<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Method of Forming the Functional Security Profile for the Sectoral Information and Telecommunication Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Sergiy Gnatyuk</string-name>
          <email>s.gnatyuk@nau.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksiy Yudin</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Viktoriia Sydorenko</string-name>
          <email>v.sydorenko@ukr.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Artem Polozhentsev</string-name>
          <email>artem.polozhencev@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Rashit Brzhanov</string-name>
          <email>r.brzhanov@gmail.com</email>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>1, Liubomyr Huzar Ave, Kyiv, 03058</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>State Scientific and Research Institute of Cybersecurity Technologies and Information Protection</institution>
          ,
          <addr-line>3 Maksym</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Yessenov University</institution>
          ,
          <addr-line>13 Microdistrict, Aktau, 130000</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Zaliznyak Str.</institution>
          ,
          <addr-line>Kyiv, 03142</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>272</fpage>
      <lpage>283</lpage>
      <abstract>
        <p>Global trends of increasing and improving the quality of cyberattacks have led to the actualization of the Information and Telecommunications Systems (ITS) protection, in particular, sectoral, which are critical for the functioning of society, socio-economic development and ensuring the information component of national security. Given the need of national security and the need to implement a systematic approach for solving the issues of critical infrastructure protection, at the national level, the creation of protection systems for such infrastructure is one of the priorities in reforming the defense and security sectors of Ukraine. Thus, there is a need to develop methods and models for classifying the ITS as critical infrastructure to ensure the national security. This article proposes a structural-functional method for determining the functional security profile of the subsystem of the sectoral ITS, which allows to determine the basic functional security profile of the sectoral ITS by determining the sectoral requirements for confidentiality, integrity, availability Information and telecommunication systems, critical infrastructure, critical infrastructure object, cybersecurity, security assessment, functional security profile.</p>
      </abstract>
      <kwd-group>
        <kwd>1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>and
observability and more fully formulate criteria for assessing the security of information
circulating in critical ITS. The article was followed by an experimental study on the example
of ITS of the National System of Confidential Communication, which tested the adequacy of
the method's response to changes in input data.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Introduction</title>
      <p>Global trends of increasing and improving the quality of cyberattacks have led to the actualization of
the Information and Telecommunications Systems (ITS) protection, in particular, sectoral, which are</p>
      <p>2022 Copyright for this paper by its authors.
critical for the functioning of society, socio-economic development and ensuring the information
component of national security.</p>
      <p>Given the need of national security and the need to implement a systematic approach for solving the
issues of critical infrastructure protection, at the national level, the creation of protection systems for
such infrastructure is one of the priorities in reforming the defense and security sectors of Ukraine.</p>
      <p>Therefore, the main problems that need to be solved are: 1) the absence of common criteria and
methodology for the ITS infrastructure objects assigning as critical infrastructure; 2) the absence of
common methodology for assessing security threats of critical infrastructure facilities.</p>
      <p>
        Problem Statement. According to the Law of Ukraine “On the Basic Principles of Cybersecurity of
Ukraine” [
        <xref ref-type="bibr" rid="ref23 ref25 ref28 ref28 ref28 ref30 ref31 ref36 ref36 ref36 ref38 ref38 ref38">1</xref>
        ] defines the need to form a list of critical information infrastructure facilities and the need
to develop criteria and procedures for attributing objects to critical infrastructure facilities. Also, the
Decree of the President of Ukraine No 96 / 2016 On the decision of the National Security and Defense
Council of Ukraine on January 27, 2016 “On the Cybersecurity Strategy of Ukraine” [
        <xref ref-type="bibr" rid="ref16 ref22 ref24 ref26 ref26 ref27 ref27 ref29 ref32 ref32 ref33 ref33 ref34 ref34 ref35 ref35 ref37 ref37 ref39 ref39 ref40 ref40 ref41 ref41 ref5">2</xref>
        ] provides that
the cybersecurity of critical infrastructure should determine the criteria for attributing informational
(automated), telecommunications, the ITS to critical information infrastructure.
      </p>
      <p>Therefore, the legal acts of Ukraine declare the need to develop common criteria and methodology
for classifying the ITS infrastructure as critical infrastructure. At the same time, it should be noted that
the use of qualitative assessments is associated with the complexity of their comparison and application.
First of all, this is due to the complexity of expert selection and the specificity of expert data processing.
These limitations are less typical for quantitative methods of criticality calculation.</p>
      <p>The mentioned above limitations indicate that there is an important scientific problem in determining
the criteria for classifying the ITS as a critical information infrastructure.</p>
      <p>
        Analysis of the recent studies and publications. In accordance with the Law of Ukraine “On
Protection of Information in the Information and Telecommunication Systems” [
        <xref ref-type="bibr" rid="ref2 ref21 ref3 ref4">3</xref>
        ] and the Law of
Ukraine “On Protection of Personal Data” [4] the following information is subject to mandatory
protection: information that is the property of the state, or information with restricted access. In order
to ensure the protection of information in the ITS, the Comprehensive Information Security System
(CISS) must be developed. It is also should be noted that the Decision of the Cabinet of Ministers of
Ukraine “On Approval of General Requirements for Cybersecurity of Critical Infrastructure
Facilities” [5] establishes a standard for the implementation of the CISS at a critical information
infrastructure facility.
