<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Simulation model of information system transformation to increase survivability against cyber threats ⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Yuriy Syvytsky</string-name>
          <email>ys@intecracy.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Viktor Shevchenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>CPITS-II 2024: Workshop on Cybersecurity Providing in Information and Telecommunication Systems II</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institute of Software Systems of the National Academy of Sciences of Ukraine</institution>
          ,
          <addr-line>40-5 Akademik Hlushkov ave., 03187 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>319</fpage>
      <lpage>325</lpage>
      <abstract>
        <p>The paper is devoted to the topical issue of the development of methods for increasing the survivability of information systems in conditions of malicious harmful influences. The purpose of the study is to create computer simulation models of the transformation of information systems to increase their survivability in the face of cyber threats. Increasing the survivability of information systems is achieved by using models to predict the consequences of management decisions, as well as by finding optimal solutions for the survivability of information systems. The transformation of information systems is considered a necessary response to a change in the spectrum of threats, a change in the operating conditions, or a change in the functions of the information system. The connection between the current and previous research of the authors is established based on the identification of similarities in the patterns of transformation of organizational structures, technologies, and information systems. The analysis of previous studies on ensuring the survivability of information systems in the areas of management, audit, assessment of the level of information and cyber security, modeling, and optimization of measures to ensure information and cyber security was carried out. Analyzed studies on the protection of information systems of critical infrastructure objects. It was determined that information systems are an integral part of critical infrastructure facilities. Atomic (elementary) models and the construction of complex structural and logical models based on them are considered. The importance of the development of hierarchical models and the procedure for their creation by step-by-step conversion from mixed models is determined. The question of the existence of an optimal level of complexity of models is considered. Logistic models are considered the most adequate for modeling development processes. The considered model of the dynamics of structural transformation allows modeling of the transformation processes of organizations, technologies, and information systems. The results of the approbation of the model for various transformation scenarios are given. The simulation model is implemented in the MatLab algorithmic language.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;computer simulation model</kwd>
        <kwd>information system</kwd>
        <kwd>survivability</kwd>
        <kwd>logistic dependence</kwd>
        <kwd>useful effect</kwd>
        <kwd>resource</kwd>
        <kwd>management decision support</kwd>
        <kwd>automation</kwd>
        <kwd>optimization 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The relevance of the study is confirmed by the analysis of
the state and prospects for the development of the main
laws of cyber security in the world [1], which shows that
threats to the survivability of information systems are
growing and will continue to grow even more. The
relevance of research is because today all organizations are
involved in the process of digitization. And any information
threats can turn into big losses for the organization.</p>
      <p>The survivability of information systems is achieved
both by timely changes in information technologies, in
particular information protection technologies, and by
changing the structure of the information system by new
functional and security conditions. It is well known that the
successful implementation of ERP systems (Enterprise
Resource Planning—ERP) is possible only on condition of
careful analysis and reasonable adjustment of the
enterprise’s business processes, taking into account the
limitations and capabilities of ERP systems [2]. This entails
a deep transformation of the information systems
themselves. But the most acute issue of transformation of
information systems is caused by the need to ensure their
viability. According to the provisions of systems theory,
modern information systems are complex systems.
Therefore, in complex issues of transformation, their
behavior cannot always be clear and predictable. Therefore,
it is advisable to use mathematical and simulation models to
predict the behavior of information systems in the
conditions of transformation [2, 3].</p>
      <p>Accordingly, an urgent task is to create computer
simulation models of the transformation of information
systems to increase their survivability in the face of cyber
threats.</p>
      <p>
        0009-0008-9947-6653 (Y. Syvytsky);
0000-0002-9457-7454 (V. Shevchenko)
© 2024 Copyright for this paper by its authors. Use permitted under
Creative Commons License Attribution 4.0 International (CC BY 4.0).
