<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>S. Gnatyuk);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Experimental study of the method for prioritizing it incidents at critical information infrastructure facilities of the state⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>rgiy Gnatyuk</string-name>
          <email>s.gnatyuk@kai.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Viktori</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sydorenko</string-name>
          <email>v.sydorenko@ukr.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>m Polozhentsev</string-name>
          <email>artem.polozhentsev@kai.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>AdvAIT-2024: 1st International Workshop on Advanced Applied Information Technologies</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Al Farabi Kazakh National University</institution>
          ,
          <addr-line>71 al-Farabi ave., Almaty, 050040</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
      </contrib-group>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>This paper presents an experimental study of a method for prioritizing IT incidents at critical information infrastructure facilities of the state. The method builds on established frameworks such as ITIL, COBIT, ISO/IEC 20000, and the NIST Cybersecurity Framework, integrating them with the Analytic Hierarchy Process (AHP) to assess and rank IT threats based on their impact. The proposed method involves a multistage approach, including threat identification, local and global prioritization, and synthesis of results for effective IT security management. The method takes into account the impact of incidents on key stakeholders, including citizens, society, the state, and law and order. Experimental validation was conducted using real-world data, demonstrating that hardware incidents hold the highest priority for state protection, while software and security incidents are most critical for citizens. The results highlight the importance of maintaining robust physical infrastructure and developing reliable IT security software. This method provides a practical tool for optimizing resource allocation and enhancing the security and resilience of critical information infrastructure.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Critical infrastructure</kwd>
        <kwd>critical information infrastructure</kwd>
        <kwd>critical information infrastructure facilities</kwd>
        <kwd>IT incidents</kwd>
        <kwd>ITIL</kwd>
        <kwd>IT incident prioritization</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>assessment, considering their impact on various aspects of the functioning of critical facilities, as
well as the development of effective strategies to minimize risks.</p>
      <p>In order to achieve a high level of reliability and sustainability of IT systems, the article discusses
the key stages of the developed method, including threat identification and assessment, prioritization
using the pairwise comparison method (AHP), and synthesis of local and global priorities for IT
security management. The described approach allows organizations to adapt existing methods to the
specifics of their activities, thus ensuring more effective risk management and maintaining the
stability of critical information infrastructures.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Literature review</title>
      <p>Despite the importance of ensuring the IT security of CII, there is currently a lack of scientific
research into the development and implementation of methods for prioritizing IT incidents, both
internationally and domestically. Therefore, during the analysis, the authors investigated incident
management approaches in different areas of CII.</p>
      <p>Article [1] presents a systematic approach to risk assessment in telecommunications systems,
with a particular focus on fifth-generation mobile networks (5G). The study provides an analysis of
both standalone and non-standalone 5G networks, examining the migration process from 4G to 5G
and identifying vulnerabilities inherent to both network generations. The main objective of the
research is to classify potential threats using the STRIDE model [2] and derive a risk matrix based
on the likelihood and impact of 12 threat scenarios affecting the radio access and network core. Also,
the methodology [3] includes an overview of the 5G system specification, highlighting new security
features compared to 4G, and analyzing residual vulnerabilities in non-standalone 5G deployments
where legacy 4G protocols are still in use. To address these risks, the paper proposes a set of
mitigations and security controls, offering a generic framework that can be adapted for different 5G
implementations. This approach contributes to understanding security weaknesses in emerging
telecommunications systems and provides a basis for developing more robust risk mitigation
strategies.</p>
      <p>Article [4] deals with the problem of managing cyber risks in information systems of critical
infrastructure objects. The main objective of the study is to develop methods and models for risk
assessment and management, in particular vector and integral risk models. The vector risk model
uses a set of parameters to determine the level of risk to which the weighting factor is assigned,
and the total risk is calculated as the vector sum of the parameters, taking into account their
weighting factors. This model makes it possible to identify the main risk components and to easily
visualize and understand risks at different system levels. The integral risk model provides a
comprehensive approach to risk assessment, taking into account the relationships between
different parameters. In practice, these systems are used to monitor and manage cybersecurity in
various critical infrastructure sectors, such as energy, transport and healthcare. The results of the
study show that the proposed vector and integral risk models are effective tools for assessing and
reducing cyber risks, providing reliable protection of critical infrastructure information systems
from cyber threats.</p>
      <p>Article [5] discusses mathematical methods to protect critical infrastructure from undesired
events. The main objective of the study is to provide a template for analyzing and improving the
protection and sustainability of critical infrastructure. Incident estimation includes models of the
probability of failure of system components and the expected losses from such failures. For cyber
security, vulnerability assessment methods and incident response times are considered.
Sustainability metrics include the sustainability index, which measures the ability of the system to
recover from failures, and the recovery target, which determines the maximum allowable system
downtime. The use of these mathematical methods allows us to quantify incidents, evaluate the
effectiveness of cybersecurity measures and improve cooperation between stakeholders, which
confirms the practical value of the developed methods for effective management of critical
infrastructure protection.</p>
      <p>Article [6] examines the challenges organizations face in managing and responding to
cybersecurity incidents through the use of Incident Response, Capability Maturity Models (CMMs).