      </p>
      <p>At the same time, the Normative Documents in the field of Technical Protection of Information of
Ukraine (ND TPI), which describe the procedure for the CISS creation [6] and the criteria for the
information security assessment [7] are outdated and do not meet the current requirements [8; 9]. For
example, the criteria are defined in the ND TPI [7] have not been updated since 1999, the requirements
for the procedure of the CISS creation have not been updated since 2005. On the other hand, the
international normative documents are revised and clarified almost annually [10].</p>
      <p>Therefore, there is a problem in the necessity of creating the CISS and the lack of standards,
according to which the CISS must be created.</p>
      <p>In the most countries of the world, the information and telecommunications industry is considered
to be one of the most critical sectors (after energy and transport sectors) [8]. Given that, the experimental
verification of the developed provisions was carried out on the example of the National System of
Confidential Communication (NSCC).</p>
      <p>In accordance with the Law of Ukraine “On the National System of Confidential
Communications” [11] the NSCC is a set of the special telecommunications systems, which allow to
exchange the information with limited access by cryptographic and technical means, in the interests of
public and local authorities.</p>
      <p>According to the Decree of the Cabinet of Ministers of Ukraine “On some issues in the interagency
information exchange organization in the NSCC” [12], the main functions of the NSCC are:
 ensuring the exchange of public, proprietary and confidential information between the entities
and/or users of the NSCC.
 creation of a technological basis, in which open and proprietary information of public
authorities and local governments, military formations, government agencies, state enterprises,
institutions and organizations circulate for the information resources integration in the ITS;
 ensuring interaction between the ITS of public authorities and local governments, military
formations, government agencies, state enterprises, institutions and organizations;
 ensuring operation of the special ITS of the NSCC entities, using a special transport network
of the NSCC;
 ensuring secure access to the Internet for the government agencies.</p>
      <p>Considering these functions, it can be assumed that the NSCС (or its subsystems), belong to the
critical category. Moreover, when classifying the ITS as critical, it is necessary to consider not only the
declared functions, but the actual functions that the system currently executes.</p>
      <p>In addition, in the ITS criticality determination, it is necessary to take into account that according to
the Presidential Decree of 18.04.2005 No. 663 “On the provision of government communication of
officials” [13] the system of government communication is provided by resources of the
telecommunications operators on the entire territory of Ukraine.</p>
      <p>According to the "Instruction on the organization of networks and systems technical operation of
the state system of government communication of Ukraine" [14] one of the main elements of the
government communication station is a digital control room of the NSCС transport network for the
special purpose.</p>
      <p>The purpose of article. The purpose of this article is to develop and experimentally investigate a
method of the Functional Security Profile (FSP) formation of the sectoral ITS.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Theoretical bases</title>
    </sec>
    <sec id="sec-4">
      <title>3.1. Structural and logical model of the functional security profile formation of the sectoral ITS</title>
      <p>The ND TPI of Ukraine [7] determines the evaluation result as a rating, which represents as an ordered
series (a list) of alphanumeric combinations, indicating the level of implemented services. It is
necessary to implement the method of the FSP formation, which will take into account the requirements
of this document and allow to use the results of the method in the construction of the CISS in
combination with the level of guarantees.</p>
      <p>The proposed structural and logical model for the FSP determination of the sectoral ITS (Fig. 1) is
based on the use of the basic (initial) FSP. It is defined taking into account the requirements from [7].
