=Paper= {{Paper |id=Vol-3241/paper1 |storemode=property |title=Automated Organizational Management Systems of Critical Infrastructure: Security and Functional Stability |pdfUrl=https://ceur-ws.org/Vol-3241/paper1.pdf |volume=Vol-3241 |authors=Oleksandr Dodonov,Olena Gorbachyk,Maryna Kuznietsova |dblpUrl=https://dblp.org/rec/conf/its2/DodonovGK21 }} ==Automated Organizational Management Systems of Critical Infrastructure: Security and Functional Stability== https://ceur-ws.org/Vol-3241/paper1.pdf
Automated Organizational Management Systems of Critical
Infrastructure: Security and Functional Stability
Oleksandr Dodonov1, Olena Gorbachyk1, Maryna Kuznietsova1
1
    Institute for Information Recording of the National Academy of Sciences of Ukraine, Kyiv,03113, Ukraine

                 Abstract
                   An approach to improving the security of critical infrastructure based on the theory of
                survivability of systems is proposed. Taking into account the peculiarities of the functioning
                of automated organizational management systems (OMS), in the event of the emergence and
                implementation of emergencies, the possibility of ensuring the functional stability of these
                systems through the use of mechanisms of increasing survivability is justified. The concept of
                functional stability of OMS and methods of its estimation are defined. A formalized
                description and a qualitative resource model for assessing the limits of functional stability of
                automated OMS are proposed. The main tasks of the OMS in the process of developing
                management decisions in emergency situations are formulated. The creation and
                implementation of the analytical component of the automated OMS in order to improve the
                quality of management in the face of adverse effects and emergencies is proposed. It has been
                shown that special attention needs to be paid to the analysis and modeling of chains of
                influence that cross several sectors of critical infrastructure and can cause potentially
                unpredictable effects. The main problematic issues for modeling are formulated, the types of
                scenarios for emergency analysis are proposed, the tasks of creating and using resources of
                the analytical component of OMS for modeling situations, development of management
                decisions and analysis of their effectiveness are formulated. Typical approaches to ensuring
                the functional stability of automated OMS are analyzed: use of resource redundancy, special
                means of protection, organization of planned recovery procedures, application of sustainable
                structural solutions, construction of alternatives for communication networks and information
                exchange based on self-organizing systems. It is determined that the main modern
                requirements for automated OMS are the construction of a flexible structure of management
                of facilities and processes with the possibility of reorganization according to the requirements
                of external and internal environments, with the use of adaptation mechanisms that allow
                automated OMS to evolve along with the evolution of the operating environment,
                management facilities and in the case of a smooth emergency scenario. It is shown that in the
                conditions of rapid development of emergencies the functional stability of OMS can be
                supported by such mechanisms of increasing survivability as dynamic reconfiguration,
                recovery, compensation, counteraction to adverse effects.

                 Keywords 1
                 Organizational management systems, critical infrastructure objects, emergencies,
                 functional stability, survivability, safety and security

1. Introduction

   Automated Organizational Management Systems (OMS) of Critical Infrastructure Objects (CIO)
are complex socio-technical systems that operate in a changing environment. Disorders in the


XXI International Scientific and Practical Conference "Information Technologies and Security" (ITS-2021), December 9, 2021, Kyiv,
Ukraine
EMAIL: ipri2020@ukr.net (O. Dodonov); bges@ukr.net (O. Gorbachyk); marglekuz@gmail.com (M. Kuznietsova)
ORCID: 0000-0001-7569-9360 (O. Dodonov); 0000-0001-8492-4478 (O. Gorbachyk); 0000-0001-6054-418X (M. Kuznietsova)
              © 2021 Copyright for this paper by its authors.
              Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
              CEUR Workshop Proceedings (CEUR-WS.org)




                                                                                                                               1
functioning of the CIO (nuclear energy, chemical industry, military and aviation industries, transport,
etc.) pose a potential threat to human life and the environment. Probability of emergencies at
facilities, objects and critical processes infrastructures forces us to consider existence of such
situations, to estimate risks of their realization. It is necessary to correctly determine the goals and
required level of security of critical systems and infrastructures, to be able to predict possible losses in
case of emergencies, to be able to prevent the development of dangerous conditions at infrastructure,
to plan and implement restoration or "safe shutdown". Automated OMS should not only guarantee the
proper functioning of the CIO in the specified operating conditions, but also to ensure an adequate
response to a potential emergency, to initiate the implementation of appropriate measures to overcome
it. There are problems that are not inherent in the normal mode of operation of the OMS and its
components, the burden on managers is growing, the managers must make decisions in the face of
adverse effects and limited time. To ensure the manageability of the CIO and critical infrastructure in
general, the functional stability of the OMS is required to perform those functions which will allow to
achieve the desired goal of functioning and to resist the destructive influences. Protecting critical
infrastructure and increasing its resilience is one of the highest security priorities. In our research we
will extend the application of this approach on new obtained data for the next years and will study in
time the efficiency of SMART-characteristics time series analysis and how we can use their change
for prediction the disk failure.

