<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>ORCID:</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Method for Calculating the Criticality Level of Sectoral Information and Telecommunication Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Sergiy Gnatyuk</string-name>
          <email>s.gnatyuk@nau.edu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Viktoriia Sydorenko</string-name>
          <email>v.sydorenko@ukr.net</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksii Yudin</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oksana Zhyharevych</string-name>
          <email>o.zhyharevych@gmai.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Lutsk National Technical University</institution>
          ,
          <addr-line>75 Lvivska Str., Lutsk, 43000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>1, Liubomyr Huzar Ave. Kyiv, 03058</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>State Scientific and Research Institute of Cybersecurity Technologies and Information Protection Kyiv</institution>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>1979</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>Global trends to increase the number and complexity of cyber-attacks have led to the actualization of the issue of protection of information and telecommunication systems (ITS), in particular, sectoral, critical to the functioning of society, socio-economic development of the state, and ensure the information component of national security. Considering the need for national security and the need to introduce a systemic approach to solving the problem of critical infrastructure protection at the national level, creating a security system is one of the priorities in reforming Ukraine's defense and security sector. Thus, there is a need to develop methods and models for the ITS categorization as a critical information infrastructure to ensure the national security of Ukraine. The study presents the method for calculating the criticality level of the sectoral ITS, which, due to the use of a structural-logical and functional model for determining the functional profile of the sectoral ITS security, as well as a functional model for calculating the quantitative criterion for assessing the security of ITS, allow to increase the accuracy of the decision to categorize ITS as critical. Using the developed method makes it possible to classify ITS as critical, considering information properties (such as confidentiality, integrity, availability, and observability). In addition, an experimental study of the proposed method was carried out on the example of the ITS of the National Confidential Communication System (NCCS), which was used to check the adequacy of the method's response to changes in input data. The usage of the method allows to calculate the criticality ranks for functional disruption of the components, subsystems, and systems of the NCCS. Method also helps to calculate the quantitative indicator of the severity of the consequences of the functionality disruption of the NCCS, as well as the quantitative indicator of the ranks of criticality of the NCCS and a conclusion was made regarding the NCCS criticality.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>and
systems
(ITS);
critical
infrastructure; critical
infrastructure object; criticality; criticality rank; functional security profile.</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>
        Global trends to increase the number and complexity of cyber-attacks have led to the actualization
of the protection of information and telecommunication systems (ITS) sectoral, which is critical to the
functioning of society, and socio-economic development of the state and ensure the information
component of national security. Considering the need for national security and the need to introduce a
systemic approach to solving the problem of critical infrastructure protection at the national level,
creating a security system is one of the priorities in reforming Ukraine's defense and security sector [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>2022 Copyright for this paper by its authors.</p>
      <p>It should be noted that the Law of Ukraine “On the Fundamentals of Cybersecurity of Ukraine” [2]
determines the need to form a list of critical infrastructure facilities and the need to develop a procedure
for attributing facilities to that list. Resolution No. 1109 of the Cabinet of Ministers of Ukraine on
certain critical infrastructure issues approves the procedure for classifying facilities as critical
infrastructure; the list of sectors (subsectors) and essential services of the state's critical infrastructure;
and the methodology for categorizing critical infrastructure facilities [3]. The mentioned methodology
describes the mechanism of assigning critical infrastructure to a certain category of criticality, which is
determined based on the analysis of the level of possible negative impact. In addition, the Law of
Ukraine “On Critical Infrastructure” has recently come into force. [4], which describes in detail the
legal and organizational basis for protecting critical infrastructure facilities in the creation and operation
of the national critical infrastructure protection system. However, the issue of assessing the
effectiveness of critical infrastructure protection of sectoral ITS remains open. At the same time, it is
possible to evaluate the effectiveness of protection using risk assessment mechanisms. Thus, the point
of protection is an inverse function of the risk assessment indicator.</p>
    </sec>
    <sec id="sec-3">
      <title>2. Analysis of modern approaches and problem statement</title>
      <p>Methods of risk assessment are classified according to the stages of the risk assessment process in
which they have applied [5]: methods of risk identification; methods of risk analysis (consequences
analysis); methods of risk analysis (qualitative, semi-quantitative, or quantitative probability
assessment); methods of risk analysis (performance evaluation of existing management measures);
methods of risk analysis (quantitative assessment of risk level); methods of risk assessment.</p>