2. Analysis of existing studies
Survivability is understood as the possibility of realizing the
goal of functioning in the event of adverse effects [4]. In the
conditions of war and the conditions of the existing trends
of cyber threats in the world [1] adverse influences take the
form of malicious destructive influences. To ensure the
survivability of information systems, it is necessary to solve
a complex of tasks related to ensuring cyber security,
information security, choosing safe structures of
information systems, as well as choosing safe organizational
structures that ensure the functioning of information
systems. The last two questions lead to complex problems
of transformation of structures [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        Management issues of information and cybernetic
security have a complex nature [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ] and lie not only in the
technical plane. Many security issues are regulated by
relevant regulatory documents, such as NIST standards [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
Information security management is based on an objective
assessment of the state of objects and threats. This requires
the use of specific methods of obtaining numerical estimates
of the level of information security, which, for example, for
distributed wireless systems are considered in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], and for
communication systems under conditions of cyber-attacks
are considered in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Adequate use of classic methods of
auditing information infrastructures [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] and assessment of
relevant information security risks [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ] is important.
Cybersecurity requires the creation and implementation of
appropriate complex programs [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Ensuring the
survivability of information systems by creating
information security systems, which include cyber security
systems, is based on a thorough numerical assessment of
information security risks [
        <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
        ].
      </p>
      <p>The considered approaches to ensuring the survivability
of information systems based on classical methods of
information security management and auditing,
unfortunately, do not pay enough attention to prognostic
modeling of the development of complex systems in
conditions of structural transformation.</p>
      <p>
        The creation of models of dynamic processes, to which
the processes of structural transformation should be
attributed, are discussed in detail in [2, 3]. The given
approaches make it possible to predict the consequences of
management decisions made and to find optimal solutions
for single-criteria and multi-criteria problems with vector
criteria. Simulation modeling methods are based on specific
computational methods [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. One of the most vivid
examples of simulation modeling of dynamic processes is
the task of forecasting the dynamics of the development of
computer epidemics, which includes the subtask of finding
optimal parameters of the cyber security system, which
would ensure the containment of the epidemic within the
relatively safe limits of the “controlled process” [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. To
solve multi-criteria optimization problems, approaches
based on scalar convolution of vector criteria are used [
        <xref ref-type="bibr" rid="ref19">2, 3,
19</xref>
        ]. Unfortunately, the considered approaches to modeling
and finding optimal solutions in the presented works are
general and do not take into account many features of the
task of ensuring the survivability of information systems.
      </p>
      <p>
        Paper [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], which considers the model of cyber
protection in the information system of the situational
center, and paper [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] regarding dynamic models of cyber
security based on a numerical assessment of the guarantee
capability of information systems of critical infrastructure
objects are closer to the formulation of the task of this
research. The study of the structure of dangers from
cyberattacks on critical infrastructure is analyzed in [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
Regulatory and legal provision of information security of
critical infrastructure objects is considered in [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ].
Approaches to cyber protection of critical infrastructure
based on integrated systems at the national level are studied
in [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. The issue of protecting critical infrastructure objects
from cyber-attacks by decentralizing telecommunication
networks is discussed in [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ].
      </p>
      <p>The value of research on the protection of information
systems of critical infrastructure facilities is that almost all
critical infrastructure facilities use complex and
functionally rich information systems to ensure their
functioning. Information systems are becoming an integral
part of critical infrastructure facilities. The regularities that
will be revealed when modeling the development of
information systems of critical infrastructure objects can be
extended to other types of information systems of a similar
level of complexity. However, in the reviewed publications,
attention is not paid to the modeling of structural
transformation processes.</p>
      <p>
        One of the important criteria of structural
transformation is the minimization of losses or the
maximization of the useful effect. The specified values
depend on the costs of information protection, which,
according to world experience, should be within 10–20% of
the costs of the organization’s information technologies
[
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]. The optimization of resource costs was studied in [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ].
Methods of modeling the dynamics of changes in the
efficiency of resource use in various organizational
structures were studied in the paper [2]. Unfortunately, at
the same time, abstract organizational structures were
considered without taking into account the existing
experience of forming specific organizational structures
within the framework of project management approaches
[
        <xref ref-type="bibr" rid="ref28 ref29">28, 29</xref>
        ]. In addition, the works [
        <xref ref-type="bibr" rid="ref26 ref27">2, 26, 27</xref>
        ] did not consider
the conditions of structural transformation at all.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], the task of forecasting the beneficial effect of the
organization in the conditions of transformation of the
organization structure is considered. It was determined that
over time, any organizational structure needs to be
transformed to increase competitiveness, adapt to new
conditions, specifics of business tasks, a new set of dangers
and challenges, etc.