2. Automated Organizational Management System of Critical Infrastructure

    Critical objects, or critical infrastructure objects, are identified in the [1] as the object’s disruption (or
cessation) of operation which may lead to loss of control, destruction of infrastructure, irreversible
negative change (or destruction) of the economy of the country, entity or administrative-territorial
unit, significant deterioration of the safety of the people, living in these areas. In fact, CIO are
complex multi-level hierarchical systems, control of their state condition and functioning is performed
by appropriate multilevel control systems using the means of automatic control and management
according to certain technical regulations [2].
    Automated organizational management systems are complex socio-technical systems where the
collecting, analyzing and processing information about the object of management, its internal
environment and interaction with the external environment is done [2]. There is always a risk of
destructive effects on real systems from the environment, due to personnel actions or structural
defects in hardware or software, failures of technical means, due to inaccuracy or insufficiency of data
in the information resources of the system, which may lead to the inability to perform the required
functions with a given level of characteristics [3]. Preservation (automatic recovery) of the ability to
perform a complete or acceptable set of system functions in conditions of destructive (undesirable)
effects is ensured by the functional stability of the system, which allows the user to trust the services
of the system [3].

2.1. Functional Stability of Automated Organizational Management System
and its Importance for Safety

   The functional stability of the automated OMS means the property of the system to maintain the
management structure and perform basic management functions within the limits set by regulatory
requirements, in the presence of destructive (undesirable) effects. Due to the functional stability of the
OMS is within the allowable space of states, that is, in addition to the fact that the system performs
the main functions of its intended purpose, it does not have a negative impact on the environment and
does not pose a threat to its existence [4].
   Changes in the operating environment and in the critical infrastructure, the action of destructive
factors of different nature can cause structural and functional disorders in the OMS, which can cause
disruptions in its operation, the emergence of uncontrolled processes that can lead to the emergence
and development of emergencies on the CIO, and even lead to disasters [5,6].


                                                                                                                2
    The range of threats to critical infrastructure in Ukraine is determined by the peculiarities of the
security situation in the country. Fighting on the territory of Ukraine, high depreciation of fixed
assets, serious problems with environmental and man-made safety dramatically increase the risk of
accidents at high risk: power facilities, chemical and metallurgical enterprises and life support
networks, both as a result of their intentional or accidental damage or loss of control over
technological processes, and as a result of terrorist acts and sabotage [1].
    Such a property as functional stability allows the system to ensure the performance of a certain
critical range of functions in case of failure, failures or disturbances in the functioning of certain
elements of the system due to destructive influences, both external and internal, to choose the
appropriate mode of operation, using their own internal resources or obtained from outside, changing
the structure, set of functions and operation of separate subsystems. The critical scope of management
functions, as well as the allowable space of the OMS states, are determined based on the requirements
to prevent unacceptable negative changes in the critical infrastructure [5]. Due to large-scale
automation and informatization of management and technological processes, modern automated OMS
are focused on working with information and intensive data exchange in the actual merger of
automated production, production technologies with minimal human intervention in technological and
management processes performed under normal operating conditions. Automated OMS usually
implement certain standardized tools for assessing the situation on the CIO, tools for forecasting the
development of events to prepare management decisions during the emergence and development of
situations that disrupt the normal functioning of the CIO and OMS. Depending on the field of
implementation, different indicators are used in scientific publications [4-9] to assess the functional
stability of automated OMS, in particular, the amount of managerial functions performed, functions’
performance indicators, the total weight of management functions performed, degree of controllability
of technological processes, coherence of the management structure, parameters of analytical models
for assessing functional stability, etc. The choice of indicators of functional stability should be made
at the stage of design or automation of the OMS, taking into account the characteristics of critical
infrastructure and its individual facilities, existing management structure, rules of subordination and
information exchange in the social component of the OMS, set of critical management functions and
time constraints on the safe termination of the CIO.