      <p>The ability to apply the methodology for each stage of the risk assessment process is characterized
by the following levels: the method is recommended for usage, or it can be applied (Table 1), where
“Rec” means recommended for use, “Can” means can be used, and “Not” is not possible to use.</p>
      <p>According to the data presented in Table 1, only the last four techniques are fully recommended to
be used. The factors affecting the choice of methods of risk assessment are the following: the
complexity of the problem and the methods required for its analysis; the type and level of uncertainty
of the risk assessment (based on the amount of information available, etc., which is necessary to achieve
the goal); the number of resources required in the ratio of time and skill level, data needs or costs; the
possibility of obtaining quantitative input data.</p>
      <p>The most appropriate methods in terms of the possibility of obtaining quantitative indicators and the
level of uncertainty, as well as complexity, are methods of functional analysis. Let's consider the
following methods. Failure mode and effects analysis (FMECA) [6] is a methodology used to
determine how functional failures of components or systems occur. In this case, criticality indicators
are usually qualitative or semi-quantitative. At the same time, if actual failure rate data are used, the
indicators can be expressed quantitatively.</p>
      <p>The FMECA method can be used to determine the types and results of human errors; provide a
process for scheduling testing and maintenance of systems; obtain qualitative or quantitative
information for analysis techniques, such as fault tree analysis. Disadvantages of the method include
application to identify individual types of failures, but not their combinations; studies can be time
consuming; application for complex systems can be difficult and time-consuming.</p>
      <p>Reliability-centered maintenance (RCM) [7] is a method of determining the policies that need to
be implemented to manage failures in a way that effectively ensures the necessary safety, availability,
and operation of all types of equipment.</p>
      <p>The RCM method is based on risk assessment, as the method implements the basic steps of such an
assessment. The type of risk assessment is a failure type, consequence, and criticality analysis
(FMECA). Risk identification is aimed more at situations in which hypothetical failures can be resolved
or their frequency and consequences can be reduced by performing maintenance tasks. Risk
identification is performed by identifying functions and standards of performance as well as equipment
and component failures that may violate specified functions. Risk analysis consists of quantifying the
frequency of each failure without maintenance. Consequences are established by determining the impact of
failure. A risk matrix combines the frequency of failure and the consequences and allows the establishment
of risk levels. It is assessed by selecting the appropriate failure management policy for each type of failure.</p>
      <p>The RCM method has the same drawbacks as the FMEСA.</p>
      <p>
        The method for calculating the criticality level of critical information infrastructure facilities,
based on the FMECA method, which is different by using a three-dimensional criticality matrix, Pareto
diagram, Ishikawa causal diagram, and calculation of additional criticality weighting factors makes it
possible to assess the level of critical infrastructure facilities criticality. [
        <xref ref-type="bibr" rid="ref2 ref23">8-11</xref>
        ]. The disadvantage of this
method is the lack of consideration of such properties of information as confidentiality, integrity,
availability, and observability [12].
      </p>
      <p>
        The method of risk-based criticality analysis proposed by M. Theocharidou is based on risk
analysis. The method can apply it to the calculation of quantitative indicators of the ITS security level
of an individual institution. This method does not apply to a state because it operates with the concept
of criticality to the organization [
        <xref ref-type="bibr" rid="ref25">13-14</xref>
        ]. This method's disadvantages are inherent to determining the
criticality level of critical information infrastructure facilities.
      </p>
      <p>The analyzed methods are used to determine the criticality of risk assessment frameworks. A
comparison of methods is given in Table 2 according to the following criteria: the number of citizens
involved (health and social consequences), economic effect, political consequences, the mutual
dependence of critical infrastructure sectors (the result of the destruction of one is the destruction of
others), the impact on the environment, the scale by territory, duration.</p>
      <p>The conducted analysis of the approaches that can be used to assess the effectiveness of the ITS
protection showed that such an assessment is proposed through an evaluation of risks (the lower the
risk, the greater the effectiveness of protection). At the same time, the normative document of the
system of technical security of information of Ukraine [15] defines the result of evaluation as a rating,
representing an ordered series of alphanumeric combinations, denoting the levels of implemented
services combined with the level of guarantees. Thus, there is a contradiction between the approaches
to assessing the effectiveness of protection. In addition, the recommended methods, which analyze the
consequences, probability of occurrence and level of risk, do not identify failures by the characteristics
of information, such as confidentiality, integrity, availability, and observability.</p>
    </sec>
    <sec id="sec-4">
      <title>3. The method of calculating the criticality level of the sectoral ITS</title>
      <p>The method of calculating the criticality level of the sectoral ITS, rather than the above-mentioned
methods [8-11; 13-14], is based on the usage of such properties of information as confidentiality,
integrity, availability, observability, and considers the quantitative indicators of the criteria for referring
to critical infrastructure [3; 12; 16]. The developed method can be represented as a flowchart (Fig. 1).