      </p>
      <p>The need to change the structure of the organization is
usually caused by very serious reasons. In simpler cases, it
is enough to change the technologies used by the
organization. At the same time, it should be noted that the
development of the beneficial effects of organizations and
the development of the beneficial effects of technologies
have very similar patterns: exponential, linear, and logistic.
The disadvantage of the latter work is the modeling of the
structural transformation of exclusively organizational
structures. At the same time, approaches to the structural
transformation of information systems were not considered.
The main hypothesis in the further development of the
work was an assumption regarding the similarity of
patterns of structural transformations of organizational
structures, technologies, and information systems.</p>
      <p>During the analysis of existing research, a contradiction
was revealed between the need for practice in methods of
modeling and optimization of the processes of structural
transformation of information systems and the lack of
appropriate theoretical and applied approaches.</p>
      <p>The purpose of the paper is to increase the effectiveness
of the transformation of information structures by
forecasting the consequences of management decisions and
finding optimal solutions for the structural transformation
of information systems by creating dynamic simulation
models of the transformation of information systems.
3. Structural and logical models of
information systems
Information systems of organizations are complex large
systems, which does not allow all management decisions
regarding structural transformations to be checked in
practice. Because it carries the risk of stopping the system
and great losses for the organization. But from time to time
information systems need structural transformations, in
particular, to ensure the required level of their survivability.
This happens because, at the first stages of creating
information systems, the organization tries to put the
information system into operation as soon as possible to
receive functional support from it. Setting the task of
creating an information system at the first stages may not
take into account all the necessary factors. In addition, at
the first stages of creating an information system, all the
necessary factors may simply not yet manifest themselves
and, accordingly, be simply unknown to the developers of
the technical task. Further, as the information system is
operated, the necessary experience is gained, problem areas
are identified, old and new threats are identified, etc. All this
may lead to the need to transform the structure of the
information system. For example, a common approach is to
tie the structure of the information system to the structure
of the organization. And for a quick start, that's probably
true. But, for example, when creating ERP systems based on
the developments of market leaders in the development of
ERP systems, the structure of the information system is tied
to business processes, which will not necessarily reflect the
organizational structure.</p>
      <p>Thus, there is a need for periodic structural
transformations of information systems. Secondly, checking
management decisions regarding transformation in practice
is an expensive and dangerous measure. Therefore, it is
advisable to use simulation modeling to check the
consequences of management decisions and to find optimal
solutions for the structural transformation of information
systems.</p>
      <p>As an atomic (elementary) model of a structure node, we
define a certain functional element, at the input of which
input resources are received, and at the output, the useful
effect is obtained (Fig. 1). The atomic model formalizes the
transformation of input resources (equipment, materials,
money, personnel, information, know-how, reputation,
license, experience, time, etc.) into the output useful effect
(safety, profit, production volume, reputation, experience,
quality, efficiency, etc.).
The output values of one atomic model can be input to
another in such a way that a complex model will be formed
that is adequate for a complex real object. For example, a
structural-logical model of the useful effect of the
organization (profit) can have the form of a two-level
hierarchy (Fig. 2), consisting of atomic models of the useful
effects of personnel, production equipment, and material
supply.
As another example of a multi-level hierarchical model, we
present a model for assessing the security level of an
information system depending on the security
characteristics of its constituent elements of the information
system structure (Fig. 3).</p>
      <p>The difficulty of creating such models is that to achieve
the required level of adequacy, the complexity of the
hierarchical model must be increased both vertically and
horizontally. The general procedure for creating models
includes:
1.
2.
3.</p>
      <p>Creating a set of atomic models and establishing a
connection between them.</p>
      <p>Analysis of the results of the current modeling on
the primary model, comparison with the results of
statistical and expert data on the real process.</p>
      <p>Deciding to increase the adequacy of the model by
complicating it, and adding new elements.</p>
      <p>Hierarchical models of real objects often require
additional relationships that are not embedded in the
hierarchy structure. Fig. 4 shows examples of horizontal
communication at one level of the hierarchy and diagonal
communication between different levels of the hierarchy in
different branches, like the well-known “thick tree”
topology of telecommunication networks.</p>
      <p>
        Such structures are called mixed. Research by the
authors [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] showed that almost any mixed architecture
without cyclic links can be transformed into a hierarchical
one. At the same time, the primary mixed structure and the
corresponding hierarchical structure will be identical from
the point of view of simulation modeling (Fig. 5). But at the
same time, the
hierarchical structure
will be
more
organized. Therefore, it will be easier to formalize and
implement it in a simulation model.