2.2. Definition and Formalization of the Concept of Functional Stability of
Automated Organizational Management System

    The operation of the automated OMS is aimed at resolving specific situations by implementing the
overall process of the control system and the actions of the control object. If the situations that require
management decisions are repeated and routine, then the automated OMS for their processing provide
appropriate procedures and solutions that are typical and programmed. If there is a situation for which
there are no proven programmed management decisions, than o make a really effective (purposeful,
timely, comprehensive, etc.) decision it is necessary to form a sufficiently complete set of its possible
alternatives and to choose from them the one that can be implemented with available resources (funds,
stocks, opportunities).
    Аn automated OMS (АOMS), as a socio-technical system, has the following resources at its
disposal:
      - hardware and technical - technical means that are part of the АOMS;
      - software - software components of АOMS;
      - information - information created and/or discovered, registered, evaluated with certain
(specified) laws of degradation and renewal;
      - social - officials and staff who implement information technology to perform the functions
assigned to the АOMS.
    If at a time interval t with any set of destructive influences R t there is at least one efficient
distribution of АOMS resources, which will ensure the implementation of functions set in the current
state of communication F  {f n } with a quality level not lower а lim , then АOMS is functionally
stable over time interval t , that is

                                                                                                         3
         ( Rt  R ,  mN  Μ Nt ,  mG  M Gt ), k * ( Z t )  K,  k * ,  mN ,  mG >  а k*  а lim ,

where Rt – a subset of destructive influences that affect the system over time interval t from a set
R of all destructive influences which can operate on АOMS;
M Nt = {  mN } – subset of quality indicators of spatial-temporal identification of CIO in АOMS on the
basis of CIO monitoring data on time interval t , which is formed from an ordered set M N
indicators of the quality of spatial and temporal identification of COI in the AOMS, taking into
account the data of current monitoring, computer models of CIO and the current destructive effects
 Rt ;
 M Gt = {  mG } – a subset of indicators of the quality of information exchange in the АOMS in the time
interval t , which is formed from an ordered finite set M G of indicators of the quality of
information exchange in the АOMS, taking into account the current destructive effects Rt , available
lines of communication over time interval t ;
 Z t – a subset of resources (hardware, software, information, human) that are available for use in
АOMS under destructive influences Rt over time interval t from the set Z = { z i } of resources of
АOMS, operating in normal conditions;
K ={ kl }, k l =< Z l1 , Z l2 ,..., Z lN >, Z li  Z – set of resource allocations АOMS by N functions of
the set of functions F  {f n } , which implement the requirements for functionality;
а k* – vector of indicators of quality of realization of a set of functions F  {f n } of АOMS when
allocating resources in it and current indicators of the quality of spatial and temporal identification of
CIO in АOMS  mN and information exchange  mG in АOMS, based on its spatio-temporal
configuration over time interval t ;
а lim – the limit indicator of the quality of implementation of a set of functions F  {f n } АOMS,
below which the functioning of the АOMS does not meet the requirements of the appointment.
    Each vector а i is a set  qi11 , qi22 ,..., qiNN  of length N (where N – the number of management
functions implemented in accordance with the purpose of the АOMS), and each element qi j reflects a
certain level of quality of implementation of the j -function and belongs to the set Q j , which, n turn,
reflects a partially ordered finite set of possible levels of implementation quality of the j -function
Q j = { q1j , q2j ,..., q Lj j }.
    For a set of functions F  {f n } , which are implemented by АOMS, there is a set Q levels of
quality of functioning of АOMS, which consists of subsets that do not intersect, { Q1 , Q 2 ,..., Q N },
with elements qij  Q j , j = 1, N , arranged according to the condition

                                          q1j  q 2j  ...  q Lj j , j = 1, N ,

where       qij – the minimum level of implementation quality of j -function, corresponding to non-
performance of the function, q Lj j – the maximum level of quality with which АOMS can theoretically
implement j -function, L j – the number of gradations of the level of performance quality of the j -
function.

                                                                                                             4
   The set Q is partially ordered, it is convenient to present in the form of a quasi-matrix of N -
order with terms that are ordered sets Q j [3]


                  q11    ...    q1Li
         Q =             = q ij , i = 1, N , j = 1, Li
                  q1N    q LNN

   A set of vectors of quality levels A ={а i } of implementation of a set of functions F  {f n }
АOMS also is partially ordered, moreover for any two vectors а i and                  а j , the vector а i is better
than а j , if for each task f m from a set of functions F the level of quality of its implementation qim
, belonging to the vector а i , not worse than the level of quality of implementation of this function q mj
, belonging to the vector а j :


                               а i  а j :  ( qkl  а i , qml  а j , l = 1, N ) ( kl  ml ).
                                                 l             l




    On the set A we introduce a metric: the distance between two vectors from this set is equal to the
minimum difference between the indices of the quality levels of the implementation of each function
of the set F , which are elements of these vectors

       ( а i , а j  A , а i  а j ) s ( а i , а j ) = min ( kl - ml ), qkl l  а i , qml l  а j , l = 1, N .
                                                           l



