<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Management of Security Risks of Information Resources in Information and Telecommunication Systems Using Expert Procedures</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Petro Snitsarenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yurii Sarychev</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii Fesenko</string-name>
          <email>aafesenko88@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Viktor Zubkov</string-name>
          <email>vpzubkov@ukrnet</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yurii Pishchanskyi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National Defence University of Ukraine named after Ivan Cherniakhovskyi</institution>
          ,
          <addr-line>Povitroflotskyi Av., 28, Kyiv, 03186</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>Volodymyrska St., 60/13, Kyiv, 02000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>358</fpage>
      <lpage>366</lpage>
      <abstract>
        <p>The article considers the problem of the security of electronic information resources in information and telecommunication systems as a component of cyber security. The main aspects, essence and characteristics of security risks of electronic information resources are highlighted. The option of creating a system for managing such risks is proposed. The solution is based on the cybernetic model of system functioning and the use of expert procedures.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Management of security risks of electronic telecommunication systems</kwd>
        <kwd>expert procedures</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
    </sec>
    <sec id="sec-2">
      <title>2. Literature review and problem statement</title>
      <p>
        The analysis of publications shows that most researchers understand risk as a quantitative measure of
security or a scale that can be used to quantify the losses associated with the realization of threats that have
various sources of origin. With the help of such a scale, it is possible to compare all types of threats (risks) with
each other and accordingly determine the level of security - the degree of protection [
        <xref ref-type="bibr" rid="ref2 ref3 ref4 ref5 ref6">2-6</xref>
        ]. In general, risk is
understood as the predicted amount of loss that may arise as a result of decision-making in conditions of
uncertainty and the realization of a threat [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ]. Risk management is considered as a rational measure to reduce
the amount of such damage.
      </p>
      <p>
        Researchers, analyzing modern threats to information security, including information security in
cyberspace, that is, the security of EIR, identified the following causes of global risks: negative consequences
of technological progress; increasing vulnerability in the use of information infrastructure and networks;
cyber-attacks or malicious software; massive cases of fraud using disinformation, data theft, etc. [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. At the
same time, such a threat is understood as intentions, actions (inaction) or phenomena and factors, the
manifestation of which can harm the available information (information resources).
      </p>
      <p>The problems of the emergence of threats and risks in various fields, including in the field of information
security (including cyber security), are also developed in the works of domestic information security
researchers (V.P. Horbulin, A.B. Kachynskyi, A.I. Semenchenko, G. P. Sytnyk, O. M. Zagorka, P. M.
Snitsarenko and others). They emphasize the need and relevance of a systematic approach to information
protection, risk reduction to ensure the validity and consistency of measures planned for this purpose, and
ensure their implementation as effectively as possible. At the same time, scientists have not yet developed a
unified approach to EIR security risks management, in particular in the military sphere. Therefore, the search
for the most rational solutions continues.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Formulation of the problem</title>
      <p>
        Currently, the methodology of risk management is based on the choice of a mathematical model of risk
assessment, which depends on each specific threat. As a result, there is a significant number of both the
models themselves and approaches to modeling risk assessments [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Currently, additive-multiplicative
models are used to formalize risk. They link the probability of occurrence of events (threats) and their
corresponding undesirable consequences, which is discussed, in particular, in works [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ]. These models are
complex, bulky, require appropriate personnel training, and are inconvenient for operational use. Due to the
presence of many unpredictable, random, subjective circumstances, significant deviations from the expected
result occur.