(FPZB)
1
(Si)
(Si)
(Si)
4
2
3
(Ui)
(Spec)
5
6
(FPZ2)
(FPZ1)
(FPZE)
The set of the basic systems of the sectoral ITS is defined (Si) in Block 1.</p>
      <p>The information flows (interfaces) of interaction between the main systems of the sectoral ITS (Ui)
are defined in Block 2.</p>
      <p>The specific (sectoral) requirements (in relation to the basic ones) which are applied to the СIAO
(Confidentiality, Integrity, Availability and Observability), to (Si) are defined in Block 3, forming the
FSP – FPZ1.</p>
      <p>The regulatory documents and the best practices (ISO / IEC, NIST, NERC CIP, ISACA, CERT,
SANS, PCI DSS, COBIT, HIPAA, CSA, ITAF) are analyzed in Block 4 and show the additional (or
detailed) requirements (Spec).</p>
      <p>The comparison of the additional requirements to the semantics of the ND TPI 2.5-004-99 and the
FPZ2 requirements formation is carried out in Block 5.</p>
      <p>The correction of the basic FSP, or development of the FSP for the new basic system of the sectoral
ITS (FPZE) takes place in Block 6.</p>
      <p>The developed model allows to use any other security profile that experts can offer. It also allows to
formalize the implemented security services, taking into account additional security requirements,
based on the world's best practices.</p>
    </sec>
    <sec id="sec-5">
      <title>3.2. Structural and functional method of the functional security profile formation of the sectoral ITS</title>
      <p>The structural and functional method of the FSP formation of the sectoral ITS consists of the following
steps:</p>
      <p>Step 1. Determination of the set of basic systems (elements) of the sectoral ITS (Si) and information
flows (interfaces) of interaction of these systems (Ui);</p>
      <p>Step 2. Formation of specific (sectoral) requirements (in relation to the basic) for the СIAO to (Si)
– FPZ1;</p>
      <p>Step 3. Identification of the normative documents and the best practices of additional or detailed
requirements (Spec);</p>
      <p>Step 4. Formation of additional requirements in the form of the ND TPI semantics and the formation
of requirements FPZ2;</p>
      <p>Step 5. Correction of the basic FPZ, or development of the FPZE for a new system of the sectoral
ITS – FPZE.</p>
      <p>The proposed structural and functional method of the FSP formation of the sectoral ITS takes into
account modern experience and the best international practices and allows (in comparison with the
current ND TPI 2.5-004-99) to formulate criteria for assessing the security of information circulating
in the critical ITS in more detail.</p>
    </sec>
    <sec id="sec-6">
      <title>4. Research result</title>
    </sec>
    <sec id="sec-7">
      <title>4.1. The experimental study of the structure and functional method of the functional security profile formation of the sectoral ITS</title>
      <p>The use of the developed method was analyzed on the example of the NSCC ITS.</p>
      <p>Step 1: Determination of the set of basic systems (elements) of the sectoral ITS (Si) and
information flows (interfaces) of interaction of these systems (Ui).</p>
      <p>According to [12], the NSCC consists of the following isolated ITS of the special communication
(hereinafter referred as "NSCC systems"):
1. The NSCC special transport network is a telecommunication network which is designed to
transit traffic between the NSCC systems.
2. The special NSCC ITS of their subjects which is designed to exchange public, proprietary and
confidential information on behalf of the public authorities, legal entities and individuals who order
and/or receive the NSCC services.
3. The NSCС special mobile communication network which is designed for exchange of
proprietary and confidential information on behalf of the NSCC subjects while staying in stationary
and non-stationary conditions using the mobile subscriber terminals, protection of which is ensured
by cryptographic and technical methods. A special cellular communication network operates as a
part of the special mobile communication network of the NSCC.
4. The special ITS for a secure video conferencing of the NSCC, which is designed for real-time
official meetings for the public and local authorities’ heads.
5. A secure electronic document management system of the NSCC which is designed to ensure
the operational document exchange of the proprietary and confidential information between the
public authorities, local governments. It also helps to analyze and monitor the implementation of the
Decisions of the President of Ukraine and the Cabinet of Ministers of Ukraine. This system includes
a Certification Authority which is designed to provide the state and local authorities with electronic
digital signature services.
6. A secure Internet access system provided for government authorities and designed to protect
government information resources processed in the ITS, which are accessed via the Internet.</p>
      <p>The most critical systems from the information leakage point of view are: the special transport
network, the special ITS of secured videoconferencing and secured electronic document management
system (hereinafter referred as "EDMS").</p>
      <p>According to the functional purpose, the dedicated systems can be grouped as follows:
The special transport network – transport system, information protection system, management
system;</p>
      <p>The ITS videoconferencing and EDMS – service systems (provision of services to the subscriber).</p>
      <p>Step 2: Formation of specific (sectoral) requirements (in relation to the basic) for the СIAO to
(Si) – FPZ1.</p>
      <p>As of now, the core of the NSCC includes the following main components [15]:</p>
      <p>The CUCM – Cisco Unified Communications Manager. This is the central component of the Cisco
communications platform that connects to and interacts with other Cisco services such as IM &amp;
Presence, Contact Center Express, Pagginig, Media Sence, Webex, external auxiliary services and
information systems such as Microsoft Active Directory (LDAP), DNS, Aurus Directory and others.
The CUCM is a cluster of two virtual machines. The main server processes call and serves subscribers
in a normal mode is called Publisher, the second server, despite being active, but does not serve
subscribers in the normal mode, is called Subscriber.</p>
      <p>The Cisco IM &amp; Presence service is a virtual machine, or cluster of two virtual machines. The service
allows to collect and publish information about the status of the user and expands its communication
capabilities. The user’s availability shows the possibility to establish a communication with him, and also
provides information about the possible ways of communication, such as audio communication, e-mail,
interactive messaging. General information is displayed in the Jabber client application, which increases the
speed and efficiency of interaction with colleagues, by selecting the most efficient way for communication.