    а lim determines the limit of АOMS’ functional stability to destructive influences from the set R ,
and the distance s ( а lim , а ( k * )) can be interpreted as a margin of functional stability АOMS in the
allocation of resources k * . Changing requirements to the limit of functional stability а lim , you can
solve problems to build reliable, survivable and safe (secure) systems.
   For reliable systems а lim = а relay lim and accordingly:

   ( Rt  R ,  mN  M Nt ,  mG  M Gt ), k * ( Z t )  K,  k * ,  mN ,  mG >  а k*  а relay lim ,

where а relay lim is the minimum level of quality of implementation of functions F , in which the
АOMS retains in time within the established limits the values of all parameters that determine its
ability to perform functions F under certain modes and operating conditions.
   For survivable systems а lim = а surv lim ,

   ( Rt  R ,  mN  M Nt ,  mG  M Gt ), k * ( Z t )  K,  k * ,  mN ,  mG >  а k*  а surv lim ,

where а surv lim is the minimum level of quality of implementation of functions F , in which the
АOMS retains the ability to perform critical functions F кр  F under conditions of destructive
influences.
    For safe (secure) systems а lim = а safe lim ,

     ( Rt  R ,  mN  M Nt ,  mG  M Gt ), k * ( Z t )  K,  k * ,  mN ,  mG >  а k*  а safe lim .

                                                                                                                  5
where а safe lim is the minimum level of quality of implementation of functions F , in which the
functioning of the АOMS does not pose a threat to human life and the environment.
   If you can determine the level а  of the quality of AOMS functions from the set F at the current
time  and the maximum possible level а max of quality of performing functions АOMS is known,
than distance between vectors а  and а max will determine the margins of stability in terms of
reliability, survivability and safety.
    The flow of destructive influences of different nature can cause failures in AOMS, and this will
lead to changes in the vector, which will mean a decrease in reserves of stability or complete loss of
diversion property of AOMS. In the case of recovery procedures based on the mechanisms of
reconfiguration and / or reorganization of resources, or by introducing additional resources from the
outside, you can restore the lost property. If the use of mechanisms of reconfiguration, reorganization
in the AOMS allows to achieve compliance: а relay lim  а   а max , then restored such a property as
reliability; if а surv lim  а   а max , then the system has survivability; provided     а relay lim  а 
а max , the system becomes secure. The process of ensuring the functional stability of AOMS can be
considered as a process of maintaining the current quality vector of AOMS functions at certain
intervals in a given period of time by activating special tools and mechanisms for reconfiguration and
reorganization of system resources.


3. Safety of Critical Infrastructure Objects in the Conditions of Destructive
Factors and Development of an Emergency Situation

    Security and protection of critical infrastructure involves, above all, ensuring the smooth and
sustainable operation of critical infrastructure in certain modes, and the ability to prevent the
destruction or irreparable damage, the cessation or loss of control of critical infrastructure objects due
to all factors, and to ensure the rapid restoration of their operation if it is interrupted. The main task of
protecting critical infrastructure is to prevent crises related to the functioning of critical infrastructure.
    In [1] the following categories of threats are proposed, for which the protection of critical
infrastructure should be configured:
    1) accidents and technical failures, in particular, aviation accidents, nuclear accidents, fires,
accidents in energy supply systems, emissions of hazardous substances, system failures, accidents and
emergencies due to negligence, organizational errors, etc.;
    2) dangerous natural phenomena, in particular, extreme weather conditions, forest, steppe and peat
fires, seismic phenomena, epidemics and pandemics, space phenomena, hurricanes, tornadoes,
earthquakes, tsunamis, floods, etc.;
    3) malicious actions, in particular, the malicious actions of groups or individuals, such as terrorists,
criminals and saboteurs, as well as hostilities in wartime.
    Combined threats and threats are particularly dangerous, the implementation of which can lead to
catastrophic and diverse cascading effects due to the interdependence of critical infrastructure
elements.
    Measures to counter threats to critical infrastructure are determined by the following
guidelines [1]:
 physical protection – aimed at ensuring the protection of objects from unauthorized access,
prevention and cessation of sabotage, theft or any other illegal seizure of equipment, devices and
materials;
 technical protection – increasing fault tolerance and survivability of systems, functional
redundancy;
 staff – training and testing of personnel, control of their ability to perform certain functions,
security of personnel;