      </p>
      <p>The purpose of the publication is the formation of a methodical approach to the management of EIR security
risks in information systems as an integral component of the process of ensuring state cyber security.</p>
    </sec>
    <sec id="sec-4">
      <title>4. The main section</title>
      <p>In modern conditions, almost all areas of the state's vital activity can be under threat of EIR security risks
(examples are repeated cyber-attacks on the information systems of state and private institutions of Ukraine),
which directly affects the level of EIR security and causes the corresponding risk.</p>
      <p>It can be argued that the risk of EIR security should be considered the predicted amount of information
loss that may occur as a result of threats to EIR security due to unauthorized actions (access, changes,
removal, destruction). Taking into account EIR security risks (in other words, managing such risks) will
ensure the improvement of the procedure for supporting the management decision-making process, will
allow to improve the quality of the implementation of practical measures.</p>
      <p>
        In work [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] it is stated that any EIR security risk can be caused by a combination of the following
negative factors: the presence and nature of the EIR security threat source, the uncertainty of the occurrence
of a dangerous event, the uncertainty of the impact mechanism, the possibility and level of damage. The
entire set of EIR security risks can be conditionally divided based on the characteristics of their certain
factors. Factors associated with EIR security risk are various influences on the main characteristics of
information [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] - these are reliability, sufficiency (completeness), integrity, availability, confidentiality. The
risk of violation of the reliability is characterized by its ability to correspond to true (error-free) data.
      </p>
      <p>Sufficiency (completeness) is the minimal, but sufficient composition of the information product for
making a decision. The risk of EIR sufficiency violation is related to the amount of information sufficient for
the user (consumer) to understand and make an informed decision.</p>
      <p>Integrity is the ability of EIR to maintain its accuracy and completeness under the conditions of use. The
risk of violation of the integrity of information is characterized by the possibility of failure of equipment or
software, the imperfection of algorithms and the degree of reliability of the means of user access to the
information system.</p>
      <p>Availability is the subject's ability to access data upon request at any time (the ability to use EIR when
necessary). The risk of violating the availability of information depends both on hardware malfunctions and
software failures, and on successfully implemented network attacks on the information system from the
outside. This type of risk depends on the reliability of the hardware and software components of the
information system, as well as on the level of competence of the personnel managing their work.</p>
      <p>Confidentiality is the level of EIR protection against unauthorized access. The risk of breach of
confidentiality depends on the level of user authentication algorithms, the probability of undocumented
situations when working with the information system, the imperfection of the organizational structure,
noncompliance with the guiding documents on information protection and the human factor.</p>
      <p>
        The sources of influence on information characteristics are the EIR security risk environment and the state
of information systems [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. According to the environment of occurrence, such risks are divided into external
and internal. The external risks of EIR security risk include risks caused by the political situation around the
country, relations between states, the economic situation on the market, the social condition of citizens, etc.
The level of such risks is determined by several components that affect its overall value.
      </p>
      <p>The internal risks of EIR security risk include risks that depend on the direct activity of the structural unit
(organization) and its personnel. Among them, organizational risks are decisive - these are risks associated
with the activities of personnel who operate and maintain information systems, problems of the internal
control system, vaguely defined work rules, i.e. risks associated with the internal organization of the work of
a structural unit (organization). According to the state of information systems (ITS), which should be
understood as the level of performance of their components, EIR security risks are divided into hardware and
software. Hardware risks arise when information system equipment fails (personal computers, servers,
measuring devices (sensors), network switches, routers, etc.), and they also depend on the methods of its
operation. Software risks are directly related to violations in the operation of the software (operating systems)
of the information system, the actions of malicious software, as well as the actions of network attacks.</p>
      <p>
        All types of risks, as a rule, can be the object of management, the best - adaptive management. So, we are
talking about a certain cybernetic system of EIR security risk management, which should include a
management body, an executive body, and a monitoring body (Figure 1). The object of management in such
a system is precisely the level of EIR security risk. According to the main provisions of management theory
[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], this methodical approach allows for the most effective (adaptive) management of EIR security risks as a
component of cyber security.