      </p>
      <p>input data.
factors.</p>
      <p>It is not possible to provide the model with quality
Calculation errors are increasing.</p>
      <p>
        Calculation errors regarding secondary factors
become commensurate with the errors of the main
The authors’ research showed [
        <xref ref-type="bibr" rid="ref5">2, 5</xref>
        ] that one of the most
adequate models, which can equally successfully take into
account purely technical and humanitarian factors, are
logistic model.
4. Logistic development models
In the same way as for Moore’s law, in the absence of
restrictions on development, the dependence of the initial
useful effect on input resources has the character of an
exponent [2]. If the dependence of development is limited
from below and above, then this indicates the presence of
corresponding horizontal asymptotes, between which the
dependence of development is located (the dependence of
the useful effect on the spent resources). Such a dependence
has an S-shaped character and is most often specified by the
logistic function [2] (Fig. 6).


=  ( − 
)(
−  ),
(1)
−  ) asymptotes.

(
where  is the useful effect,  is time (input resource), 
are the lower and upper asymptotes,  is the scaling
factor that determines the growth rate and the angle of
inclination of the curve at the point of symmetry.
      </p>
      <p>The differential form</p>
      <p>makes it possible to establish
patterns regarding the growth rate at all values of input
resources. The growth rate of the
useful effect is
proportional to the product of the distances of the value of
the useful effect from the lower ( − 
) and upper
With constant coefficients  , 
, 
, the given
differential equation has analytical solutions
 = 
+
aging of technologies and structures are known (at least
considered a normalized logistic dependence increasing
approximately), it is important to reasonably choose the
1 + 
(
1
)(
)
coefficient  significantly simplifies the identification of the
growth rate of the logistic curve at the point of symmetry.
5. Computer model of dynamics
of structural transformation
We will use logistic dependencies to build a general
dynamic model of the transformation of the information
system at the stages of growth of the useful effect of the
and at the stages of the decline of the useful effect of the
organization
organization
 =  + ( −  ) ∙</p>
      <p>( −  ),
 =  − ( −  ) ∙</p>
      <p>( −  ).</p>
      <p>In the second case, the amplitude of the logistic
dependence has a negative value ( −  ).</p>
      <p>The integral form of logistic dependence has the form
 =  ( ) =  +
where</p>
      <p>( ) is the dependence of the growth of the useful
effect for the primary structure of the information system.</p>
      <p>( ) is the dependence of the drop in the useful effect
for the primary structure of the information system due to
changes in external conditions and the security situation.</p>
      <p>( ) is the dependence of the drop in the useful
effect for the primary structure of the information system
as a result of the managerial decision to replace it with a
more progressive one.</p>
      <p>( ) is the dependence of the growth of the useful
effect for the new structure of the information system.</p>
      <p>Any input resource or a combination of them can be
used as a logistic dependency argument. In our case, the
input resource is time. The general picture of changes in the
level of information security depending on time contains
characteristic stages of growth, decline, re-growth after
transformations, etc. Modeling of the life cycle of the level
of information security of the information system
was
performed for the indicator tFall=10 weeks. The value of
tFall is equal to the abscissa of the symmetry point of the
dependence of the fall of the security level 
( ), which
occurs as a result of changes in external conditions and the
security situation. Simplistically, it can be said that the value
of tFall characterizes the time of moral aging of existing
protection technologies and the existing structure of the
information system.
(4)
(5)
(6)
(7)
m
e
t
s
y
S
n
o
i
t
a
m
r
o
f
n
I
e
h
t
f
o
y
liit
b
a
v
i
v
r
u
S


time of the beginning of the transformation of the structure
and protection technologies tReform (the abscissa of the
point of symmetry of the dependence 
( ) of the increase
in the level of information security for new technologies and
new structures of the information system).</p>
      <p>Minimization of the information security level can be
used as optimality criteria
or an integral indicator of the level of information security
for the period of work [ ,  ] in the conditions of
transformation
.</p>
      <p>(8)
(9)</p>
      <p>In our case, the model was tested for the integral
indicator. The mathematical model was implemented in the
form of a simulation model in the MatLab algorithmic
language. An example of simulation results is shown in Figs.
