=Paper= {{Paper |id=Vol-3187/paper8 |storemode=property |title=Design Methodology of Cybersecurity Situational Center |pdfUrl=https://ceur-ws.org/Vol-3187/paper8.pdf |volume=Vol-3187 |authors=Ihor Subach,Dmytro Mogylevych,Artem Mykytiuk,Volodymyr Kubrak,Stanislav Korotayev |dblpUrl=https://dblp.org/rec/conf/cpits/SubachMMKK21 }} ==Design Methodology of Cybersecurity Situational Center== https://ceur-ws.org/Vol-3187/paper8.pdf
Design Methodology of Cybersecurity Situational Center
Ihor Subach1,2, Dmytro Mogylevych1,2, Artem Mykytiuk1, Volodymyr Kubrak1,
and Stanislav Korotayev1
1
  National Technical University of Ukraine “Kyiv Polytechnic Institute named after Igor Sikorsky,”
4 Verkhnoklyuchova str., Kyiv, 03056, Ukraine
2
  Kruty Heroes Military Institute of Telecommunications and Informatization, 45/1 Moscow str., Kyiv, 01011, Ukraine

               Abstract
               The process of designing a cybersecurity situational center as a complex organizational and
               technical system is considered. It is proposed to consider the problem of designing the
               cybersecurity situational center from a formal point of view, as a problem of a class of multi-criteria
               multi-parameter problems, and as an approach to solving it we chose the decomposition of the
               design process into separate stages using the methods of successive approximations. The main
               stages are highlighted and described, the principles of implementing a systematic approach to the
               design of cybersecurity situational center are formulated and disclosed. The formal statement of
               the problem of task distribution between the operational personnel of situation center is presented.
               Criteria for choosing the type of organizational structure of the cybersecurity situational center are
               formulated and described, and on their basis the choice of the matrix hierarchical structure for its
               implementation is substantiated. The performance indicators for assessing the functioning of the
               cybersecurity situational center and its organizational and technical structure are considered.

               Keywords1
               Cybersecurity, Situational Center, Design, Organizational Structure, Criteria for Evaluation,
               Cybersecurity Situational Centers, Cybersecurity Operations Center, Computer Security Incident
               Response Team, Computer Emergency Response Team, Security Operations Center, Network
               Operations Center.


1. Introduction
   According to researchers, cyberspace is an environment that is fundamentally different from the ordinary
physical world. Nevertheless, cyberspace is an extremely physical environment: it is created by physical
networks and systems that are interconnected and subject to certain rules that are manifested through
software and communication protocols. Moreover, the very basis of cyberspace is purely physical laws of
electromagnetism and light. They create its main feature – the possibility of global communications and
transmission of large amounts of data, carried out almost instantly and transmitted over long distances,
neglecting geographic boundaries. Speed and independence from physical obstacles provide a major
advantage and at the same time creates a problem, since the capabilities of cyberspace can be used by
anyone and for any purpose [1].
   Ensuring the confidentiality, integrity and accessibility of institutions or organizations in the era of
modern information technology (IT) is a solid piece of work. It includes many information security
functions, ranging from robust systems engineering and configuration management to effective
cybersecurity policy or ensuring information security and comprehensive training of personnel. It should
also include operations in cyberspace, where a group of individuals is tasked with monitoring and protecting
an institution or organization from potential cyber threats [2].
   Cyber threats are growing and becoming more complex. One of the most effective ways to counter these
threats is to create a global ecosystem of computer security incident response teams (CERT, CSIRT) and
security operations centers (SOC), the so-called cybersecurity situational centers (CSC), that can effectively