      </p>
      <sec id="sec-4-1">
        <title>SEIR risk management body</title>
        <p>Decision regarding control
(of influence)
Assessment of condition
and effectiveness
impact on the level risk</p>
      </sec>
      <sec id="sec-4-2">
        <title>SEIR risk monitoring body</title>
        <p>
          Information
To manage the security risk of EIR, according to management theory [
          <xref ref-type="bibr" rid="ref11 ref5">5, 11</xref>
          ], means:
 monitor (identify, assess sources of risk);
 carry out risk analysis and assessment;
 predict scenarios of the development of dangerous events;
 make decisions based on the results of risk analysis;
 implement measures to prevent, localize, neutralize or reduce the level of risks to an acceptable
level;
        </p>
        <p> eliminate the consequences of dangerous events.</p>
        <p>The variant of the structural diagram of the implementation of such a cybernetic process related to the
management of EIR security risks consists of 4 stages (Figure 2).</p>
      </sec>
      <sec id="sec-4-3">
        <title>Executive authority</title>
      </sec>
      <sec id="sec-4-4">
        <title>Management object (SEIR risk level)</title>
        <p>Influence</p>
        <sec id="sec-4-4-1">
          <title>1 stage</title>
          <p>Risk analysis
and assessment</p>
        </sec>
        <sec id="sec-4-4-2">
          <title>2 stage</title>
          <p>Anti-risk
(risk neutralization)</p>
          <p>Adoption</p>
        </sec>
        <sec id="sec-4-4-3">
          <title>3 stage</title>
          <p>Monitoring the results
of risk neutralization</p>
        </sec>
        <sec id="sec-4-4-4">
          <title>4 stage</title>
          <p>Decisions about the results of the
impact on the level of risk
Risk identification</p>
          <p>Risk assessment
Choice of risk exposure methods
(preparation of proposals)</p>
          <p>Making a decision
Impact on the level of risk</p>
          <p>Decrease
Control of results
Making a decision
for further actions</p>
        </sec>
        <sec id="sec-4-4-5">
          <title>Risk management body Executive authority</title>
          <p>Exclusion</p>
        </sec>
        <sec id="sec-4-4-6">
          <title>Body monitoring</title>
        </sec>
        <sec id="sec-4-4-7">
          <title>Risk management body</title>
          <p>The sequence of implementation of the EIR security risk management process is the following.</p>
          <p>The 1st stage of the EIR security management process is the most complex formation of a logical
sequence of individual partial functions, when the management body, based on the detection, analysis and
assessment of the predicted amount of information loss that may occur as a result of the implementation of
EIR threats, draws a conclusion on the need for countermeasures, selects methods and measures to influence
EIR security risk (preparation of proposals) and makes a decision regarding the need to organize
countermeasures. Let's reveal the essence of the elements of this stage.</p>
          <p>Identification of sources of EIR security threats and possible EIR security risks. When identifying and
identifying the sources of threats to EIR security (who or what is the cause), the object of influence (on
which the EIR security threat can act) and the initial analysis of the EIR security risk, it is necessary to assess
the possibility of realizing such a threat. At the same time, you should take into account:
 the frequency of occurrence of the EIR security threat (how often it may occur according to
statistical, research and other data, if any);</p>
          <p> the motivation, capabilities and informational resources needed by the potential infringer and which
may be at his disposal;</p>
          <p> the degree of attractiveness and vulnerability of information assets from the point of view of a
potential violator and a source of intentional EIR security threat;</p>
          <p> uncontrollable phenomena (natural disaster, epidemic) that can affect the state and quality of
information resources.</p>
          <p>The analysis and consideration of these factors is carried out using an expert method by specialists who
have knowledge of the tasks, principles and conditions of specific ITS operation.</p>
          <p>Upon completion of this process, the experts draw up a register of sources of threats to the security of the
EIR, which is used in the risk management system to determine further countermeasures, and the possibility
of their implementation is assessed. At the same time, a list of possible internal vulnerabilities (regarding
leakage, disclosure, distortion or loss of information) is also taken into account, in particular:
 unprotected connections of the information system to the Internet, local networks;
 insufficiently qualified staff;
 imperfect organization of access (proper access control) of users to equipment and information
resources;
 lack of backup copies of data (information) or software;
 failure of elements of the information system, etc.</p>
          <p>The EIR security risk assessment is carried out by the risk management body in order to choose justified
methods of neutralizing relevant threats (negative impact) and ensuring EIR security in the interests of the
functioning of a certain management system, which is based on the use of EIR of the relevant ITS. The
determination of the level (value) of the assessment should be carried out taking into account the experience of
the staff, the requirements of regulatory documents, the history of previous cases of EIR security violations, the
experience of other structural units (organizations), etc. The assessment is carried out for all types of EIR
security risks and is documented in the form of a table for each partial characteristic of information.</p>
          <p>
            For the risk assessment method, according to the State Standard [
            <xref ref-type="bibr" rid="ref12">12</xref>
            ], it is advisable to choose the matrix of
consequences due to its advantages (it is relatively easy to use and allows you to quickly rank risks according to
different levels of importance). To build the matrix itself, it is necessary to form quantitative ranking scales. By
analogy with [
            <xref ref-type="bibr" rid="ref13">13</xref>
            ], quality scales are proposed for assessing the level of the possibility of EIR security threats (Table
1) and the levels of their impact, subject to implementation, on individual properties (characteristics) of information
(Table 2 – 6). Such assessments of levels on a 5-point scale are preliminarily determined by experts, based on
information about the threat factor, causes, mechanisms and measures to prevent (reduce) the risk of EIR security.