The central back-end component is called the Extensible Communications Platform (XCP). The XCP uses
the SIP / SIMPLE and Extensible Messaging and Presence Protocol (XMPP). The primary server that
processes messages and serves subscribers in normal mode is called Publisher, the second server, despite
being active, but does not serve subscribers in normal mode, is called Subscriber.</p>
      <p>The MediaSence service allows a customer to record, view, listen and download conversations
through a web interface. The Cisco Webex Server service is a system for online conferences, meetings,
video conferences and webinars. Clients are loaded into the web-browser as plugins, then connected to
the server. It consists of the several virtual machines. An administrator virtual machine, a reverse
proxyserver virtual machine (for access from the Internet), the Webex conference virtual machine, and a
media processing virtual machine. Depending on the number of simultaneous sessions and the ability
to access from the Internet, the number of virtual machines may change.</p>
      <p>The R-PC is Prime Collaboration Software. It provides a single interface for subscriber management
and all communication services, as well as quick configuration of equipment and integration with the
data network. It has the following functions: end-to-end monitoring, sessions review (planned, executed
and current sessions), quick troubleshooting in network or terminal, latency control, packet loss
(operational diagnosis), monitoring the video route and voice sessions in the network, CPU statistics,
memory and interfaces of Cisco equipment review, jitter, packet loss, DSCP data for Cisco equipment
review. The CTI-CMS is Cisco Meeting Server 1000 Bundle. The software platform for conferencing
provides the following features:
 connection of any participant using Cisco or third-party video terminals, Cisco Jabber client,
Cisco Meeting App (client program or WebRTC compatible browser) or Skype for Business;
 deployment of the solutions on Cisco CMS platforms, with support for up to 96 high-definition
video ports in a single rack space (1RU);
 unlimited growth with a seamless scalability and unified user environment
(platformindependent function);
 costs сontrol by the bandwidth usage optimization between the data centers.</p>
      <p>The ASA5516-FPWR is the ASA 5516-X with FirePOWER services. A multifunctional firewall, which
is designed for advanced protection against the latest threats and malware. The Cisco ASA firewall with
FirePOWER services provides a seamless threat protection before, during, and after an attack, by combining
the Cisco ASA firewall and the industry-leading Sourcefire threat and malware protection capabilities in a
single appliance.</p>
      <p>Cisco ASA with FirePOWER services offers the following features:
 remote access to VPN network and advanced clustering features that provide fast and secure access,
and high system reliability;
 advanced application monitoring and control supports more than 3,000 application-level controls
which can activate the installed threat detection policies in the Intrusion Prevention System (IPS) in a
risk event, significantly enhancing protection;
 FirePOWER is the Next-Generation Intrusion Prevention System (NGIPS), which significantly
enhances threat protection and provides the full contextual information about users, infrastructure,
applications and their content, timely detects multi-vector threats and automates the protection process;
 URL filtering by reputation and category provides comprehensive control over suspicious web
traffic, as well as policy enforcement for hundreds of millions of URLs in more than 80 categories;
 advanced anti-malware software provides high intrusion detection, low-cost ownership and an
optimal level of protection, making it possible to quickly detect, analyze and prevent the spread of a
malware and other emerging threats that may be missed on other layers of protection.</p>
      <p>Taking into account the above components of the NSCС core, as well as the decomposition of their
systems (Table A.1), outline the security requirements regarding to each of the objects (systems). The
specified requirements are listed in Table A.2 (the listed requirements are already implemented in the
NSCC).</p>
      <p>The formation of the sectoral requirements for the NSCC subsystems (FPZ1) is carried out taking
into account the standard FSP of the processed information from unauthorized access [16, 24] and
taking into account Table A.2.</p>
      <p>FSP of the transport system - CA-2, CE-3, CT-2, CO-1, IA-2, IE-2, IT-1, IR-2, AF-2, AQ-2, AD-2,
AR-2, OS-1, OI-2, OC-1, OD-2, OP-1, OT-2, ON-2, OE-1, OR-1;</p>
      <p>FSP of the service system - CA-2, CE-2, CT-2, CO-1, IA-2, IE-1, IT-1, IR-1, AF-2, AQ-2, AD-2,
AR-2, OI-2, OC-1, OD-3, OP-1, OT-2, ON-2, OE-2;</p>
      <p>FSP of the protection system - CA-2, CE-3, CT-2, CO-1, IA-2, IE-2, IT-1, IR-2, AF-2, AQ-2,
AD2, AR-2, OS-1, OI-2, OC-1, OD-3, OP-2, OT-2, ON-2, OE-1, OR-1;</p>
      <p>FSP of the management system - CA-2, CE-2, CT-2, CO-1, IA-2, IE-2, IT-1, IR-2, AF-1, AQ-2,
AD-2, AR-1, OS-1, OI-2, OC-1, OD-3, OP-2, OT-2, ON-2, OE-1, OR-1.</p>
      <p>The final FSP of the NSCC can be calculated as a combination of the FSPs of the integral systems,
namely - CA-2, CE-3, CT-2, CO-1, IA-2, IE-2, IT-1, IR-2, AF-2, AQ-2, AD-2, AR-2, OS-1, OI-2,
OC1, OD-3, OP-2, OT-2, ON-2, OE-2, OR-1.</p>
      <p>Step 3: Identification of the normative documents and the best practices of additional or
detailed requirements (Spec).</p>
      <p>The following regulatory documents describe the security requirements for the NSCC systems: NIST SP
800-53A. Guide for Assessing the Security Controls in the Federal Information Systems and
Organizations [17]; NIST SP800-53. Security and Privacy Controls for the Federal Information Systems