It uses the results of the structural-logical model of formation of the functional profile of the sectoral
ITS security level, the structural-functional method of forming the functional security profile of the
sectoral ITS, as well as the model for calculating the quantitative criteria for assessing the security level
of the ITS. The method consists of seven steps, each described in detail below.</p>
      <sec id="sec-4-1">
        <title>1. Definition of the ITS subsystems and components</title>
        <p>
          The following steps should be done to identify the ITS subsystems and their components: 1)
decompose the infrastructure into general and the most critical infrastructure domains; 2) decompose the
critical domains into objects; 3) generate a general list of the ITS; 4) perform decomposition of the ITS
into subsystems and components. The first three steps are described in [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] and will be the input data for
the criticality calculation method. Most in common, all the elements described in [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] must have
cybersecurity functions (confidentiality, integrity, availability, observability, authenticity,
nonrepudiation, and trustworthiness of information). These functions may be not basic (e.g., integrity
or availability of information in PLC (Programmable Logic Controller) or optical amplifiers) or basic
(anti-virus protection, firewall, security alarm system, means of protection against side electromagnetic
emissions and pickups, means of cryptographic protection of information, means of authentication).
        </p>
        <p>It also should be noted that the list of elements of the ITS of energy infrastructure management
includes both means and systems. Therefore, it is advisable to divide the aspects of cyber protection of
the ITS systems of energy infrastructure management, having a set of protection means, and having a
complete system of information protection [17]. According to the normative documents [18], a
complete information protection system is a set of organizational and engineering measures, software,
and hardware, providing information protection in the ITS. Complex protection means a collection of
software and hardware, ensuring the implementation of an information security policy. In addition, it
should be noted that any component of the ITS, which because of any impact can lead to a violation of
security policy, should be considered as part of a set of security features [17].</p>
        <p>Based on the above, the elements that ensure cyber security of the ITS of the energy infrastructure
management systems should include the following: aspects of the telecommunications subsystem,
automated control systems of technological processes of energy infrastructure management and information
subsystems. In addition, the security requirements will be defined separately to a set of protection tools and
a comprehensive system of information protection, depending on the object of study. Let's describe the ITS
elements in the form of multiple sets.</p>
        <p>The structure of the ITS of critical infrastructure facilities should be as follows (S):
n
S  {USi}  S1, S2 ,...Sn, Si  S, (i  1, n), (1)</p>
        <p>i1
where Si is a class of systems, for example, the ITS of local production control, the ITS of supervisory
control and data collection, and n is the total number of classes of systems.</p>
        <p>A set of systems included in the ITS (Si):
mi
Si  {USij }  Si1, Si2 ,...Sim, Sij  Si , (i  1, n, j  1, mi ), (2)</p>
        <p>j1
where Sij are the systems of the i-th class, mi is the number of systems of the i-th class, for example, an
automated process control system that manages the production of components, the ITS of supervisory
control and data acquisition, and n is the total number of system classes.</p>
        <p>A set of subsystems for each of the ITS systems (Sij):</p>
        <p>rij
Sij  {USijk }  Sij1, Sij2 ,...Sijrij , Sijk  Sij , (i  1, n, j  1, mi , k  1, rij ), (3)
k1
where Sijk – subsystems of Sij systems, rij – the number of іj-th class subsystems, for example, measuring
and control devices and automation, devices which collect data from several sources and
change/transform it into other form factors of the ITS local production control system.</p>
        <p>A set of components for each subsystem of the ITS system (Sijk):</p>
        <p>rijk
Sijk  {UCijkl }  Cijk1,Cijk 2 ,...Cijrij , Cijkl  Sijk , (i  1, n, j  1, mi , k  1, rij , l  1, rijk ), (4)
l1
where Сijkl is components of the Sijk subsystems, rijk is the number of members of the ijk-th class, e.g.,
dampers, cutoff valves, electric latches, pressure, temperature, level sensors, gas analyzers, pumps,
vacuum extractors.</p>
        <p>2. Identification of functions for each detected system component, formation of a list of possible
disruptions of each system component, assessment of the consequences of each of the potential violations</p>
        <p>In addition to the main functions of the system components, it is necessary to consider the
information security requirements for the categories of logical interfaces of domain objects. For this
purpose, it is proposed to use the following designations of security requirements [19-21]:
 SG.AC-12 – Blocking a session.