CPITS-II-2021: Cybersecurity Providing in Information and Telecommunication Systems, October 26, 2021, Kyiv, Ukraine
EMAIL: igor_subach@ukr.net (I. Subach); mogilev11@ukr.net (D. Mogylevych); mukuta8888@gmail.com (A. Mykytiuk);
volodymir.kubrak@ukr.net (V. Kubrak); meduha1998@gmail.com (S. Korotayev)
ORCID: 0000-0002-9344-713X (I. Subach); 0000-0002-4323-0709 (D. Mogylevych); 0000-0002-8307-9978 (A. Mykytiuk); 0000-0001-8877-
5289 (V. Kubrak); 0000-0003-3823-8375 (S. Korotayev)
            ©️ 2022 Copyright for this paper by its authors.
            Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
s
            CEUR Workshop Proceedings (CEUR-WS.org)

                                                                                   79
interact and exchange information on cyber threats in order to respond to them effectively. This can be
provided by appropriate common mechanisms, increasing the number of CERTs, CSIRTs and SOCs around
the world and improving existing ones [2–4].
    There are many terms used to define the group of individuals (experts) tasked with ensuring
cybersecurity [5, 8]:
        Computer Security Incident Response Team (CSIRT)
        Computer Incident Response Team (CIRT)
        Computer Incident Response Center (or Capability) (CIRC)
        Computer Security Incident Response Center (or Capability) (CSIRC)
        Security Operations Center (SOC)
        Network Operations Center (NOC)
        Cybersecurity Operations Center (CSOC)
        Computer Emergency Response Team (CERT), etc.
    The most common terms used to describe incident response teams are CSIRT, CERT and SOC.
    To accomplish the assigned tasks, they are empowered with the following functions:
        Proactive monitoring of IT systems and constant analysis of the current state of threats
        Identification of vulnerabilities in IT security and their elimination
        Centralized management of various security devices in the system
        “Signaling” in case of detection of attacks and threats;
        Direct measures of protection and/or minimizing damage during cyberattacks
        Assessment of the state of IT security systems
        Technical support on all IT security issues
        Reporting on the operation of all IT security-related systems
    Typically, a CSIRT is a team tasked with handling computer security incidents. This often includes
additional responsibilities, from detection to analysis and even correction, as well as activities related to
multi-situational awareness, knowledge transfer and vulnerability management.
    The SOC or CSC provides incident detection services by observing technical events in networks and
systems and may also be responsible for incident response and handling. In large enterprises, SOCs
sometimes focus only on monitoring and detection services and then outsource incident handling to a
separate CSIRT. In smaller organizations, CSIRTs and SOCs are often considered synonymous.
    Over the years, the role of the CSC has evolved from providing monitoring and incident handling
services to coordinating and communicating with different interested parties, countries and specific sectors.
Currently, the activities of the CSC are organized according to the main functions [6], which are further
divided into subfunctions (Fig. 1).
    However, it should be noted that CSC is the core of the cybersecurity system of an organization. As a
centralized location for detecting cyber threats, reducing risks and responding to cyber incidents, the CSC
is the single most important factor in overall cybersecurity capabilities.
    A recent Gartner study has identified five different models for deploying and maintaining a SOC (CSC)
[7]:
        SOC-as-a-Service (SOCaaS) solutions are decentralized cloud portals that connect your company's
    infrastructure to the event monitoring and response team. The virtual cloud-based approach is becoming
    more common as enterprises support remote operations and staff.
        Multifunctional SOC/NOC. Using this approach, a single team of security and network specialists
    can share resources and infrastructure. It is an on-site operations center that handles IT operations,
    compliance and risk management alongside cybersecurity operations.
        Co-operated SOC. This model uses on-site monitoring solutions in addition to external personnel.
    Such approach can also be called a hybrid approach because it contains both on-site and off-site
    elements. These elements can vary greatly between different organizations, making co-operation a
    universal option.