and Organizations [18]; State standards of Ukraine (DSTU) ISO / IEC 27002: 2015 Information
technologies. Methods of protection. Code of practices for information security measures [19]; ISO/IEC
15408-1:2009 Evaluation criteria for IT security [20].</p>
      <p>Step 4: Formation of additional requirements in the form of the ND TPI semantics and the
formation of requirements FPZ2.</p>
      <p>During the formation of additional requirements in the form of semantics of ND TPI, it is advisable to
use the relevant normative documents [16; 21-24].</p>
      <p>Taking into account the security requirements for regional information systems [18], the additional
requirements for the FSP of the NSCC can be formed (Table 1), where ACO_VUL means advanced
composition vulnerability analysis services, AVA_VAN means enhanced methodological vulnerability
analysis, ADV_ARC means additional material on security architecture (self-protection, domain
distribution, traversal impossibility), ADV_INT means internal structure.</p>
    </sec>
    <sec id="sec-8">
      <title>5. Conclusion</title>
      <p>Therefore, the article analyzes the current normative documents, which are used to assess the
effectiveness of critical infrastructure information system’s protection. It was determined, that
international and regional normative documents propose to assess the effectiveness of system protection
through the risk assessment (the lower the risk, the higher the protection effectiveness). At the same
time, Ukrainian ND TPI No. 2.5-004-99 determines the assessment result as an ordered series (listing)
of alphanumeric combinations, which indicate the level of services implemented, combined with the
level of guarantees. Thus, there is a contradiction between the approaches for assessing the effectiveness
of system’s protection, which grounds the direction of this article.</p>
      <p>In addition, in the article the structural and functional method of the FSP formation of the sectoral
ITS was developed. It consists of five stages. The proposed method takes into account current world
experience in the field of information protection and allows to formulate criteria for assessing the
security of information that circulates in the critical ITS in more detail, in comparison with the
mentioned ND TPI. Implementation of the proposed method allows to adjust the basic FSP of the
sectoral ITS, by defining the sectoral requirements for confidentiality, integrity, availability and
observability.</p>
      <p>Moreover, an experimental study of the proposed method was carried out using the developed
method of forming the FSP of the sectoral ITS. A decomposition of the NSCC into component systems,
subsystems and components was performed, sectoral requirements for information protection were
formulated, additional requirements in the form of ND TPI semantics were determined, and the basic
functional profile of security [25-26] was adjusted.</p>
    </sec>
    <sec id="sec-9">
      <title>6. References</title>
      <p>[13] Decree of the President of Ukraine of April 18, 2005 No. 663 “On providing government officials
with communication”.
[14] Order of the State Service of Special Communication and Information Protection of Ukraine dated
18.05.2015 No.07 “On approval of the instruction on the organization of technical operation of
networks and complexes of the state system of governmental communication of Ukraine”.
[15] Report on research work “Determination of ways to create a special system of unified
communications in the interests of subscribers of government agencies, institutions and
organizations”, code “Platform” (DR № 0116U000072T).
[16] ND TPI 2.5-005-99 “Classification of automated systems and standard functional profiles of
protection of processed information from unauthorized access”, State Service of Special
Communication and Information Protection of Ukraine, 1999.
[17] National Institute of Standards and Technology Special Publication 800-53A. Guide for Assessing
the Security Controls in Federal Information Systems and Organizations: Building Effective
Security Assessment Plans. June 2010.
[18] National Institute of Standards and Technology Special Publication SP800-53. Security and</p>
      <p>Privacy Controls for Federal Information Systems and Organizations. April 2013.
[19] DSTU ISO / IEC 27002: 2015 Information technologies. Methods of protection. Code of practices
for information security measures.
[20] ISO/IEC 15408-1:2009 Information technology - Security techniques - Evaluation criteria for IT
security - Part 1: Introduction and general model, The International Organization for
Standardization and The International Electrotechnical Commission, 2009.
[21] ND TPI 2.6-002-2015 “Procedure for comparing the functional safety components defined by ISO / IEC
15408 with the requirements of ND TPI 2.5-004-99”, State Service of Special Communication and
Information Protection of Ukraine, 2015.
[22] ND TPI 2.6-003-2015 “Procedure for comparing the security confidence components defined by
ISO / IEC 15408 with the requirements of ND TPI 2.5-004-99”, State Service of Special
Communication and Information Protection of Ukraine, 2015.
[23] ND TPI 2.7-013-2016 “Guidelines for comparing the results of the evaluation of information protection
against unauthorized access for compliance with the requirements of the ISO / IEC 15408 with the
requirements of ND TPI 2.5-004-99”, State Service of Special Communication and Information
Protection of Ukraine, 2016.
[24] O. Yudin, “Structural-logical and functional models for determining the functional security profile
of the ITS subsystems”, in: Proceedings of the XX International scientific-practical conf.
Information Security in Information and Telecommunication Systems, Kyiv, May 22-24, 2018,
pp. 50-51, 2018.