 SG.AC-13 – Remote session termination.
 SG.AC-14 – Allowed unauthenticated and unidentified actions.
 SG.AC-15 – Remote Access.
 SG.IA-04 – User identification and authentication.
 SG.IA-05 – Device identification and authentication.
 SG.IA-06 – Message Authentication.
 SG.SC-03 – Secure function isolation.
 SG.SC-05 – DoS protection.
 SG.SC-06 – Resource prioritization.
 SG.SC-07 – Memory protection.
 SG.SC-08 – Message Integrity (communication line).
 SG.SC-09 – Confidentiality of messages (communication line).
 SG.SC-26 – Confidentiality of information in storage.
 SG.SI-07 – Integrity of software and information.</p>
        <p>The function of each detected system component (F):</p>
        <p>l
F = {UFi}  F1, F2 ,..., Fl , Fi  F, (i  i,l), (5)</p>
        <p>i1
where Fi is the functions of the Cijkl component of the Sijk subsystem, and l is the total number of
functions of the component, for example: receiving the signal, converting the signal, and performing a
specific action. List of possible disruptions of each component of the system (D):</p>
        <p>p
D = {UDi}  D1, D2 ,..., Dp, Di  C, (i  i, p), (6)</p>
        <p>i1
where Di is a disruption of the Cijkl component of the Sijk subsystems, p is the total number of possible
disruptions. At the same time, disruption is a violation of confidentiality, integrity, availability, or
observability, which can lead to negative consequences.</p>
        <p>Consequences of each of the possible disruptions (Е):
q
E = {UEi}  E1, E2,..., Eq, Ei  E, (i  i,q), (7)</p>
        <p>i1
where Ei is the consequences of disruption of the Cijkl component of the Sijk subsystems, q is the total
number of consequences. In this case, the consequences are DoS, disclosure of confidential data, and
incorrect operation of devices.</p>
        <p>3. Determination of the ranks of the criticality of possible disruptions for each consequence
and each disruption of a subsystem component</p>
        <p>In the third step, the criticality ranks of potential disruptions (R) are determined for each its
consequence (Ei) and each disruption (Di) of the Cijkl component of the Sijk subsystems. In the criticality
rank determination, tabular values of the indicators should be used [6].</p>
        <p>The following formula RE calculates the criticality ranks of the disruption of the Cijkl component:
i</p>
        <p>REi  B1i B2i B3i , (8)
where B1i is a tabular value of the indicator, which determines the intensity of the disruption occurrence,
B2i is a tabular value of the indicator, which determines the detecting possibility of disruption, B3i is a
tabular value of the indicator, which determines the consequences of the occurrence of disruption.</p>
        <p>The criticality ranks of the Di component disruption are calculated by the following formula ( RD ):
i
where REi is a criticality rank, the value of which corresponds to each of the Ei , (i 1, qEi ), qEi is the
number of consequences for each disruption.</p>
        <p>The criticality ranks of the Di disruption of the Cijkl component are calculated by the following
formula:
where RDi criticality rank, the value of which corresponds to each of the Di , (i  1, qDi ), qDi is the
number of disruptions for each component.</p>
        <p>4. Calculation of criticality ranks of possible subsystem disruptions</p>
        <p>In the fourth step, the criticality ranks of possible disruptions of the Sijk and Sij subsystems are
determined. The arithmetic weighted average rank ( RSijk ), of the Sijk subsystem is as follows:
rijk
 qijkl
l1
where RCijkl is the criticality rank, the value of which corresponds to each of the Cijkl , (l  1, rijk ) , qijkl is
the number of disruptions for each subsystem component.</p>
        <p>The arithmetic weighted average rank of the ( RSij ) disruption of the Sij system is as follows:
RDi 
1 qEi
qEi i1 REi ,
R</p>
        <p>Cijkl

1 qDi
qDi i1 RDi ,
rijk
 qijkl RCijkl
RSijk  l1</p>
        <p>,
pij
 qijk RSijk
RSij  j1pij
 qijk
j1
,
where RSijk is the criticality rank, the value of which corresponds to each Sijk , ( j 1, pij ) , qijk is the
number of disruptions for each system.</p>
        <p>5. Criticality rank calculation of possible disruptions of systems and all ITS
In the fifth step, the criticality rank of possible disruptions of the Si ( RS ) systems and all ITS S (Rs)
i
should be calculated as follows:
(9)
(10)
(11)
(12)</p>
        <p>RSi  RSiVKAHPi , (13)