          </p>
          <p>The level of information reliability is sufficient, but may have an insignificant negative impact
on the result of the management process</p>
          <p>The level of reliability of the information is medium, which can have a noticeable negative
impact on the result of the management process</p>
          <p>The level of information reliability is low, which can have a significant negative impact on the
result of the management process</p>
          <p>The level of reliability of the information is very low, which leads to the stopping of the
management process</p>
          <p>
            The received data of the assessment of the qualitative values of the levels of the possibility of EIR security
threats and their impact on individual properties of information (ranking scales: Tables 1 - 6) are the basis for
forming a matrix of consequences (estimates of the levels of EIR security risks) for each of its properties.
Based on [
            <xref ref-type="bibr" rid="ref12">12</xref>
            ], using the above 5-rank scale, a numerical risk assessment matrix is formed by multiplying the
numerical values of the corresponding rows and columns (ranks), which gives a conditional numerical value
of the level of risk of EIR security for each property of information in the range of numbers from 1 to 25, that
is, from the lowest level of risk to the highest. Due to the quantitative values of the matrix, it is possible to
qualitatively assess the level of risk of EIR security, in particular, based on the application of the generalized
Harrington desirability function [
            <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
            ]. Harrington's desirability scale is a universal verbal-numerical scale
(Table 7), which is used mainly in cases where assessments are subjective in nature.
          </p>
          <p>Content of the effects of exposure
The level of completeness of information is high, the management process is satisfactory</p>
          <p>The level of completeness of information is sufficient, but to a small extent it can negatively
affect the result of the management process</p>
          <p>The level of completeness of information is average, which to a certain extent can negatively
affect the result of the management process</p>
          <p>The level of completeness of information is low, which can significantly affect the result of
the management process</p>
          <p>The level of completeness of information is very low, which does not satisfy the performance
of the management process and leads to its stop</p>
          <p>Content of the effects of exposure
The level of information integrity is high, the management process is satisfactory
The level of integrity of information is sufficient, but to a small extent it can negatively affect
the result of the management process
The level of integrity of information is average, which to a certain extent can negatively affect
the result of the management process
The level of information integrity is low, which can significantly affect the outcome of the
management process я
The level of information integrity is very low, which does not satisfy the performance of the
management process and leads to its stop
The level of information confidentiality is high, it does not lead to the disclosure of the content of
documents with limited access and the negative consequences of the management process
The level of confidentiality of information is sufficient, but may lead to partial disclosure of the
content of documents with limited access and a slight violation of the management process
The level of confidentiality of information is medium, which may lead to indirect disclosure of the
content of documents with limited access and a noticeable violation of the management process
The level of confidentiality of information is low, which can lead to a significant disclosure of the
content of documents with limited access and a violation of the management process as a whole
The level of confidentiality of information is very low, which leads to the disclosure of the content
of documents with limited access in general and the disruption of the management process</p>
          <p>Using the Harrington scale (Table 7), 5 qualitative levels of EIR security risk are approximately
determined according to the following numerical scale (Table 8):
“very low” level – 1 - 4 (1/25 = 0,04; 4/25 = 0,16);
“low” level – 5 - 9 (5/25 = 0,2; 9/25 = 0,36);
“average” level – 10 - 16 (10/25 = 0,4; 16/25 = 0,64);
“high” level – 20 (20/25 = 0,80);
“critical” level – 25 (25/25 = 1).</p>
          <p>Thus, this matrix (Table 8) forms a set of values of qualitative assessments of the level of risk of EIR
security, valid for application to any of the characteristics (properties) of EIR, and it makes it possible to
quickly assess the "weight" of risks in relation to each property with relative quality information to make an
appropriate decision. It should be noted that the presence of an unacceptable level of EIR security risk (for
363
1. Very low
2. Low
3. Average
4. High
5. Very high
0 – 0,19