[25] Z. Hu, R. Odarchenko, S. Gnatyuk, M. Zaliskyi, A. Chaplits, S. Bondar, V. Borovik, “Statistical
Techniques for Detecting Cyberattacks on Computer Networks Based on an Analysis of Abnormal
Traffic Behavior”, International Journal of Computer Network and Information Security (IJCNIS),
Vol.12, No.6, pp.1-13, 2020.
[26] Z. Hu, I. Dychka, M. Onai, Yu. Zhykin, “Blind Payment Protocol for Payment Channel Networks”,
International Journal of Computer Network and Information Security (IJCNIS), Vol.11, No.6,
pp.22-28, 2019.</p>
    </sec>
    <sec id="sec-10">
      <title>7. Appendix</title>
      <p>–
Terminal equipment (communication terminal, video
communication terminal, data transmission</p>
      <p>workstation)</p>
      <p>Providing customer service
E-mail servers, the CA, registry and directory servers,</p>
      <p>CUCM server, domain controller server, video call</p>
      <p>server, contact center server
Backup storage servers, Prime Collaboration
Assurance, Prime Collaboration Provisioning,
workstation management</p>
      <p>Operator system (Sd3)
Channel level monitoring and protection system</p>
      <p>(Sd22)
Transport and network layer monitoring and
protection system (Sd23)</p>
      <p>Information protection system</p>
      <p>Office system (St1) Protection of terminal equipment and premises
System of the subscriber equipment (St11) Security package of a phone, phone connection block
Network access system (St12) Switch Security Package, Router Security Package,
cryptographic protection of information</p>
      <p>Auxiliary protection systems (St13) Alarm sensors, fire alarm sensors, alarm panel
Telecommunication operator system (St2) Protection of communication channels and operator
equipment
Physical level system (St21) Cable damage detection devices, signal amplifier
(repeater) control devices, multiplexer</p>
      <p>Operator equipment protection
Access Switch Security Package, Node Security</p>
      <p>Package, Service Switch Security Package
Router Security Package, Switch Security Package,</p>
      <p>Monitoring System Security Package, Management</p>
      <p>System Security Package, Workstation Control System
Auxiliary protection systems (Sd24) Physical Communication lines Security Package, Alarm
System Security Package
Operator system (Sd3) Implementation of systems management to the
service provider
Physical level protection system (Sd31) Devices for cable damage detection, devices for signal
amplifiers (repeaters) control, multiplexer
Access Switch Security Package, Node Security
Package, Service Switch Security Package, DDoS</p>
      <p>Protector
Channel level monitoring and protection system
(Sd32)
2
Transport and network layer monitoring and</p>
      <p>protection system (Sd33)
Transport and network layer system (St23)
Cryptographic security management system (Sm22)
Application software management system (Sm23)</p>
      <p>Subscriber equipment management system (Sm24)
Management system</p>
      <p>Management and control of terminal equipment
Sensors for opening the installation box, sensors for
connecting subscriber equipment, sensors for access
to cryptographic protection of information
Switch and router settings, switch and router
software, redundant power supply software
Switch and router software, backup power supply
software, subscriber equipment software</p>
      <p>Managing the telecom operator's systems
Software for the multiplexer management, switch and</p>
      <p>router management software, server hardware
management software, firewall and DDoS protection</p>
      <p>management software
Information cryptographic protection software, the</p>
      <p>CA management software
Application management servers’ software</p>
      <p>Remote user configuration software</p>
      <p>Office system (St1)
System of the subscriber equipment (St11)
Transport and network layer system (St33)</p>
      <p>Application systems (St34)</p>
      <p>Network access system (St12)</p>
      <p>Object
2</p>
      <p>Transport network</p>
      <p>Description
3
5
5.1
6
6.1
6.2
6.3
7
7.1
7.2
7.3
7.4
8
8.1
8.2
8.3
8.4
8.5
8.6
9
9.1
9.2
9.3</p>
      <p>2
Subscriber equipment application systems</p>
      <p>(Ss11)</p>
      <p>Operator system (Ss2)</p>
      <p>Operator communication systems (Ss21)
–</p>
      <p>IR-1, AF-1, AD-1, ON-1, ON-2, OP-1, OE-1, OT-2
CA-1, CA-2, CE-2, IA-1, IA-2, IE-2, AR-1, AF-1, AD-1, ON-1,
ON2, OI-1, OI-2, OC-1, OD-2, OT-2, OP-1, OP-2, OE-1, OS-1, OR-1</p>
      <p>AF-1, AD-1, OT-2, ON-1, OT-2</p>
      <p>–
CA-2, IA-1, AF-1, AQ-1,AD-1, ON-2, HИ-2, OD-2, OC-1, OP-1,</p>
      <p>OT-2
CA-1, CA-2, IA-1, IA-2, AR-1, AF-1, AD-1, ON-1, ON-2, OI-1,
OI</p>
      <p>2, OC-1, OD-2, OP-1, OE-1
CA-2, CT-2, CO-1, CE-2, IA-1, IA-2, IE-1, IT-1, IR-1, AR-1, AF-2,