                                                     80
    INCIDENT
 MANAGEMENT IN                                                                                              INFORMATION
                              VULNERABILITY              SITUATIONAL               KNOWLEDGE
  INFORMATION                                                                                              SECURITY EVENT
                               MANAGEMENT                AWARENESS                  TRANSFER
    SECURITY                                                                                                MANAGEMENT
    SYSTEMS
    Acceptance of a report      Acceptance of a report
    on incidents in the         on incidents in the       Data acquisition          Awareness building
    information security        information security                                                         Monitoring       and
    system                      system                                                                       detection
                                                          Analysis and synthesis
    Analysis of incidents       Vulnerability
                                                                                    Training         and
    in the information          detection /
                                                                                    education
    security system             Investigation
                                                          Communication                                      Event analysis
    Analysis of computer
                                Vulnerability analysis                              Technical
    forensics artifacts and
                                                                                    and methodological
    data
                                                                                    consultations
                                Vulnerability
    Reduction of negative       coordination
    consequences     and
    recovery                    Vulnerability
                                disclosure
    Coordination      of
    incidents in the
    information security        Vulnerability response
    system


    Crisis management
    support


Figure 1: The main functions of CSC

       Dedicated SOC is a centralized solution that has its own infrastructure, its own team, and a set of
   processes dedicated exclusively to cybersecurity.
       SOC team. The SOC team model describes a SOC network distributed over several territories. Most
   commonly, it is a connected, global cybersecurity operations center that consists of several specialized
   SOCs working in tandem with each other. The SOC team may have special functions dedicated to
   specific tasks, such as forensics, cybersecurity research or cyber threat intelligence.

    Each of these models has unique characteristics – some are better suited for large enterprises, while
others are ideal for small and medium-sized organizations [9, 10].
    But no organization has the same basic infrastructure, regulatory requirements or budget, that is why
different CSCs are needed. Thus, today there is an urgent scientific task to develop approaches to the
deployment and optimization of CSC.

2. Problem Statement
    The process of designing a CSC as a complex organizational and technical system should include the
following stages [11, 13, 17, 18]:
     Defining the goals of functioning
     Formalization of tasks
     Grouping the tasks in accordance with the set goals
     Selection of the type of CSC management structure
     Determination of the number and composition of CSC units at each level of SOC management
     Determination of the number of employees of each unit

                                                                81
     Selection of hardware and software
     Design of communication systems to ensure effective decision making
     Calculation of costs for the maintenance of the organizational and technical structure of the CSC
   Since the design of CSC requires consideration of a large number of factors: system-wide,
organizational, technical, economic, etc., with the need to take into account both the criteria of CSC
functioning and the cost of its maintenance, this task belongs to the class of ill-structured tasks. On the
other hand, from a formal mathematical point of view, it can be reduced to the class of multi-criteria multi-
parameter problems, which are usually solved by decomposition into separate stages, and then methods of
successive approximations are applied to refine the results obtained by their implementation. [13, 14].
Correspondingly, during such decomposition there are stages of system (defining the CSC goals,
formulation and grouping of tasks), organizational (selection of CSC management structure, composition
and number of units), technical (selection of hardware and software, provision of means of communication
between units and officials) and ergonomic design (determination of the number of personnel, synthesis of
algorithms for the performance of official duties).

3. Basic Principles of a Systematic Approach to Designing a Cybersecurity
   Situational Center
     Since CSCs are complex ergatic organizational and technical systems [19], its synthesis consists in the
design of the collective activities of operational personnel in conjunction with technical and software tools
that ensure their activities. According to [11], the principles of implementation of a systematic approach to
the design of CSC should be: compliance with the organizational and technical structure of the tasks,
purposefulness, relativity, adaptability, connectivity, modelability, reflectivity and operativeness.
     Correspondence of the organizational and technical structure to the CSC tasks consists in a clear
organization of the interaction of operational personnel in solving complex problems.
     Purposefulness implies that in order to achieve the goals, a system should be formed, which is a
combination of effectively organized hardware, software and operational personnel.
     Relativity lies in the fact that a combination of elements of a system can be considered both as its
independent unit and as part of another system into which it is included.
     Adaptability implies the ability of the CSC structure to change in accordance with the goals and
conditions of its functioning.
     The coherence lies in the fact that each element (combination of elements) of the structure is considered
from the position of two levels of grouped elements associated with it: higher and lower. From the side of
the higher level, the parameters of the cylinder block enter the input of the element, and to the lower level
it transfers the selected parameters and controls their implementation. At the higher level, the input of the
element receives the targeting parameters, and at the lower level, it transmits the selected parameters and
monitors their implementation.
     To implement the principle of adaptability of CSC structure, it is necessary to have a mechanism for
predicting the nature of changes in its structure in different conditions, which can be achieved by modeling.
     The essence of the principle of reflectivity is that the antagonistic structure (hacker group, criminals,
etc.) is imposed on certain data about its structure, which motivates it to take certain actions. According to
this principle, the organizational and technical structure of the SOC should be capable of learning and
gaining experience.