where VK AHPi is the ratio of the given FSP to the ratio suggested by the expert in the area for the Si
system (1), and the RS is the arithmetic weighted average of the violation rank for the Si system, VK AHPi
i
is the result of calculation based on the method of hierarchy analysis, using a model for calculating the
quantitative criterion for assessing the security of the ITS.</p>
        <p>mi
RSi  k1mpiij RSij , (14)
 pij
k1
where RSij
number of disruptions for each Sij system.</p>
        <p>is the criticality rank the value of which corresponds to each Sij , (k 1, mi ) , pij is the
The criticality rank of the S ( RS ) ITS is calculated by the following formula:</p>
        <p>RS  RSVK ,
where VK is a ratio that describes the severity of the consequences of the ITS disruption, RS is an
arithmetic weighted average of the disruption rank for the  object.</p>
        <p>The arithmetic average weighted rank of the object S disruption is calculated by the following
formula:
where RS is the criticality rank, the value of which corresponds to each Si , (i  1, n) , mi is the number
i
of disruptions for each system.</p>
        <p>The following formula describes the ratio of the severity of the consequences of the disruptions:
where VKimjax is the maximum value of the ratio of the i-th criteria, which is calculated as the product
of the priority and the highest value of the criteria and varies from 70 to 10 (table value), n is the number
of criteria, VKij is the product of the value of the i-th and j-th criteria.
n
 mi RSi
RS  i1n
 mi
i1</p>
        <p>,
VK 
n j1 i1 VVKKimjiajx ,
1 mi n
 
(15)
(16)
(17)
6. Classifying the ITS as critical or non-critical
In the sixth step, the ITS (S) should be classified as critical or non-critical:</p>
        <p>Criticality  S    is critical, at Rs  Rlow
is not critical, at Rs  Rlow
,
where Rlow is the limit value of the criticality rank (equal to 625.0). Rlow is the product of the average
value of VK (5.0), VKAHP (1.0), and RS (125.0).</p>
      </sec>
      <sec id="sec-4-2">
        <title>7. The final report preparation</title>
        <p>In the seventh step, the values obtained in steps I-III should be recorded in the report:
- a list of systems, subsystems, and their components.
- a list of the functions of the components, their possible disruptions, and probable consequences.
- the value of indicators determining the intensity of the occurrence of disruptions.
- the value of indicators determining the possibility of detecting a disruption.
- the value of indicators determining the consequences of the occurrence of disruptions.
- the value of criticality ranks of the consequences of the component function disruption.
- the value of the ranks of the criticality of the consequences of the component's function disruptions.
- the value of the ranks of the criticality of the component's performance disruption.
- the value of ranks of the criticality of possible disruptions of the component subsystem.</p>
        <p>The summarized information is presented in the following form (Table 3):</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>4. Experimental verification of the method for calculating the criticality level of the sectoral ITS</title>
      <p>
        Based on the proposed in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] structural-functional method of determining the FSP of the sectoral
ITS was obtained a basic (FSPB) and adjusted by the expert (FSPE) of the NCCS:
      </p>
      <p>- FSPB: CA-2, CE-3, CT-2, CO-1, IA-2, IE-2, IT-1, IR-2, AF-2, AQ-2, AD-2, AR-2, OS-1, OI-2,
OC-1, OD-3, OP-2, OT-2, ON-2, OE-2, OR-1.</p>
      <p>- FSPE: CA-3, CE-4, CT-3, CO-1, CC-2, IA-4, IE-2, IT-1, IR-2, AQ-2, AD-3, AR-3, OS-1, OI-2,
OC-1, OD-3, OP-3, OT-3, ON-5, OE-2, OR-1.</p>
      <p>FSPE is a criterion for assessing the security level of information in circulation in the NCCS.</p>
      <p>
        The method for calculating the quantitative criteria for assessing the security of the NCCS, by using
the hierarchy analysis method resulted in the value of VKAHP  0,717 . The result of calculation of the
VK AHP is shown in Fig. 2. In addition, the decomposition of the NСCS into components of sets of
systems and their subsystems was performed in (Table 1 in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]), and the components that each
subsystem consists of were also determined. A fragment of decomposition is presented in Table 4.