0,20 – 0,36
0,37 – 0,63
0,64 – 0,80
0,80 – 1,0
example, "high" or "critical"), based on at least one property of the information, requires an appropriate
response.</p>
          <p>The level of information availability is high, the management process is satisfactory
The level of information availability is sufficient, but to a small extent it can negatively affect</p>
          <p>the result of the management process
The level of information availability is average, which can significantly negatively affect the</p>
          <p>result of the management process
The level of information availability is low, which can significantly affect the outcome of the</p>
          <p>management process
The level of information availability is very low, which does not satisfy the performance of</p>
          <p>the management process and leads to its halt</p>
          <p>Therefore, for a response decision, it is sufficient to limit the calculation of the matrix for each property
of information separately and not to complicate the evaluation process to an integral one (for all properties
collectively). The result of the EIR security risk assessment is a register of such risks for each possible case
of violation of the reliability, completeness, integrity, confidentiality, availability of information in the
current management system. This register is used as a basis for forming conclusions when choosing a set of
measures to ensure EIR security during the implementation stages of the management process related to
countering EIR security risks.</p>
          <p>The choice of methods (measures) of influence on the risk of EIR security is carried out by the
management body in accordance with the conclusion on the level of EIR security risk to ensure the stable
functioning of the entire information system and increase its reliability.</p>
          <p>If, on the basis of the analysis and assessment of the safety risk of the EIR, a decision is made about the
need to reduce its level, then proposals are prepared to take a set of measures to bring the level of such risk to
the required value ("low" in practice). The specified proposals are developed by specialists of the expert
group. The development of this set of measures requires studying the possibility of reducing the level of EIR
security risk, provided that all available methods are adopted. At the same time, the impact on the reduction
of the EIR security risk is carried out through various areas: the physical environment; hardware (software);
elements of information infrastructure (means of ensuring communication); service personnel (process
administration). In order to determine measures of influence on the level of the safety risk of the EIR, it is
necessary to consider the vulnerabilities of the system (information assets) that require protection, and the
types of threats that can be realized in the presence of these vulnerabilities, as well as the economic
component (cost, expenditure of material resources, etc.) of one or the other of the event.</p>
          <p>The directions for reducing the level of EIR security risks include:
 risk avoidance;
 reducing the level of threats;
 decrease in the degree of mechanical vulnerability of ITS elements;
 reducing the possible impact of irresistible events (natural disaster, defiant aggression, etc.).</p>
          <p>Measures by direction can be organizational and technical. Organizational measures provide for the
presence of controlled methods of development and implementation of application programs, procedures for
processing incidents in the event of a breach in IT, control over the work of personnel, their training,
implementation of instructions on countering EIR security risks, and the use of safe methods of keeping
documentation. Technical measures provide comprehensive protection of elements of the information
system: hardware, software and means of providing the communication system (communication).</p>
          <p>Decision-making on the need to organize countermeasures for each EIR security risk is made by the
management body according to the binary principle:</p>
          <p>a). the assessed risk is insignificant (the value of the risk index falls within the range of the level of
acceptable risks), it can be neglected and measures to reduce it should not be developed;
b). the assessed risk is significant (unacceptable) and it is necessary to determine and implement measures
to reduce it and further control its level.</p>
          <p>The 2nd stage of the management process is carried out by the executive body and is aimed at the
implementation of measures to counter the EIR security risk (influence on the EIR security risk level), the
essence of which is to neutralize (reduce) the estimated level of the EIR security risk by applying a
predefined (at the 1st stage) set of measures.</p>
          <p>The main directions of influence on the risk level of the EIR security are the following:
 acceptance of the assessed risk (preparation of financial, material and other resources in case of
dangerous situations);</p>