4. Stages of Designing a Cybersecurity Situational Center
   The analysis of the literature [11–13, 17–19, 21] shows that the process of synthesis of the organizational
and technical structure can be represented in the form of the following stages of systemic, organizational,
ergonomic and technical design (Fig. 2).




                                                     82
                    SYSTEMIC
                      DESIG                        Defining and ranking global and local
                                                                  goals



                                                 Formalization and decomposition of tasks




                                                  Grouping tasks according to the set goals


              ORGANIZATIONAL
                  DESIGN                              Selecting the type of management
                                                                   structure


                                                      Determination of the number and
                                                     composition of units at each level of
                                                                management

                   ERGONOMIC
                     DESIGN                            Determination of the number of
                                                           employees of each unit


             TECHNICAL DESIGN
                                                       Selecting hardware and software



                                                     Design of communication systems to
                                                      ensure effective decision-making


                    ECONOMIC                            Calculation of expenses for the
                                                     maintenance of the organizational and
                                                              technical structure


Figure 2: The main stages of designing a cybersecurity situational center

   At the initial stage of systemic design, the global goals facing the CSC are formulated. They should also
be ranked in order of importance. After that, they are divided into subsets of local goals, the achievement
of which is ensured by solving certain sets of problems. At the same time, these sets are divided into tasks
that are solved automatically, automated and non-automated.
   Thus, the central point of this stage is the definition and formulation of tasks and their distribution among
the CSC operational personnel.
   The formal statement of this problem can be formulated as follows [20].
   Suppose that the input of the CSC (system 𝛹) receives n inputs 𝑋 = {𝑥1 , 𝑥2 , ⋯ , 𝑥𝑖 , ⋯ , 𝑥𝑛 }, which are
the control actions from the operational personnel and m outputs 𝑌 = {𝑦1 , 𝑦2 , ⋯ , 𝑦𝑗 , ⋯ , 𝑦𝑚 } – indicators of
the efficiency of CSC functioning. The system 𝛹 sets the display 𝛹: 𝑋 → 𝑌. The operation of the CSC is