7–11. The value of tReform varied in the range from 25 to 1.
Therefore, the integral criterion has a rather high level of
Isum=17.495. The situation can be assessed as satisfactory.</p>
      <p>Scenario 4 (Fig. 10). At tReform=5, the integral criterion
also has a high level of Isum=19.3381. There is no noticeable
gain in reducing the duration of low-security levels. The
script can be characterized as a work on prejudice. But the
question arises—whether transformations happen too often.
Will such a frequency of transformation leave time for the
planned operation of the information system?</p>
      <p>Scenario 2 (Fig. 8). tReform=15. The integral quality
criterion increased almost 4 times Isum=12.1844. The
duration of a critically low level of system protection has
also decreased several times. But in general, the level of
security should not be considered satisfactory.</p>
      <p>Scenario 5 (Fig. 11) (tReform=1, Isum=23.3319) has the
best indicators of the integral quality criterion. However,
the transformation begins almost simultaneously with the
implementation of the previous technology and system
structure. Doubts about the too-high frequency of
transformations only increase here.</p>
    </sec>
    <sec id="sec-2">
      <title>6. Conclusions</title>
      <p>The paper proposes a computer model of the transformation
of technologies and the information structure of the
information system to ensure the survivability of the
information system based on ensuring the required level of
information security.</p>
      <p>The model as part of the management decision support
software system allows you to predict the consequences of
various management decisions to choose the best one.</p>
      <p>The paper uses the criterion of maximizing the lowest
level of the organization’s useful effect over the entire
forecasting period. The integral criterion of the total
beneficial effect that the organization will receive in the
event of the implementation of a specific transformation
scenario is also used.</p>
      <p>Directions for further research. To choose the best
transformation scenario, it is necessary to add some
additional criteria or check the optimality according to the
selected integral criterion not at individual points, but at the
entire set of permissible values of the tFall and tReform
parameters.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>V.</given-names>
            <surname>Svanadze</surname>
          </string-name>
          ,
          <source>Near Future of Cyber Security and New Trends in Cyberspace, Global Foundation for Cyber Studies and Research</source>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>V.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          , Optimization Modeling in Strategic Planning, Military and Strategic Research Centre of National Defence University of Ukraine (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>V.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          , et al.,
          <article-title>Mathematical modeling of processes: Study guide</article-title>
          , Taras Shevchenko National University of Kyiv (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>A. G.</given-names>
            <surname>Dodonov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. V.</given-names>
            <surname>Lande</surname>
          </string-name>
          ,
          <source>Vitality of Information Systems</source>
          , Nauk.
          <source>Dumka</source>
          (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Syvytsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          ,
          <article-title>Computer Simulation Model of the Organization at the Stage of Transformation for the Purpose of Adaptation to New Projects, in: 14th International Scientific and Practical Conference from Programming UkrPROG'</article-title>
          <year>2024</year>
          (
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>V.</given-names>
            <surname>Svanadze</surname>
          </string-name>
          , Doctoral Thesis “Cybersecurity Policy and Strategy of Management”, Georgian Technical University (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Antunes</surname>
          </string-name>
          , et al.,
          <article-title>Information Security and Cybersecurity Management: A Case Study with SMEs in Portugal</article-title>
          ,
          <source>J.Cybersecur. Priv</source>
          .
          <volume>1</volume>
          (
          <year>2021</year>
          )
          <fpage>219</fpage>
          -
          <lpage>238</lpage>
          . doi:
          <volume>10</volume>
          .3390/jcp1020012.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>E. Y.</given-names>
            <surname>Handri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. A. W.</given-names>
            <surname>Putro</surname>
          </string-name>
          ,
          <string-name>
            <surname>D. I. Sensuse</surname>
          </string-name>
          , Evaluating the People, Process, and
          <article-title>Technology Priorities for NIST Cybersecurity Framework Implementation in EGovernment</article-title>
          ,
          <source>in: IEEE Int. Conf. on Cryptography</source>
          , Informatics, and
          <string-name>
            <surname>Cybersecurity</surname>
          </string-name>
          (ICoCICs) (
          <year>2023</year>
          )
          <fpage>82</fpage>
          -
          <lpage>87</lpage>
          . doi:
          <volume>10</volume>
          .1109/icocics58778.
