and additional indicators, and
calculating the level of criticality allows identifying critical infrastructure and determine their degree
of criticality. The proposed method of identification of critical information infrastructure objects can
be used to study important objects for any branches of critical information infrastructure of the state
and determine the degree of their criticality, which allows forming a list of critical infrastructure objects.</p>
    </sec>
    <sec id="sec-5">
      <title>5. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S.</given-names>
            <surname>Toliupa</surname>
          </string-name>
          , I. Parkhomenko and
          <string-name>
            <given-names>H.</given-names>
            <surname>Shvedova</surname>
          </string-name>
          ,
          <article-title>"Security and Regulatory Aspects of the Critical Infrastructure Objects Functioning and Cyberpower Level Assesment"</article-title>
          ,
          <source>2019 3rd International Conference on Advanced Information and Communications Technologies (AICT)</source>
          ,
          <year>Jul</year>
          .
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <article-title>[2] Resolution of the Cabinet of Ministers of Ukraine Some issues of critical infrastructure № 1109 (2020, October 9</article-title>
          ). Vidomosti Verkhovnoyi Rady Ukrayiny.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>D.</given-names>
            <surname>Biriukov</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Kondratov</surname>
          </string-name>
          , Critical Infrastructure Protection:
          <article-title>Challenges and prospects for implementation in Ukraine</article-title>
          .
          <source>Kyiv: NISS</source>
          ,
          <year>2012</year>
          , 96 p.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <article-title>[4] Law of Ukraine on the basic principles of cybersecurity in Ukraine № 45 (</article-title>
          <year>2017</year>
          ).
          <article-title>Vidomosti Verkhovnoyi Rady Ukrayiny</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <article-title>[5] Resolution of the Cabinet of Ministers of Ukraine Some issues of critical information infrastructure № 943 (2020, October 9</article-title>
          ). Vidomosti Verkhovnoyi Rady Ukrayiny.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kondratiev</surname>
          </string-name>
          , “
          <article-title>Modern trends in the study of critical infrastructure in foreign countries”</article-title>
          ,
          <source>Foreign Military Review, no. 1</source>
          ,
          <year>2012</year>
          . URL: http://pentagonus.ru/publ/sovremennye_tendencii_v_ issledovanii_kriticheskoj_infrastruktury_v_zarubezhnoj_stranakh_
          <year>2012</year>
          /19-1-0-2082
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <article-title>[7] CIS - critical information segments URL: https://habr</article-title>
          .com/ru/post/144597/
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>A.B. Stislavsky</surname>
          </string-name>
          <article-title>Construction of a methodology for ensuring transport security based on categorization: collection of scientific works</article-title>
          .
          <source>Bulletin of the National University of Water Giving and Environmental Protection. Рівне: НУВГП, Part</source>
          <volume>2</volume>
          . No.
          <volume>3</volume>
          (
          <issue>47</issue>
          ),
          <year>2009</year>
          . URL: https://www.dissercat.com/content/upravlenie-riskami
          <article-title>-narusheniya-bezopasnosti-infrastrukturytransportnogo-kompleksa/read</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Gnatyuk</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sydorenko</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Duksenko</surname>
            <given-names>O</given-names>
          </string-name>
          .
          <article-title>Modern approaches to critical infrastructure objects detection and identification :</article-title>
          <source>Ukrainian Scientific Journal of Information Security</source>
          ,
          <year>2015</year>
          , vol.
          <volume>21</volume>
          , issue 3 p.
          <fpage>269</fpage>
          -
          <lpage>275</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>V.P.</given-names>
            <surname>Slomyansky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Yu</surname>
          </string-name>
          . Glebov,
          <string-name>
            <given-names>R.N.</given-names>
            <surname>Galkin</surname>
          </string-name>
          <article-title>On some methodological approaches to the categorization of critical objects. All-Russian Research Institute for Civil Defense and Emergencies EMERCOM of Russia</article-title>
          . URL: https://vestnik.igps.ru/wp-content/uploads/V44/15.pdf
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <article-title>Bill of Ukraine on critical infrastructure and its protection (</article-title>
          <year>2019</year>
          ). URL: https://ips.ligazakon.net/document/view/jh7yw00a?an=
          <fpage>472</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Ivanyuta</surname>
            <given-names>S.P.</given-names>
          </string-name>
          <article-title>Threats to critical infrastructure and their impact on national security</article-title>
          .
          <source>Department of Energy and Technogenic Safety.</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>