                                                       83
provided by operational personnel 𝑂 = {𝑜1 , 𝑜2 , ⋯ , 𝑜𝑘 }, and the set O is divided into groups that unite
officials O  O1 O2  Os Ol performing the same functions.
   In the case of the current CSC, the assessment of the degree of influence of CSC operational team
𝑂𝑠 𝑋 = {𝑥1 , 𝑥2 , ⋯ , 𝑥𝑖 , ⋯ , 𝑥𝑛 } on the performance indicators of its functioning 𝑌 = {𝑦1 , 𝑦2 , ⋯ , 𝑦𝑗 , ⋯ , 𝑦𝑚 }
can be determined by the probabilistic method through the correlation coefficient:
                                𝐶(𝑥𝑖 , 𝑦𝑗 ) = 𝛭 {(𝑥𝑖 − 𝑚𝑥𝑖 ) (𝑦𝑗 − 𝑚𝑦𝑗 )} /𝜎𝑥𝑖 𝜎𝑦𝑗 ,                           (1)
where 𝑚𝑥𝑖 , 𝑚𝑦𝑗 jh – mathematical expectation of the values 𝑥𝑖 and 𝑦𝑗 , and the values 𝜎𝑥𝑖 and 𝜎𝑦𝑗 are their
standard deviation.
    The result of solving this problem is the influence matrix of the i-task on the j-indicator. At the same
time, at a strong influence the correlation coefficient approaches to 1 and vice versa, at weak one – to 0.
    However, when designing a CSC, an expert method is used to assess the influence of tasks [20–24], the
essence of which is an expert survey of specialists (experts) to assess the importance of tasks or when it is
difficult to distinguish the properties of tasks, the method of paired comparison is used (each pair of tasks)
[25–26].
    To determine the scope of tasks solved by CSC operational personnel, the concept of intensity or
frequency of their occurrence, or the number of tasks that occur per unit of time, is used.
    In turn, restrictions on the time for solving the problem are introduced through the scheduled or
maximum permissible time.
    At the stage of the CSC organizational design, the following tasks are solved:
      Selection of structure type
      Determination of the number of structure levels
      Determination of the required number of functional groups and each level
      Preliminary estimation of the number of people in each functional group
      Determination of the nature of interaction between operational personnel and their groups




    Linear Hierarchical Structure                Matrix Structure                Matrix Hierarchical Structure

Figure 3: Types of organizational structures

    Herewith, there are various options for choosing an organizational structure: chain, star, circle, network,
linear and matrix hierarchical structures, etc. According to the CSC structure, the nature of the tasks it
solves, the relationship between operational personnel, the most promising is a mixed matrix hierarchical
structure (Fig. 3), characterized by number of levels, number and functional purpose of subsystems at each
level, as well as the types of relationships between levels of the structure. It allows you to use CSC resources
more efficiently, act more quickly in conditions of rapid change and uncertainty, coordinate the work of
different links more clearly and overcome conflicts.
    At the stage of ergonomic design, based on the limiting capabilities for information processing and
decision-making (throughput, span of control, ultimate load, etc.) of each person of SOC operational
personnel, the number of persons in groups of operational personnel is determined [12, 13, 19]. To do this,
the structures of problem solving are analyzed by the CSC operational personnel and presented in a
formalized form – problem-solving algorithm.
    At the stage of technical design, the most perspective hardware and software tools, which satisfy
technical requirements for CSC, are selected out of the many possible options [15].

                                                         84
5. Assessment Criteria
   To select a variant of the organizational and technical structure of the CSC from possible alternatives,
the following efficiency criteria are used: efficiency, cost, speed, adaptability, survivability, reliability, etc.
   In the general, the effectiveness of CSC depends on the probability of timely solution of tasks arising in
the course of the functioning of operational personnel (blocking cyber-attacks, investigating cyber
incidents, etc.) [16] and can be represented as follows [14]:
                                       𝐸 = 𝑃(𝑝1 , 𝑝2 , ⋯ , 𝑝𝑗 , ⋯ , 𝑝𝑚 ),                                 (2)
where 𝑝𝑗 , 𝑗 = 1, 𝑚; – the probability of a timely solution of the task 𝑗.
   After combining the tasks of the same type into groups, expression (2) can be represented as follows:
                                       𝐸 = 𝐸0 + ∑𝑚  𝑗=1 𝑤𝑗 𝑛𝑗 𝑝𝑗 ,                                (3)
where 𝐸0 – efficiency of solving tasks by CSC in automatic mode (without the participation of operational
staff);
        𝑤𝑗 – the value characterizing the degree of influence of the 𝑗 group of tasks on the efficiency of CSC,
which in practice is usually determined by the expert method under the condition: ∑𝑚
                                                                                   𝑗=1 𝑤𝑗 = 1;
   𝑛𝑗 – the number of tasks of the 𝑗 group of tasks, solved by CSC operational personnel, which is usually
represented as the relative frequency of occurrence of the task𝑗– 𝜉𝑗 = 𝜉𝑗 / ∑𝑚
                                                                             𝑗=1 𝜉𝑗 .