          <p> reduction of the assessed risk (implementation of measures to prevent dangerous situations,
development of systems for their localization);</p>
          <p> exclusion of the assessed risk (use of safer technologies, improvement of security programs,
duplication (reservation) of elements of the information system, etc.).</p>
          <p>The 3rd stage of the management process (control of the results of neutralization of the EIR security risk)
is performed by the monitoring body, which constantly monitors the effectiveness of the impact on the EIR
security risk level. The essence of the implementation of the 3rd stage is to assess the results of reducing
(neutralizing) the risk of EIR security and providing objective information about this state to the risk
management body.</p>
          <p>Stage 4 – the management body, on the basis of the data received from the monitoring body regarding
the results of reducing (neutralizing) the level of EIR security risk, makes a decision on the results of the
impact on the level of EIR security risk and draws a conclusion on the need for further management
actions.</p>
          <p>Thus, the proposed 4-stage scheme makes it possible to implement an adaptive EIR security risk
management system based on a qualitative assessment of their level in order to choose reasonable
countermeasures in a certain ITS, which ensures the sequence of systemic neutralization measures.
5. Conclusions</p>
          <p>1. Destabilizing external and internal factors can cause EIR security risks in ITS based on the main
characteristics of EIR (reliability, completeness, integrity, confidentiality, availability). The management of
such risks is an important component of ensuring the cyber security of a certain management system
supported by ITS, in general, the cyber security of the state.</p>
          <p>2. The proposed methodological approach, based on the cybernetic management principle, allows creating
a system of adaptive risk management of EIR security - an important element of ensuring cyber security.
Such a system should include a management body, an executive body, a monitoring body and a management
object - the level of EIR security risk. The system is based on the algorithm for forming a set of values
(matrix) of qualitative levels of EIR security risk (according to the main characteristics of EIR) with the aim
of choosing reasonable solutions for countering such risks.</p>
          <p>3. The implementation of the proposed EIR security risk management process will provide improved
decision-making support for risk neutralization (reduction) in any information systems (ITS), which will
allow to increase the level of cyber security of the organization (institution), department and the state in
general.</p>
          <p>4. Further research should be focused on defining the list and essence of a set of measures to implement
countermeasures against of EIR security risk according to the cybernetic principle of management.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>6. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <source>[1] Military standard BCT 01.004</source>
          .
          <fpage>004</fpage>
          -
          <lpage>2014</lpage>
          (
          <volume>01</volume>
          ).
          <article-title>Information security of the state in the military sphere</article-title>
          .
          <source>Terms and definitions. [Effective from</source>
          <year>2014</year>
          -
          <volume>02</volume>
          -02].
          <article-title>-</article-title>
          <string-name>
            <surname>Kyiv</surname>
          </string-name>
          , Ukraine: MOU,
          <year>2014</year>
          . (In Ukrainian).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <article-title>[2] Cybersecurity threats: the way forward [Electronic resource]</article-title>
          . - Access mode: https://intelligence. house.gov/hearing/cybersecurity-threats
          <article-title>-way-forward.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Sharp</surname>
            <given-names>W.G.</given-names>
          </string-name>
          <article-title>Cyberspace and the Use of Force</article-title>
          . Falls
          <string-name>
            <surname>Church</surname>
          </string-name>
          . - V.A.:
          <source>Aegis Research</source>
          ,
          <year>2009</year>
          . - 234 p.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Lewis</surname>
            <given-names>A.J.</given-names>
          </string-name>
          <string-name>
            <surname>Securing</surname>
          </string-name>
          <article-title>Cyberspace for the 44th Presidency; Centre for Strategic and</article-title>
          International Studies,
          <year>2008</year>
          . [Electronic resource]. - Access mode: https://csis.org/files/media/csis/ pubs/081208_ securingcyberspace_44.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Bertil</given-names>
            <surname>Almer</surname>
          </string-name>
          . (
          <year>2014</year>
          ).