      </p>
      <p>For each component of the subsystem a list of functions Fi , possible disruptions of functioning Di ,
consequences Ei and ranks of criticality of consequences REi is defined. A fragment of the list is shown
in Table 5. The calculation of criticality ranks RDi of the Di component of the Cijkl subsystems,
criticality ranks of possible disruptions RCijkl of the Cijkl component, criticality ranks of possible
disruptions RSijk and RSij of the Sijk and Sij subsystems, criticality ranks of possible disruptions RSi
of the Si systems and the overall of the NCCS (S) was carried out, by applying the method for
calculating the criticality level of the sectoral ITS [22-23]. A fragment of the list is shown in Table 6
of the NCCS disruption rank, calculated from (16), is RS  51, 40.</p>
      <p>According to the results of the calculation (15) a quantitative index of criticality rank, which is equal
to RS  190, 7 and, as a result, it is concluded that the NCCS, at present, is not critical ITS.</p>
    </sec>
    <sec id="sec-6">
      <title>5. Conclusions</title>
      <p>In this study, the analysis of methods for calculating the criticality level of the ITS has shown that:
the assessment of the effectiveness of the ITS security is carried out through an assessment of the risks
that do not meet the requirements of the ND TPI; the methods of risk assessment, that analyze the
consequences, probability of occurrence and the level of risk, are not performing identification of
failures by the properties of information (confidentiality, integrity, availability, and observability); the
main criteria are the number of citizens involved, economic impact, political impact, mutual
dependence of critical infrastructure sectors, environmental impact, the scale by territory, the duration.
The above criteria must be considered when calculating the criticality level of the sectoral ITS [24-25].</p>
      <p>The study also presents an improved method for calculating the criticality level of the sectoral ITS,
using the results of the structural-logical model and structural-functional method of the FSP formation
of the sectoral ITS, as well as a model of calculation of the quantitative criteria for assessing the security
level of the ITS, based on the use of hierarchy analysis. The developed method allows determining the
classification of the ITS as critical, considering the properties of information.</p>
      <p>In addition, the experimental study of the proposed method was carried out by using the method for
calculating the criticality level of the sectoral ITS. The method was used to calculate the ranks of the
criticality of the disruption of components, subsystems, and systems of the NCCS, to calculate the
quantitative index of the severity of the consequences of disruption of the NCCS, and to calculate the
quantitative index of the criticality rank of the NCCS and, based on this, the conclusion about the
criticality was made.</p>
    </sec>
    <sec id="sec-7">
      <title>6. Acknowledgment</title>
      <p>This work is carried out within the framework of research grant №АР06851243 “Methods, models
and tools for security events and incidents management for detecting and preventing cyber-attacks on
critical infrastructures of digital economics” (2020-2022), funded by the Ministry of Digital
Development, Innovation and Aerospace Industry of the Republic of Kazakhstan.</p>
    </sec>
    <sec id="sec-8">
      <title>7. References</title>
      <p>
        [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] Gnatyuk S., Yudin O., Sydorenko V., Pozhentsev A., Brzhanov R. “Method of Forming the
Functional Security Profile for the Sectoral Information and Telecommunication Systems”, CEUR
Workshop Proceedings, 2022, vol. 3179, pp. 272-283.
[2] Ukraine. Laws. “On the main principles of ensuring cyber security of Ukraine”: officer. text:
[adopted by the Verkhovna Rada of Ukraine on July 28, 2022].
[3] Ukraine. Resolution No. 1109 (2020) of the Cabinet of Ministers of Ukraine. “Methodology for
categorizing critical infrastructure facilities”: officer. text: [adopted by the Cabinet of Ministers of
Ukraine on October 9, 2020].
[4] Ukraine. Laws. “About critical infrastructure”: officer. text: [adopted by the Verkhovna Rada of
      </p>
      <p>Ukraine on November 16, 2021].
[5] ISO/IEC 31010:2009 – Risk management – Risk assessment techniques, The International</p>
      <p>Organization for Standardization and The International Electrotechnical Commission, 2009.
[6] IEC 60812, Methods of systems reliability analysis. Methods for analyzing the nature and
consequences of failure (FMEA).
[7] IEC 60300-3-11 Reliability Management, Part 3-11: Application Manual, Maintenance to Assure
Reliability.