   𝑝𝑗 – the probability of a timely solution of the 𝑗 group of tasks by CSC operational personnel.
   Accordingly, the normalized generalized criterion takes the form:
                                              𝐸 = ∑𝑚
                                                   𝑗=1 𝑤𝑗 𝜉𝑗 𝑝𝑗 .                                         (4)
    To assess the effectiveness, in the case where each task solved by a certain person of the CSC operational
staff is highlighted, the criterion (5) can be applied:
                                                       𝑚
                                         𝐸1 = ∑𝑛𝑖=1 ∑𝑗=1
                                                       𝑖
                                                         𝑤𝑗 𝜉𝑖𝑗 𝑝𝑖𝑗 ,                                     (5)
where 𝜉𝑖𝑗 – the relative frequency of solution of the task𝑗 by the person 𝑖 of CSC operational personnel;
   𝑝𝑖𝑗 – the probability of a timely solution of the task 𝑗 by the person 𝑖 of CSC operational personnel;
   𝑚𝑖 – the number of tasks solved by the person 𝑖 of the CSC operational personnel;
   𝑛 – the number of persons of CSC operational personnel;
   It should be noted that the probability of a timely solution of the problem by a person of the CSC
operational personnel depends on the standard and scheduled time for problem solving [24]:
                                     𝑝𝑖𝑗 = 𝑝(𝑡𝑛 , 𝑇𝑝 ), 𝑗 = 1, 𝑚; 𝑖 = 1, 𝑛,                               (6)
where 𝑡𝑛 – the standard time for problem solving, which is determined by analyzing the complex algorithm
for solving the problem by the person of CSC operational personnel;
   𝑇𝑝 – the directive time for problem solving, which is set for each task at the stage of systemic design.
In its turn, to assess the organizational and technical structure of the CSC, we should use indicators such as
the number of levels of the hierarchy, the number of elements at each level, the coefficient of centralization
of management, the coefficient of coherence of the structure, etc.
    The coefficient of centralization of management characterizes the degree of connection of the head of
CSC department with other employees. It can be represented as follows:
                                         𝐶𝐶𝑀𝑘 = 𝑁𝑆𝑘 / ∑𝑛𝑖=1 𝑁𝐸𝑘𝑖 ,                                    (7)
where 𝑁𝑆𝑓 – the number of functional connections of the head of the department with other employees;
   𝑁𝐸𝑘𝑖 – the number of functional connections of the employee 𝑖 of the departrent 𝑘 of CSC.
   The coefficient of coherence of the structure characterizes the relative proportion of tasks during the
solution of which the employees of the department interact with each other:

                                                        85
                                       𝑅𝑁𝑇𝑘 = 𝑇𝐶𝑘 /(TC𝑘 + 𝑇𝐼𝑘 ),                                        (8)
where 𝑇𝐶𝑘 – the number of tasks solved by the department 𝑘 of CSC and the solution of which requires the
interaction of its employees;
                     𝑇𝐼𝑘 – the number of tasks to be done in the department 𝑘 individually;
    In addition, you can apply such characteristics of structure elements as: the number of functional
relations with other elements, the relative rank of the element, which characterizes the relative proportion
of its relations, etc.
    To synthesize the organizational and technical structure of the CSC, it is necessary to create models for
the formation of structure parameters according to such criteria for assessing their quality as: minimizing
the interaction of SOC units in the process of its functioning, maximizing the homogeneity of its elements
(technical means, operational personnel, etc.). However, the methods of their construction, which are
currently available, have a significant drawback associated with the a priori task of the structures of
subsystems, which in its turn should be considered as the subject of definition.
    The elimination of this drawback can be done by developing and including in the composition of the
synthesis methods special optimization models that establish relationships between the indicators of the
functioning of organizational and technical structures and the set of their parameters. At the same time,
when selecting a model in each specific case, it is necessary to take into account its target orientation,
accuracy and detail. Therefore, if the initial data required for calculations are inaccurate or uncertain, then
there is no need to build a detailed model and to optimize the solution accurately.
    Thus, the problem of selecting a rational option for the organizational and technical structure of the SOC
can be solved on the basis of a systematic approach, within which it is quite expedient to use the methods
of multicriteria optimization and the vector performance indicator, including a set of partial indicators, each
of which is represented by a functional and satisfies one of following requirements [14]:
      Timely acquisition of the results of solving problems
      Validity of the results of solving problems
      Completeness of information for decision making
      Cost-effectiveness