                                                                                                            6
 Information Technology – protection of information, communication systems and management;
 legal – settlement of issues of personnel response and functioning of infrastructure in crisis
situations, consolidation of division of responsibilities in normative and legal documents,
development of manuals and instructions for personnel, including on interaction in crisis situations;
 recovery plans – creation of plans, reserves and services for quick recovery of lost functions.
    The following modes of operation are defined for the system of protection of critical infrastructure,
which is a part of the automated OMS CIO:
      crisis prevention;
      crisis management;
      operation in a state of emergency;
      functioning in martial law.
    The normal mode of operation of critical infrastructure for the protection system is a regime of
monitoring and risk assessment of crisis situations, in which continuous crisis prevention should be
provided.
    In the event of a crisis, the critical infrastructure protection system should switch to crisis
management. If a crisis situation occurs in a particular sector of critical infrastructure, then due to the
interconnectedness of sectors (interconnections / impacts of facilities from different sectors), it can
spread to all critical infrastructure and lead to the most serious consequences for the country.
    Crisis management regime provides for the involvement of emergency measures to contain factors,
improve the conditions and characteristics of the security environment, or improve the functioning of
certain objects of critical infrastructure, etc. The same regime is used in the restoration of critical
infrastructure after malicious actions, accidents and failures, significant impact of dangerous natural
phenomena. The transition to the operation of the OMS in states of emergency and martial law should
take place in the event of the proclamation of appropriate legal regimes in the event of an emergency,
terrorist threat or armed invasion.

3.1. The Functions and Tasks of Automated Organizational Management
System in case of Threat or Emergency
   An emergency (crisis) situation is a violation of normal living conditions and activities of people
on the site or territory, caused by an accident, catastrophe, natural disaster, epidemic, fire, use of
means of destruction [1]. There are 5 typical stages (phases) of emergency development (emergency):
the accumulation of deviations - the initiation of an emergency - the manifestation of the main impact
factors - the action of secondary impact factors - the action of residual impact factors. It is necessary
to prevent the emergence of critical infrastructure by all possible means, to adequately respond to
emergencies and to have the means to eliminate the consequences of emergencies.
   Occurrence and development of emergencies occurs in real time, so the solution of problems of
monitoring and analysis of stages of emergencies must also take place in real time, which requires
spatial and temporal identification of CIO and infrastructure as a whole. Emergency management
systems must take into account the nature and speed of emergency development, control not only the
parameters of the CIO, but also the characteristics of the environment. The following functions must
be performed in the automated OMS:
      monitoring, the main task of which is the continuous processing of data from the CIO in real
     time and signaling the departure of certain parameters beyond acceptable limits;
      diagnostics of the place of occurrence of the emergency to localize the area of malfunctions or
     errors;
      forecasting the consequences of certain events or phenomena based on the analysis of
     monitoring data from various sources;
      planning actions to prevent the development and spread of emergencies;
      correction of management decisions in case of diagnosing errors and failures;
      ensuring the management of the CIO and the relevant mode of operation of the OMS itself;
      providing the necessary information and recommendations to all levels of government.



                                                                                                         7
    In the conditions of emergency situations in the functioning of the AOMS there are problems
associated with the high rate of changes in the parameters and state of CIO, unpredictability of events,
dependence of information flows on the situation and communication system, changing the
distribution of functions, expanding or narrowing the scope, etc. [4]. In such conditions, it is desirable
to have the means to support the development of management decisions, in particular, to have pre-
established schemes of action in the development of emergencies, to have a base of precedents,
systematized and accumulated experience in overcoming previous emergencies.
    Given the interpenetration and, inter alia, the interdependence of critical infrastructures, it is
necessary to ensure that the AOMS performs the function of identifying, analyzing and modelling
chains of influence that cross several sectors of critical infrastructure and lead to potentially
unpredictable effects. For chains of influence, there are several types of interdependencies that make
up the paths between infrastructure components (nodes) of the type: a  b  c  d  ...  y  z.
    This path reflects (models) the cascading consequences of the event or the derived dependence of
the node-object z on the node-object a, which is denoted (a  z). A chain constructed in this way may
not be the only one, and if the end effect is the effect on z of several object nodes, it is affected (abc 
z). Pathways are not unique in terms of effect, they may change over time, and their behavior may be
cumulative in nature, that is, the end effect may be the culmination of several possible events. To
analyze infrastructure interdependencies and forecast changes in infrastructure, it is necessary to
determine:
         1. What will be the cascading effect on the subset of object nodes {x, y, z, ...}, given the set of
initiating events {  (a),  (b), ...}?
         2. What will be the set of events {  (a),  (b), ...}, what can cause a cascading effect given
the set of object nodes {x, y, z, ...} and the desired end state?
         3. What will be the derivative of interdependence (ab  xyz ), based on the set of events { 
(a),  (b), ...} and the set of observed results on the nodes-objects {x, y, z, ...}?
         4. What is the subset of critical nodes {x, y, z, ...} of all networks that will negatively affect a
particular function through a direct or derivative relationship, given the set of infrastructure networks
and the critical function?
    Management decisions to ensure the security and protection of critical infrastructures depend on
the answers to these questions. Some of the impacts and their consequences that can be predicted, it is
advisable to analyze and prepare appropriate effective management decisions.
    The AOMS should have the means to act in the "slow" and "fast" scenarios of emergency
development. In a "slow" scenario, there is time to apply certain means of protection and perform
certain protective actions to localize the emergency and prevent its further spread by the
infrastructure. In the case of a "fast" scenario of development of the emergency, events in the
infrastructure unfold rapidly. It is desirable to apply such measures and means that would allow to
react before the destruction of the CIO and infrastructure.
    The functional stability of the AOMS in the conditions of the "fast" scenario of emergency
development becomes extremely important, because the strict time constraints require:
  1) assess the parameters of the operating environment, taking into account safety risks and possible
consequences of emergencies;
  2) identify places in critical infrastructure that have the highest risks, and assess their impact on the
structure and functioning of individual CIOs, predict potential losses;
  3) to carry out spatio-temporal identification of CIOor to use available dynamic models for
forecasting of a probable condition of infrastructure and CIO and to choose from possible variants of
administrative decisions more rationally for reaction to current events;
  4) determine and permanently monitor the parameters of the CIO, assess and forecast the state of the
CIO, if possible, to build scenarios of events taking into account the current external and internal
influences on the CIO and AOMS;
  5) determine the list of necessary resources for counteracting emergencies, develop scenarios for
localization and elimination of the consequences of emergencies.
    After the elimination of emergencies, it is advisable to analyze the adopted and implemented
management decisions, evaluate their effectiveness, although with the evolution and increasing
complexity of CIO, its parameters and components change, which leads to an increase in the number