+</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>St1, St2, St3, Ss1, Ss2, Sd1, Sd2, Sd3, Sm1</article-title>
          , Sm2
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>St11</surname>
          </string-name>
          ,
          <fpage>St12</fpage>
          ,
          <fpage>St13</fpage>
          , ….., Sm23, Sm24
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>Ct111</surname>
          </string-name>
          ,
          <fpage>Ct112</fpage>
          ,
          <fpage>Ct113</fpage>
          , ….., Cm231,
          <year>Cm241</year>
          [8]
          <string-name>
            <surname>Gnatyuk</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Polishchuk</given-names>
            <surname>Yu</surname>
          </string-name>
          .,
          <string-name>
            <surname>Sydorenko</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Sotnichenko</given-names>
            <surname>Yu</surname>
          </string-name>
          .
          <article-title>“Determining the level of importance</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <article-title>for critical information infrastructure objects”</article-title>
          ,
          <source>Proceedings of 2019 IEEE International Scientific-</source>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          2019, Kyiv, Ukraine, October 8-
          <issue>11</issue>
          ,
          <year>2019</year>
          , pp.
          <fpage>829</fpage>
          -
          <lpage>834</lpage>
          . [9]
          <string-name>
            <surname>Gnatyuk</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yudin</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sydorenko</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smirnova</surname>
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Polozhentsev</surname>
            <given-names>A.</given-names>
          </string-name>
          , “The Model for Calculating
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <article-title>Systems”</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          ,
          <year>2022</year>
          , vol.
          <volume>3156</volume>
          , pp.
          <fpage>390</fpage>
          -
          <lpage>399</lpage>
          . [10]
          <string-name>
            <surname>Sydorenko</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gnatyuk</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fesenko</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yevchenko</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tolbatov</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sotnichenko</surname>
            <given-names>Y.</given-names>
          </string-name>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <source>aviation”</source>
          ,
          <source>CEUR Workshop Proceedings</source>
          , Vol.
          <volume>2732</volume>
          , pp.
          <fpage>136</fpage>
          -
          <lpage>156</lpage>
          ,
          <year>2020</year>
          . [11]
          <string-name>
            <surname>Gnatyuk</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sydorenko</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Polihenko</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sotnichenko</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nechyporuk</surname>
            <given-names>O.</given-names>
          </string-name>
          “
          <article-title>Studies on the disasters</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <article-title>criticality assessment in aviation information infrastructure”</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          ,
          <year>2020</year>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          Vol.
          <volume>2805</volume>
          , pp.
          <fpage>282</fpage>
          -
          <lpage>296</lpage>
          . [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          , “Critical Aviation Information Systems Cybersecurity”, Meeting Security Challenges
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <surname>Information</surname>
            and
            <given-names>Communication</given-names>
          </string-name>
          <string-name>
            <surname>Security</surname>
          </string-name>
          . IOS Press Ebooks, Vol.
          <volume>47</volume>
          , №3, рр.
          <fpage>308</fpage>
          -
          <lpage>316</lpage>
          ,
          <year>2016</year>
          . [13]
          <string-name>
            <given-names>G.</given-names>
            <surname>Stergiopoulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kouktzoglou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Theocharidou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gritzalis</surname>
          </string-name>
          , “
          <article-title>A process-based dependency</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <surname>Infrastructures</surname>
          </string-name>
          , Vol.
          <volume>13</volume>
          , №2/7,
          <year>2017</year>
          . [14]
          <string-name>
            <surname>Gritzalis</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Theocharidou</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stergiopoulos</surname>
            <given-names>G.</given-names>
          </string-name>
          ,
          <article-title>“Critical Infrastructure Security</article-title>
          and Resilience:
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <surname>Applications</surname>
          </string-name>
          , Springer,
          <year>2019</year>
          , 311 p.
          <source>ISBN 978-3-030-00023-3. [15] Normative document of technical information protection 2</source>
          .
          <fpage>5</fpage>
          -004-99,
          <article-title>Criteria for assessing the</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <source>Communications and Information Protection of Ukraine</source>
          ,
          <year>1999</year>
          . [16]
          <article-title>Research and Analysis of Problems of Information Protection at Critical Infrastructure Facilities,</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <source>cipher “Infrastructure” (doctoral thesis 0114U000038d). [17] Normative document of technical information protection 1</source>
          .