6. Conclusions
    Since the cybersecurity situational center is a complex organizational and technical system, the task of
its design, from a formal point of view, should be classified as a multi-criteria multi-parameter problem.
    To solve this problem, it is advisable to apply a systematic approach, within which the decomposition
of the design process into separate stages using the methods of successive approximations is carried out.
    The main stages of designing a cybersecurity situational center should be the stages of systemic,
organizational, technical and ergonomic design, and the main principles of its implementation are:
compliance of the organizational and technical structure with the tasks, civilization, relativity, adaptability,
connectivity, modelability, reflectivity and efficiency.
    The central point of the synthesis of the organizational and technical structure of the cyber security
situation center is the definition and formulation of tasks and their distribution among the operational
personnel of the situation center.
    Criteria such as efficiency, cost, speed, adaptability, survivability and reliability can be used to select
the type of organizational structure of a cybersecurity situational center. In addition, to assess the
organizational and technical structure of the cybersecurity situation center, it is advisable to use such
indicators: the number of hierarchy levels in it, the number of elements at each level, the coefficient of
centralization of management and the coefficient of coherence of the structure.
    To synthesize the organizational and technical structure of the CSC, it is necessary to create models for
the formation of structure parameters according to such criteria for assessing their quality as: minimizing
the interaction of SOC units in the process of its functioning, maximizing the homogeneity of its elements.
    As an indicator of efficiency for solving the problem of choosing a rational variant of the organizational
and technical structure of the CSC, it is advisable to use a vector indicator, which includes the following
partial indicators: timely acquisition of the results of solving problems, validity of the results of solving
problems, completeness of information for decision making, cost-effectiveness.