          <source>Modern General Risk Theory [Electronic resource]</source>
          . - Access mode: https://www. cambridge.org/core/journals/astin
          <article-title>-bulletin-journal-of-the-iaa/article/modern-general-risk-theory/ 9BBF4 F686467AD8C2C2CAF73F450 299C</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <article-title>[6] Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization</article-title>
          ,
          <year>2018</year>
          . Official site [Electronic resource]. - Access mode: https://www.nato.int/lisbon 2018/strategic-concept
          <article-title>-2018-eng</article-title>
          .pdf.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <source>[7] The Global Risks Report 2018 13th Edition</source>
          . [Electronic resource]. - Access mode: http://www3.weforum.
          <source>org/docs/ WEF_GRR18 Report.pdf.</source>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Horbulin</surname>
            <given-names>V.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kaczynskii</surname>
            <given-names>A</given-names>
          </string-name>
          .B.
          <article-title>Strategic planning: solving national security problems</article-title>
          . Monograph. - Kyiv, NISR,
          <year>2010</year>
          . - 288 p.
          <article-title>(In Ukrainian)</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Liepman</surname>
            <given-names>J.M.</given-names>
          </string-name>
          <article-title>The Third Domain; Homeland security digital library</article-title>
          ,
          <year>2018</year>
          . [Electronic resource]. - Access mode: https:// www.hsdl.org/?view&amp;doc=89385&amp;coll=public.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>Cyberspace</given-names>
            <surname>Presents Complex Global Challenges</surname>
          </string-name>
          [Electronic resource]. - Access mode: http://www.securityconference.de/ Program425+M58b8d057766.0.html?&amp;L=1.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Viner</surname>
            <given-names>N.</given-names>
          </string-name>
          <article-title>Cybernetics: or control and communication in the animal and the machine</article-title>
          . - 2nd revised ed. - Paris: Hermann &amp; Cie, Camb. Mass. (MIT Press),
          <year>1961</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <source>[12] ISO.IEC</source>
          <volume>31010</volume>
          :
          <fpage>2009</fpage>
          -
          <article-title>Risk management - Risk assessment techniques</article-title>
          .
          <source>[Electronic resource]</source>
          . - Access mode: https://www.en
          <article-title>-standard.eu/une-en-31010-2011-risk-management-risk-assessmenttechniques.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Nefiodova</surname>
            <given-names>L.Y.</given-names>
          </string-name>
          <article-title>Application of principles of project management in defense management:</article-title>
          <source>Lecture // Project Office of Reforms of the Ministry of Defense of Ukraine</source>
          . - Kyiv, MDU,
          <year>2019</year>
          (In Ukrainian).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Harrington</surname>
            <given-names>Е.</given-names>
          </string-name>
          <string-name>
            <surname>С</surname>
          </string-name>
          . The desirable function // Industrial Quality Control.
          <article-title>-</article-title>
          <year>1965</year>
          . - Vol.
          <volume>21</volume>
          . - №
          <volume>10</volume>
          . - PP.
          <fpage>494</fpage>
          -
          <lpage>498</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Boschian-Campaner</surname>
            <given-names>V</given-names>
          </string-name>
          .
          <article-title>Maintenance task scheduling, reaching a twofold objective</article-title>
          // American Journal of Operations Research. -
          <year>2015</year>
          . - Vol.
          <volume>5</volume>
          . -
          <fpage>№</fpage>
          3. - PP.
          <fpage>124</fpage>
          -
          <lpage>131</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>