                                                                                                           8
and variety of kinds and types of risks and the entire infrastructure [2,8,9 ], so the analysis of the
range of possible risks should be constantly monitored, the state of the selected parameters and the
environment should be monitored, and new risk situations should be modelled [6,10-12].

4. The Survivability of the Automated Organizational Management System as
a Factor in maintaining its Functional Stability
    The development of information technology, automation of a number of management functions
have led to a change in perceptions of the ideal OMS as a stable and fully manageable system with a
rigid hierarchical structure. Requirements for modern OMS include the construction of a flexible
structure of management of facilities and processes with the possibility of reorganization according to
the requirements of external and internal environments, with effective mechanisms of adaptation,
allowing OMS to evolve along with the evolution of the operating environment and management
objects.
    The complexity of the CIO, both technological and operational in nature, leads to an increase in
the number of elements involved in the monitoring and management processes, diversification of
interaction structures in OMS, which leads to an increase in the number and variety of kinds and
types of risks, which can cause disruptions in the functioning of the CIO and in the infrastructure as a
whole. It is impossible to predict and protect critical infrastructure from all risks, therefore, the safety
of its operation should be ensured based on the conditions of "if, then". Such conditions require
adequate quality management and functional stability of AOMS of the critical infrastructure .
    To ensure the functional stability of AOMS in the design of its technical component, a certain
redundancy is traditionally introduced (structural, software, time, resource); built-in control systems
are being implemented; contours of protection of AOMS against destructive influences of external
environment are formed; components with the increased level of protection and reliability are chosen.
These traditional solutions have certain limitations. Additional redundancy, unfortunately, leads to a
deterioration of the technical and economic characteristics of the systems. Monitoring systems
observe a number of parameters, but may not always or not at all provide an adequate response to an
abnormal situation and may not reduce the likelihood of such situations. The protection circuit can
minimize the influence of external factors, but does not completely eliminate it. The choice of element
base with the increased level of protection and reliability does not provide functional stability of
system when failure has already occurred [4, 6-9].
    Ensuring the functionality and security of computer systems, as part of AOMS, involves the
implementation of a comprehensive security system using firewalls, anti-virus software, in-depth
application traffic analysis procedures, identification and authentication of users, security incident
management systems with the ability to track and manage incidents, etc. The use of information
technology in AOMS to ensure effective management of the CIO in the emergence and development
of emergencies, and today, in particular, in areas of hostilities, has led to new security requirements:
        formation and maintenance of a zone of continuous information coverage of a large plane;
        ensuring the scalability of the communication network in order to increase the coverage area
and the density of information support;
        creation of wireless transport channels for communication of access points in the "one-to-one"
mode;
        ensuring noise immunity, protection from imitation interference, increasing resistance to loss
of individual network elements;
        guaranteeing the smooth operation and adaptability of the communication network.
    Communication requirements are partially met by technology Mesh – construction of networks, a
distinctive feature of which is self-organized architecture (Wireless Mesh Network (WMN), which are
also called cellular networks [13]. Mesh networks are built as a set of clusters. The coverage area is
divided into cluster zones, the number of which is theoretically unlimited. Mesh networks use special
protocols that allow each access point to create network subscriber tables with traffic channel status
monitoring and support for dynamic traffic routing along the optimal route between neighbouring
points. If any of them fails, the traffic is automatically redirected to another route, which guarantees
not just the delivery of traffic, but its delivery in the shortest time. Mesh technology is based on a