                                                      86
References
[1] European Union Agency for Cybersecurity, Methodology for a Sectoral Cybersecurity Assessment,
     September 13, 2021. URL: https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-
     cybersecurity-assessment.
[2] A. Zhylin, M. Khudyncev, M. Litvinov, Functional model of cybersecurity situation center,
     Information Technology and Security. July-December 2018. Vol. 6. Iss. 2 (11), DOI: 10.20535/2411-
     1031.2018.6.2.153490.
[3] J. Voo, I. Hemani, S. Jones, W. DeSombre, D. Cassidy, National Cyber Power Index 2020
     (Methodology            and          Analytical           Considerations),         2020.         URL:
     https://www.belfercenter.org/sites/default/files/2020-09/NCPI_2020.pdf.
[4] European Union Agency for Cybersecurity, 2020 Report on CSIRT-LE Cooperation: study of roles
     and      synergies      among       selected      countries,       January     26,    2021.      URL:
     https://www.enisa.europa.eu/publications/2020-report-on-csirt-le-cooperation.
[5] C. Onwubiko, Rethinking Security Operations Centre Onboarding, Proc. of the 2021 International
     Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA).
[6] European Union Agency for Cybersecurity, How to set up CSIRT and SOC, December 10, 2020. URL:
     https://www.enisa.europa.eu/publications/how-to-set-up-csirt-and-soc.
[7] Gartner, Selecting the Right SOC Model for Your Organization, 24 February 2021. URL:
     https://www.gartner.com/en/documents/3997342-midmarket-context-selecting-the-right-soc-model-
     for-your.
[8] C. Zimmerman, Ten Strategies of a World-Class Cybersecurity Operations Center, MITRE, 2014.
     URL:      https://www.mitre.org/sites/default/files/publications/pr-13-1028-mitre-10-strategies-cyber-
     ops-center.pdf
[9] R. Samson Jr, Five Security Operations Center Models Compared: Find The Right SOC Model, 2021.
     URL: https://www.clearnetwork.com/types-of-security-operations-centers-soc.
[10] D. Znakharev, The concept of creating the next generation SOC, 2020. URL: https://www.anti-
     malware.ru/analytics/Technology_Analysis/Next-Generation-SOC-Concept.
[11] V. Morozov, Ya. Dymarsky, Elements of the theory of control of flexible automated production:
     software, Mechanical Engineering, Leningrad, 1994.
[12] B. Gerasimov, B. Egorov, Group activity of operators in automated control systems, KVIRTU PVO,
     Kiev, 1980.
[13] A. Cricket, Fundamentals of the synthesis of the structure of complex systems, Nauka, Moscow, 1982.
[14] I. Subach, and B. Gerasimov, Quality indicators of information support and their impact on the
     effectiveness of decision support systems, Bulletin of Taras Shevchenko National University of Kiev,
     volume 20 (2008), pp. 27–29.
[15] I. Subach, V. Kubrak, and A. Mykytiuk, Methodology of rational choice of security incident
     management system for building operational security center, CEUR Workshop Proceedings, 2019,
     2577, pp. 11–20.
[16] I. Subach,, V. Kubrak, A. Mykytiuk, and S. Korotayev, Rule-oriented method of cyber incidents
     detection by SIEM based on fuzzy logical inference, CEUR Workshop Proceedings, 2021, 2859, pp.
     210–219.
[17] V. Burkov, N. Korgin, D. Novikov, Introduction to the theory of management of organizational
     systems, Nauka, Moscow, 2009.
[18] N. Karabutov, Structural Identification of Systems: Analysis of Information Structures, Nauka,
     Moscow, 2009.
[19] B. Gerasimov, V. Kamyshyn, Organizational ergonomics: methods and algorithms of research and
     design, Infosystems, Kyiv, 2009.
[20] E. Shugaliy, O. Musienko, M. Kachanov, Methods of obtaining characteristics of tasks in public
     administration, Standardization, certification, quality, 3 (115), 2019, P. 29-34.



                                                    87
[21] V. Buriachok, et al., Invasion Detection Model using Two-Stage Criterion of Detection of Network
     Anomalies, Cybersecurity Providing in Information and Telecommunication Systems (CPITS), pp.
     23–32, Jul. 2020.
[22] E. Shugaliy, Methodology of generation of variants of functional structures of public administration
     bodies, Standardization, certification, quality, 1 (113), 2019, P. 49-53.
[23] Carlsson, A., et al. Sustainability Research of the Secure Wireless Communication System with
     Channel Reservation. 2020 IEEE 15th International Conference on Advanced Trends in
     Radioelectronics, Telecommunications and Computer Engineering (TCSET), 2020.
     https://doi.org/10.1109/tcset49122.2020.235583
[24] E. Shugaly, V. Penkivsky, Methods of processing expert information on the characteristics of tasks in
     public administration, Standardization, certification, quality, 1 (119), 2020, P. 63-69.
[25] T. Saati, Decision Making. Method of analysis of hierarchies, Radio and communication, Moscow,
     1993.
[26] I. Subach, O. Saenko, Messages analysis plan formation by the information network operator, Modern
     Problems of Radio Engineering, Telecommunications and Computer Science - Proceedings of the 10th
     International Conference, TCSET'2010, 2010, p. 246, 5446079.




                                                   88