AQ-2, AD-2, AR-2, ON-2, OI-2, OD-1, OD-3, OC-1, OP-1, OT-2,</p>
      <p>OE-1
AF-1, AD-1, OT-2, ON-1</p>
      <p>–
CA-2, IA-1, AF-1, AQ-1,AD-1, ON-2, HИ-2, OD-2, OC-1, OP-1,</p>
      <p>OT-2
CA-1, CA-2, IA-1, IA-2, AR-1, AF-1, AQ-1, AD-1, ON-1, ON-2,
OI</p>
      <p>1, OI-2, OC-1, OD-2, OP-1, OE-1, OT-2
CA-2, CT-2, CO-1, CE-2, IA-1, IE-1, IT-1, IR-1, AF-2, AQ-2, AD-2,
AR-2, ON-2, OI-2, OD-1, OD-3, OC-1, OP-1, OP-2, OT-2, OE-1
CT-2, CA-1, CA-2, CO-1, CE-1, IT-1, IA-1, IA-2, IR-1, IR-2, IE-1,
AR-1, AF-1, AQ-2, AD-2, ON-2, OI-1, OI-2, OC-1, OD-3, OP-1,</p>
      <p>OP-2, OT-2, OE-1
CA-2, CE-3, IA-2, IE-2, OC-1, OE-1, ON-2, OT-2, OP-2, OI-2,
OS</p>
      <p>1, OR-1
AF-1, AD-1, OT-2, ON-1</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>Corrected FSP</surname>
          </string-name>
          CT-2, CA-2, CO-1, CE-3, IT-1, IA-3,
          <issue>IR2</issue>
          , IE-2, AR-3, AF-2, AQ-2, AD-2, OS-1, ON-3, ON-4, ON-5, OI-2, OC-1, OD-
          <volume>2</volume>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <article-title>OP-3, OT-2, OT-3, OE-2, OR-1 CT-3, CA-3, CO-1, CC-1, CC-2</article-title>
          , CE-4, IA-2, IE-1, IT-1, IR-1, AR-3, AF-2,
          <issue>AQ2</issue>
          , AD-2, ON-4, OI-2, OC-1, OD-3, OP-
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <article-title>3, OT-2, OT-3, OE-2 CT-3, CA-3, CO-1, CC-1</article-title>
          , CE-4, IA-4,
          <issue>IE2</issue>
          , IT-1, IR-2, AR-3, AF-2, AQ-2, AD-2, AD-3, OS-1, ON-4, OI-2, OC-1, OD-
          <volume>3</volume>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <source>OP-3</source>
          , OT-2, OT-3, OE-2, OR-1 CA-2, CE-2, CT-2, CO-1, IT-1, IA-3,
          <issue>IR2</issue>
          , IE-2, AR-3, AF-2, AQ-2, AD-2,
          <issue>ON3</issue>
          , OI-2, OC-1, OD-2, OD-3, OP-3, OT-
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          2, OE-2, OS-1, OR-
          <volume>1</volume>
          [1]
          <string-name>
            <surname>Ukraine. Laws.</surname>
          </string-name>
          “
          <article-title>On the basic principles of cybersecurity in Ukraine”: official text: [adopted by</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <source>the Verkhovna Rada on October 5</source>
          ,
          <year>2017</year>
          ].
          <article-title>Kyiv, Information of the Verkhovna Rada of Ukraine,</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          2017, No.
          <volume>45</volume>
          , p.
          <fpage>403</fpage>
          . [2]
          <string-name>
            <surname>Decree</surname>
            <given-names>of</given-names>
          </string-name>
          <source>the President of Ukraine No. 96</source>
          ,
          <year>2016</year>
          “
          <article-title>On the decision of the National Security and</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <source>Defense Council of Ukraine of January 27</source>
          ,
          <year>2016</year>
          <article-title>" On the Cyber Security Strategy of Ukraine”</article-title>
          . [3]
          <string-name>
            <surname>Ukraine. Laws.</surname>
          </string-name>
          “
          <article-title>On the protection of information in information</article-title>
          and telecommunications
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <article-title>systems”: official text: [adopted by the Verkhovna Rada on July 5,</article-title>
          <year>1994</year>
          ]. Kyiv, Information of
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <source>the Verkhovna Rada of Ukraine</source>
          ,
          <year>1994</year>
          , No.
          <volume>31</volume>
          , p.
          <fpage>287</fpage>
          . [4]
          <string-name>
            <surname>Ukraine. Laws.</surname>
          </string-name>
          “
          <article-title>On personal data protection”: official text: [adopted by the Verkhovna Rada on June 1,</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <source>2010]. Kyiv, Information of the Verkhovna Rada of Ukraine</source>
          ,
          <year>2010</year>
          , No.
          <volume>34</volume>
          , p.
          <fpage>481</fpage>
          . [5]
          <article-title>Resolution of the Cabinet of Ministers of Ukraine “On approval of the General requirements for</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <source>cyber protection of critical infrastructure” No. 518 of 19.06</source>
          .
          <year>2019</year>
          . [6]
          <string-name>
            <given-names>ND</given-names>
            <surname>TPI</surname>
          </string-name>
          <article-title>3</article-title>
          .