          <year>2023</year>
          .
          <volume>10277024</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <article-title>Security Rating Metrics for Distributed Wireless Systems</article-title>
          ,
          <source>in: Workshop of the 8th International Conference on “Mathematics. Information Technologies. Education:” Modern Machine Learning Technologies and Data Science</source>
          , vol.
          <volume>2386</volume>
          (
          <year>2019</year>
          )
          <fpage>222</fpage>
          -
          <lpage>233</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Storchak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Salnyk</surname>
          </string-name>
          ,
          <article-title>A Method of Assessing the Level of Security of the Network Part of a Special Purpose Communication System Against Cyber Threats, Inf</article-title>
          . Proces. Syst.
          <volume>3</volume>
          (
          <issue>158</issue>
          ) (
          <year>2019</year>
          )
          <fpage>98</fpage>
          -
          <lpage>109</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>F.</given-names>
            <surname>Kipchuk</surname>
          </string-name>
          , et al.,
          <source>Assessing Approaches of IT Infrastructure Audit, in: IEEE 8th Int. Conf. on Problems of Infocommun., Sci. and Technol</source>
          . (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .1109/picst54195.
          <year>2021</year>
          .
          <volume>9772181</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>O.</given-names>
            <surname>Arkhypov</surname>
          </string-name>
          ,
          <article-title>Application of a Risk-based Approach using Reflexive Risk Models in Building Information Security Systems</article-title>
          ,
          <source>in: 1st Int. Workshop CITRisk</source>
          (
          <year>2020</year>
          )
          <fpage>130</fpage>
          -
          <lpage>143</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>H.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          , et al.,
          <source>Information Security Risk Analysis SWOT, in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>2923</volume>
          (
          <year>2021</year>
          )
          <fpage>309</fpage>
          -
          <lpage>317</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>J. Brown</surname>
          </string-name>
          ,
          <article-title>Executive's Cybersecurity Program Handbook: A Comprehensive Guide to Building and Operationalizing a Complete Cybersecurity Program</article-title>
          , Packt
          <string-name>
            <surname>Publishing</surname>
          </string-name>
          (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>O.</given-names>
            <surname>Arkhypov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Arkhypova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Krejčí</surname>
          </string-name>
          ,
          <article-title>Adaptation of a Risk-based Approach to the Tasks of Building and Functioning of Information Security Systems</article-title>
          ,
          <source>in: 2nd Int. Workshop on Computational &amp; Information Technologies for Risk-Informed Systems</source>
          , vol.
          <volume>3101</volume>
          (
          <year>2021</year>
          )
          <fpage>83</fpage>
          -
          <lpage>92</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhdanovа</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Kravchuk</surname>
          </string-name>
          ,
          <article-title>Information Protection Model based on Information Security Risk Assessment for Small</article-title>
          and
          <string-name>
            <surname>Medium-Sized</surname>
            <given-names>Business</given-names>
          </string-name>
          , Cybersecur. Edu., Sci.,
          <source>Technique</source>
          <volume>2</volume>
          (
          <issue>14</issue>
          ) (
          <year>2021</year>
          )
          <fpage>158</fpage>
          -
          <lpage>175</lpage>
          . doi:
          <volume>10</volume>
          .28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2021</year>
          .
          <volume>14</volume>
          .158175.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>V. L.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          , et al.,
          <article-title>Computing methods: Study guide</article-title>
          , Taras Shevchenko National University of Kyiv (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>V. L.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          , et al., Predictive Modeling of Computer Virus Epidemics,
          <string-name>
            <surname>K.</surname>
          </string-name>
          :
          <source>UkrNC RIT</source>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>V.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          et al.,
          <article-title>Management of Defense Resources in the Armed Forces of Ukraine - NSRC DT and</article-title>
          MS of Ukraine (
          <year>2002</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>V.</given-names>
            <surname>Grechaninov</surname>
          </string-name>
          , et al.,
          <source>Formation of Dependability and Cyber Protection Model in Information Systems of Situational Center, in: Workshop on Emerging Technology Trends on the Smart Industry and the Internet of Things</source>
          , vol.