                                                                                                          9
decentralized network design scheme, and access points that operate on Mesh networks provide
subscriber access services and act as routers / repeaters for other access points on the same network.
This makes it possible to create a self-installing and self-healing segment of a broadband network.
Using such a network allows you to quickly recover traffic in the event of failures or intentional
damage to individual network nodes. The disadvantage of Mesh networks is the use of intermediate
points for data transmission, which can cause delays in the transmission of information, and,
consequently, reduce the quality of real-time traffic.
    AOMS in the conditions of origin and development of the emergency system operates under
constant variability of the external environment, uncertainty of external and internal destructive
influences, the impossibility of clearly taking into account the reaction of the environment to the
actions of the system and the response of the system to external influences, that is, in terms of the
manifestation of such a fundamental systemic property as survivability. Due to this property, any
system can be stored as a whole in the unpredictable, sometimes extreme, conditions, adapt to them,
changing the behavior, structure or system-wide purpose of the operation. High survivability systems
are characterized by flexibility in management, variability of operation algorithms, transitions from a
hierarchical management model to linear, network, network-centric, and vice versa, which ensures the
safe operation of the system itself and its achievement of the system-wide purpose of operation.
    Low survivability systems break down quickly, and if there is a low survivability of AOMS critical
infrastructures, it can lead to the development of cascading accidents with significant material losses
[7], while AOMS, characterized by increased survivability, are destroyed gradually, retaining partial
functionality, limited performance [6]. There is time to make decisions regarding the transition to a
safe mode of operation, emergency stop, isolation of damage, preventing their spread, and so on.
    Survivability is a fundamental intrinsic property of complex systems, regardless of the conditions
of their operation, and it is manifested only in the presence of destructive effects, damage or even loss
of system components and component failures [2,6].
    In the event of an emergency, the functional stability of AOMS CIO can be supported (increased)
by mechanisms to ensure survivability, after all, survivability is the property that allows the system to
adapt to new operating conditions in the presence of destructive influences, maintain or promptly
restore the functions of the system with minimal loss of efficiency in case of degradation or failure of
individual components of the system through the use of available operational resources.
    To maintain the functional stability of the AOMS, it is advisable to use the following mechanisms
of survivability ensuring [6,14]:
 recognition and localization – to detect attacks on AOMS information components, successful
intrusions into the system and its information resources, the occurrence of risks of loss or distortion of
information, increased risk and failure of vital (critical) components of AOMS, identification of the
failed element or component, fixing the output of certain parameters of AOMS, CIO and environment
beyond the established limits;
 counteraction – creation and application of a set of predetermined means and measures to
maintain the specified operating conditions and minimize losses associated with the transition to a
non-standard mode of operation;
 recovery and restoration – development and use of a set of methods and software and hardware to
restore the functionality and performance of components and the system as a whole, its information
resources and information and communication tools under adverse effects;
 adaptation – development of a set of procedures for targeted changes in the parameters and
structure of AOMS based on information about changes in operating conditions, the emergence of
unforeseen situations, the consequences of violating the security of information resources;
 reorganization – development of algorithms and procedures for redistribution of failed
component functions between operational components or, in case of impossibility of redistribution, -
organization of system transition to a new purpose of operation;
 reconfiguration – performing automatic (automated) restructuring of the structure of the
information exchange network or changing the algorithm of operation to achieve the greatest
efficiency of the purpose of operation on the available operational resources of the system;
 reconstruction – application of reduction of the purpose of operation (list of AOMS functions
performed) and system resources to certain base levels, when the system can perform only a clearly


                                                                                                       10
defined set of functions, save a certain amount of information, ensure smooth degradation of certain
parameters.
    These mechanisms integrate the tools and design solutions implemented in the system to increase
reliability and fault tolerance, monitoring, automatic control and compensation, built-in algorithms
and means of protection of components and components of AOMS, etc.