          <fpage>1</fpage>
          -002-99, General provisions on the
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <given-names>Special</given-names>
            <surname>Communications</surname>
          </string-name>
          and Information Protection of Ukraine,
          <year>1999</year>
          . [18]
          <article-title>Normative document of technical information protection, Terminology in the field of information</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <source>Communications and Information Protection of Ukraine</source>
          ,
          <year>1999</year>
          . [19]
          <string-name>
            <surname>National</surname>
            <given-names>Institute</given-names>
          </string-name>
          <source>of Standards and Technology Information Report 7628</source>
          . Guidelines for Smart
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <given-names>Grid</given-names>
            <surname>Cyber</surname>
          </string-name>
          <string-name>
            <surname>Security</surname>
          </string-name>
          : Vol.
          <volume>1</volume>
          ,
          <string-name>
            <given-names>Smart</given-names>
            <surname>Grid Cyber Security Strategy</surname>
          </string-name>
          , Architecture, and High-Level
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <surname>Requirements</surname>
          </string-name>
          , National Institute of Standards and Technology,
          <volume>15</volume>
          p.
          <year>2010</year>
          . [20]
          <string-name>
            <surname>Y.-C. Liao</surname>
          </string-name>
          , “
          <article-title>Generating Targeted Attack Scenarios against Availability for Critical</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <surname>Infrastructures</surname>
          </string-name>
          ,”
          <year>2021</year>
          14th
          <string-name>
            <given-names>CMI</given-names>
            <surname>International Conference - Critical ICT</surname>
          </string-name>
          Infrastructures and
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <surname>Platforms</surname>
          </string-name>
          (CMI),
          <year>2021</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          , DOI: 10.1109/CMI53512.
          <year>2021</year>
          .
          <volume>9663753</volume>
          . [21]
          <string-name>
            <given-names>H.</given-names>
            <surname>Wang</surname>
          </string-name>
          , “
          <source>Assessing the Effects of Applying Different Simulation Models on Resilience</source>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <article-title>Evaluation of Critical Infrastructure Systems</article-title>
          ,” 2021 IEEE 3rd International Conference on
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <source>Frontiers Technology of Information and Computer (ICFTIC)</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>169</fpage>
          -
          <lpage>173</lpage>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <source>DOI: 10.1109/ICFTIC54370</source>
          .
          <year>2021</year>
          .
          <volume>9647372</volume>
          . [22]
          <string-name>
            <given-names>R.</given-names>
            <surname>Smith</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Filho</surname>
          </string-name>
          , “
          <article-title>Improving Critical Infrastructure Resilience in a Rural Coastal Community:</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <string-name>
            <given-names>A Solar</given-names>
            <surname>Powered</surname>
          </string-name>
          <string-name>
            <surname>Microgrid</surname>
          </string-name>
          ,”
          <source>SoutheastCon</source>
          <year>2022</year>
          ,
          <year>2022</year>
          , pp.
          <fpage>436</fpage>
          -
          <lpage>437</lpage>
          . [23]
          <string-name>
            <given-names>E.</given-names>
            <surname>Samanis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Gardiner</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Rashid</surname>
          </string-name>
          , “
          <article-title>Adaptive Cyber Security for Critical Infrastructure</article-title>
          ,”
          <fpage>2022</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <source>ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS)</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>304</fpage>
          -
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          305, DOI: 10.1109/ICCPS54341.
          <year>2022</year>
          .
          <volume>00043</volume>
          . [24]
          <string-name>
            <given-names>Š.</given-names>
            <surname>Kavan and M. Z. Freitinger</surname>
          </string-name>
          <string-name>
            <surname>Skalická</surname>
          </string-name>
          , “
          <article-title>Security of critical information infrastructure and</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          <article-title>possible disruption as a crisis</article-title>
          ,
          <source>” 2022 11th Mediterranean Conference on Embedded Computing</source>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          <source>(MECO)</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          , DOI: 10.1109/MECO55406.
          <year>2022</year>
          .
          <volume>9797175</volume>
          . [25]
          <string-name>
            <given-names>M.</given-names>
            <surname>Divizinyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Lutsyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Rak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kasatkina</surname>
          </string-name>
          and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Franko</surname>
          </string-name>
          , “Mathematical Model of
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          <article-title>Identification of Radar Targets for Security of Objects of Critical Infrastructure</article-title>
          ,”
          <year>2021</year>
          11th
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          <source>International Conference on Advanced Computer Information Technologies (ACIT)</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>95</fpage>
          -
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          100, DOI: 10.1109/ACIT52158.
          <year>2021</year>
          .
          <volume>9548374</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>