          <volume>3149</volume>
          (
          <year>2022</year>
          )
          <fpage>107</fpage>
          -
          <lpage>117</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>H.</given-names>
            <surname>Hulak</surname>
          </string-name>
          , et al.,
          <article-title>Dynamic Model of Guarantee Capacity and Cyber Security Management in the Critical Automated System</article-title>
          ,
          <source>in: 2nd Int. Conf. on Conflict Management in Global Information Networks</source>
          , vol.
          <volume>3530</volume>
          (
          <year>2023</year>
          )
          <fpage>102</fpage>
          -
          <lpage>111</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>O.</given-names>
            <surname>Dovgan</surname>
          </string-name>
          ,
          <article-title>Critical Infrastructure as an Object of Protection Against Cybernetic Attacks, Information Security: Challenges and Threats of Modernity: Materials of a Scientific and Practical Conference (</article-title>
          <year>2013</year>
          )
          <fpage>17</fpage>
          -
          <lpage>20</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>S.</given-names>
            <surname>Toliupa</surname>
          </string-name>
          , I. Parkhomenko,
          <string-name>
            <given-names>H.</given-names>
            <surname>Shvedova</surname>
          </string-name>
          ,
          <article-title>Security and Regulatory Aspects of the Critical Infrastructure Objects Functioning and Cyberpower Level 142 Assesment</article-title>
          , in: 3rd
          <source>Int. Conf. Adv. Inf. Commun. Technol</source>
          . (
          <year>2019</year>
          )
          <fpage>463</fpage>
          -
          <lpage>468</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>L.</given-names>
            <surname>Slipachuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Toliupa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Nakonechnyi</surname>
          </string-name>
          ,
          <article-title>The Process of the Critical Infrastructure Cyber Security Management using the Integrated System of the National Cyber Security Sector Management in Ukraine, 3rd</article-title>
          <string-name>
            <surname>Int. Conf. Adv. Inf. Commun. Technol.</surname>
          </string-name>
          (
          <year>2019</year>
          )
          <fpage>451</fpage>
          -
          <lpage>454</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>P.</given-names>
            <surname>Anakhov</surname>
          </string-name>
          , et al.,
          <article-title>Protecting Objects of Critical Information Infrastructure from Wartime Cyber Attacks by Decentralizing the Telecommunications Network, in: Cybersecurity Providing in Information and Telecommunication Systems II</article-title>
          , vol.
          <volume>3550</volume>
          (
          <year>2023</year>
          )
          <fpage>240</fpage>
          -
          <lpage>245</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>V.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          , et al.,
          <source>Designing of Functionally Stable Information Systems Optimal for a Minimum of Losses, in CADSM 2019, 15th International Conference on the Experience of Designing and Application of CAD Systems (CADSM)</source>
          (
          <year>2019</year>
          )
          <fpage>36</fpage>
          -
          <lpage>40</lpage>
          . doi:
          <volume>10</volume>
          .1109/CADSM.
          <year>2019</year>
          .
          <volume>8779299</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>V.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Rabchun</surname>
          </string-name>
          ,
          <article-title>Setting the Problem of Resource Optimization of a Complex of Software Means of Information Protection in the Conditions of Dynamic Information Confrontation</article-title>
          ,
          <source>Weapon Systems and Military Equipment</source>
          ,
          <volume>3</volume>
          (
          <issue>51</issue>
          ) (
          <year>2017</year>
          )
          <fpage>89</fpage>
          -
          <lpage>94</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <article-title>A Guide to the Project Management Body of Knowledge PMBOK, 6th edition</article-title>
          , Project Management Institute, Inc. (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <article-title>A Guide to the Project Management Body of Knowledge PMBOK, 7th edition</article-title>
          , Project Management Institute, Inc. (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>Y. P.</given-names>
            <surname>Zaichenko</surname>
          </string-name>
          ,
          <source>Fundamentals of Designing Intelligent Systems: [Learning</source>
          . Manual],
          <source>Slovo Publishing House</source>
          (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>