     5. Conclusions
    In the context of hostilities in Ukraine, which lead to a significant large number of emergencies,
effective management of critical infrastructure has become an extremely important task. The
functioning of the automated organizational management system is aimed at resolving specific
situations by implementing the overall process of the control system and the actions of the control
object. Rapid response to emergencies at the objects of the critical infrastructure and in the
infrastructure as a whole, localization of the emergency zone, preventing the development of
cascading accidents, improving the level of protection and safety of critical infrastructure – here are
the tasks that AOMS provides. The functional stability of automated organizational management
system, as a property of the system to maintain the management structure and perform management
functions within the limits set by regulatory requirements, in the presence of destructive influences –
is an affecting on the safety of critical infrastructures factor. Improving the survivability of automated
organizational management system of the objects of the critical infrastructure allows even in the "fast
scenarios" of emergency development to reduce the negative consequences of emergencies, due to the
validity and timeliness of management decisions, preventing the complete loss of of the critical
infrastructure objects management.
    The expediency and effectiveness of the proposed approach to ensuring the safety of the objects of
the critical infrastructure and critical infrastructure in general in the presence of destructive influences
by increasing the functional stability of automated organizational management systems were tested
and demonstrated when creating the automated OMS of special purpose.

    References

[1] Green Paper on Critical Infrastructure Protection in Ukraine. Kyiv, 2015. 35p. (in Ukrainian)
[2] Dodonov, O., Gorbachyk, O., Kuznietsova, M. Increasing the survivability of automated systems
     of organizational management as a way to security of critical infrastructures. In: XVIII
     International Scientific and Practical Conference «Information Technologies and Security» (ITS
     2018), CEUR Workshop Proceeding (ISSN 1613-0073). 2018. Vol.2318. P.261-270. [Online].
     Available: http://ceur-ws.org/Vol-2318/paper22.pdf.
[3] Korolev, A.N. Functional stability of navigation and information systems. // University news.
     Instrument making. 2018. T.61, №7. P.559-565. (in Russian)
[4] Emergency management systems. Available: http://risk.keldysh.ru/risk/g112.htm
[5] Barabash O.V., Durnyak B.V., Mashkov O.A. etc. Ensuring the functional stability of complex
     technical systems // Modeling and information technology: Coll. Science. works, 2012. - Kyiv:
     Institute of Modeling Problems in Energy named after G.Ye. Pukhov. National Academy of
     Sciences of Ukraine, B.64. Pp. 36–41. (in Ukrainian)
[6] Kharchenko, V.S., Yakovlev, S.V., Gorbachyk, O.S. , et al. Provision of Functional Safety of
     Critical Information-control Systems. Kharkov: Konstanta, 2019. 272 p. (in Ukrainian)
[7] Failure Mode, Effects & Criticality Analysis (FMECA). Available:                     https://quality-
     one.com/fmeca/
[8] N. Kuznietsova, M. Kuznietsova, Data mining methods application for increasing the data storage
     systems fault-tolerance, IEEE 2nd International Conference on System Analysis & Intelligent
     Computing         (SAIC),       2020,       pp.       315–318.       Available:      https://doi.org
     /10.1109/SAIC51296.2020.9239222
[9] Dodonov, O., Gorbachyk, O., Kuznietsova, M. Survivability of organizational management
     systems and the maintenance of critical infrastructure security. In: ХІХ International Scientific
     and Practical Conference «Information Technologies and Security» (ITS 2019), CEUR

                                                                                                         11
     Workshop Proceedings 2019, Vol.2577, pp.1-10. Available: http://ceur-ws.org/Vol-
     2577/paper1.pdf
[10] Boyarchuk, A., Brezhnev, E., et. al. Security of critical infrastructures: mathematical and
     engineering methods of analysis and provision, 2011. Kharkiv. 642p.
[11] Kharchenko, V., Kovalenko, A., Andrashov, A. Security of safety important I & C systems/
     Standards and Standardization: Consepts, Methodologies, Tools and Application. 2015, pp.1279-
     1316.
[12] Kharchenko, V., et al. Critical infrastructures safety assessment combining fuzzy models and
     Bayesian belief network under uncertainties // Advances in intelligent systems and computing,
     2013, vol. 224, pp. 245-254.
[13] Cilfone, A.; Davoli, L.; Belli, L.; Ferrari, G. Wireless Mesh Networking: An IoT-Oriented
     Perspective Survey on Relevant Technologies. Future Internet 2019, 11, 99. Available:
     https://doi.org/10.3390/fi11040099. https://www.mdpi.com/1999-5903/11/4/99/htm .
[14] Oleksandr G. Dodonov, Olena S. Gorbachyk, Maryna G. Kuznietsova Dynamic Reconfiguration
     in Automated Organizational Management Systems// Selected Papers of the XX International
     Scientific and Practical Conference "Information Technologies and Security" (ITS 2020). CEUR
     Workshop Proceedings (ceur-ws.org). - Vol-2859 ISSN 1613-0073. URL: http://ceur-
     ws.org/Vol-2859/paper13.pdf.




                                                                                               12