          <fpage>7</fpage>
          -003-05 “
          <article-title>The order of works on creation of complex system of protection of information in</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <source>Protection of Ukraine</source>
          ,
          <year>2005</year>
          . [7]
          <string-name>
            <given-names>ND</given-names>
            <surname>TPI</surname>
          </string-name>
          <article-title>2</article-title>
          .
          <fpage>5</fpage>
          -004-99 “
          <article-title>Criteria for assessing the security of information in computer systems from</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <source>1999. [8] Report on research work “Research and analysis of information security problems at critical</source>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          infrastructure facilities”, code “Infrastructure” (No.
          <year>0114U000038d</year>
          ). [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Honchar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Leonenko</surname>
          </string-name>
          ,
          <string-name>
            <surname>O. Yudin.</surname>
          </string-name>
          “
          <article-title>Analysis of threats and vulnerabilities of sectoral automated</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <volume>2</volume>
          (
          <issue>26</issue>
          ), pp.
          <fpage>9</fpage>
          -
          <lpage>14</lpage>
          ,
          <year>2013</year>
          . [10]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hu</surname>
          </string-name>
          , Yu. Khokhlachova,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sydorenko</surname>
          </string-name>
          , I. Opirskyy, “
          <article-title>Method for Optimization of Information</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <source>Systems and Applications (IJISA)</source>
          , Vol.
          <volume>9</volume>
          , No.
          <volume>12</volume>
          , pp.
          <fpage>46</fpage>
          -
          <lpage>58</lpage>
          ,
          <year>2017</year>
          . [11]
          <string-name>
            <surname>Ukraine</surname>
          </string-name>
          . Laws. “
          <article-title>On the National System of Confidential Communication”: official</article-title>
          . text: [adopted
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <source>by the Verkhovna Rada on January 10</source>
          ,
          <year>2002</year>
          ]. Kyiv, Information of the Verkhovna Rada of
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <surname>Ukraine</surname>
          </string-name>
          ,
          <year>2002</year>
          , No.
          <volume>15</volume>
          , p.
          <fpage>103</fpage>
          . [12]
          <article-title>Resolution of the Cabinet of Ministers of Ukraine “Some issues of interdepartmental exchange of</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <article-title>information in the National system of confidential communication”</article-title>
          <source>No. 303 from 14.05</source>
          .
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          3
          <string-name>
            <given-names>Router</given-names>
            <surname>Security</surname>
          </string-name>
          <string-name>
            <surname>Package</surname>
          </string-name>
          , Switch Security Package, Monitoring System Security Package, Management
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <source>CA-2</source>
          , CE-3, IA-2, IE-2, OC-1, OE-1, ON-2, OT-2, OI-2, OS-1, OR-
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>CA-1, CA-2, CE-3,IA-1, IA-2, IE-2, AR-1, AF-1, AD-1, ON-1, ON-</mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>2, OT-2, OI-1, OI-2, OS-1, OC-1, OD-2, OP-1, OP-2, OE-1, OR-1</mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <source>AF-1</source>
          , AD-1, OT-2, ON-1
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <source>CA-2</source>
          , IA-1, AF-1, AQ-1,AD-1, ON-1, ON-2, HИ-2, OD-2, OC-
          <volume>1</volume>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          <source>OT-2</source>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>CA-1, CA-2, IA-1, IA-2, AR-1, AF-1, AD-1, ON-1, ON-2, OI-1, OI-</mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>2, OC-1, OD-2, OP-1, OE-1</mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>CA-1, CA-2, IA-1, IA-2, IR-2, AR-1, AF-1, AQ-1, AQ-2, AD-1, ON-</mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>1, OI-1, OI-2, OC-1, OD-2, OT-2, OE-1</mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          <source>CA-2, CT-2. CO-1</source>
          , CE-2, IA-1, IE-1, IT-1, IR-1, AF-2, AQ-2, AD-
          <volume>2</volume>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          <source>AR-2, ON-2</source>
          , OI-2, OD-1, OC-1, OT-2, OE-1
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          <source>CA-2</source>
          , IA-1, AF-1, AQ-1,AD-1, ON-1, ON-2, HИ-2, OD-2, OC-
          <volume>1</volume>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          <source>OT-2</source>
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>CA-1, CA-2, IA-1, IA-2, AR-1, AF-1, AD-1, ON-1, ON-2, OI-1, OI-</mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>2, OC-1, OD-2, OE-1</mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>CA-1, CA-2, IA-1, IA-2, AR-1, AF-1, AD-1, ON-1, ON-2, OI-1, OI-</mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>2, OC-1, OD-2, OE-1</mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          <source>CA-2, CT-2. CO-1</source>
          , CE-2, IA-1, IE-1, IT-1, IR-1, AF-2, AQ-2, AD-
          <volume>2</volume>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          <source>AR-2, ON-2</source>
          , OI-2, OD-1, OC-1, OT-2, OE-1
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          <article-title>Service systems (provision of services) Office system (Ss1) -</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>