The study highlights that while maturity models such as NIST, CMMI, IRM3, and CERT-RMM
provide guidelines for assessing incident response capabilities, they lack systematic methodologies
for translating maturity assessment outcomes into actionable incident prioritization metrics. Key
factors influencing incident prioritization include organizational preparedness, communication
efficiency, and the integration of human and socio-technical elements into maturity assessments.
The study also identifies gaps in existing CMMs, such as limited applicability across organizations,
excessive complexity, and inadequate alignment with incident prioritization frameworks.
Addressing these limitations, the research emphasizes the need for dynamic models and
comprehensive guidelines that link maturity assessments with prioritization criteria, enabling
organizations to refine their incident management processes in response to evolving threat
landscapes and maturity levels.</p>
      <p>Article [7] presents the development of an algorithm designed to prioritize cyber threats in the
cybersecurity system, taking into account their high probability of implementation. The main
objective of the study is to create an algorithm that includes a hierarchical model of a cybersecurity
system with three levels: cybersecurity, threats and risks. The article discusses in detail the AHP
method, which allows to evaluate and compare threat priorities. Key cyber threats such as Trojans,
viruses and worms have the highest priority and require targeted mitigation measures. The results
of the study confirm the practical value of the developed methodology, which helps to systematically
prioritize threats and effectively manage cybersecurity.</p>
      <p>As also explored in Articles [8, 9], recent advancements in cybersecurity research have
emphasized the critical role of resilience in constructing robust IT infrastructures capable of
resisting, restoring, and adapting to cyberattacks. The concept of resilience extends beyond
traditional cybersecurity to address the dynamic challenges posed by evolving threats. This work
highlights various techniques for enhancing resilience, including adaptive multi-agent systems,
game-based simulation frameworks, and anomaly detection mechanisms. These approaches focus on
ensuring continuity and stability in critical infrastructure through proactive threat detection and
mitigation. For instance, methods such as adaptive distributed resilient observers and moving target
defense paradigms have demonstrated effectiveness in countering sophisticated attacks like
denialof-service (DoS) and data injection. While these frameworks provide robust mechanisms for
maintaining system resilience, they primarily address operational stability rather than the
prioritization of IT incidents.</p>
      <p>Thus, in Table. 1, it is proposed to compare the approaches described above that can be used to
develop a method for prioritizing IT incidents according to the following criteria: ease of use (EU),
focus on critical infrastructure (CI), objectivity (OB), possibility of application to IT incidents (IT).</p>
      <p>Thus, Table. 1 shows that the method developed by the authors of the study [7] is the best
approach on the basis of which it is possible to develop a method for prioritizing IT incidents to
ensure the security of CII, because it is easy to use, thanks to a clear hierarchical model that makes
the incident assessment process understandable and accessible to users, it includes specific
mechanisms for assessing and prioritizing threats specifically for CII, and the use of the hierarchical
analysis method provides objectivity in the assessment of threats, as it allows threats to be
systematically and transparently compared and ranked on the basis of established criteria.</p>
      <p>Therefore, the purpose of this article is to develop and study a method for prioritizing IT incidents
at CIIF.</p>
      <p>To achieve this goal, it's necessary to solve the following tasks:
1) To analyze existing approaches to prioritizing IT incidents and identify their advantages and
disadvantages.</p>
      <p>2) To develop a method for IT incidents prioritization at the CIIF, based on the Hierarchy Analysis
Method (hereafter referred to as AHP), in order to ensure the reliability and sustainability of the
functioning of the CIIF.</p>
      <p>3) To study the experimental method developed at CIIF for IT incidents prioritization.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Materials &amp; methods</title>
      <p>The method developed consists of the following steps:</p>
      <p>Step 1. Definition of the IT Incident Management Structure of a Critical Information
Infrastructure Facility.</p>
      <p>At this step, it's necessary to create a structure for managing IT incidents, including the
identification and classification of major incidents, such as problems with physical devices, software,
security incidents, etc., as well as the creation of an appropriate hierarchical model.</p>
      <p>Step 2. Evaluation of incidents and their priorities at both local and global levels in the IT security
system.</p>
      <p>At this step, it is necessary to assess the priority of each IT incident, taking into account its impact
on different levels (local and global) of IT security, using the pairwise comparison method (AHP)
[10-11] to assess the impact of each incident, calculating local and global threat priorities to
determine the most critical ones for managing and minimizing risks.</p>
      <p>Step 3. Comparison of elements of the IT security system at different levels to assess their impact
and set priorities using the pairwise comparison method (AHP).</p>
      <p>Step 3.1. Construction of pairwise comparison matrices</p>
      <p>At this step, it's necessary to create a matrix of pairwise comparisons that allows to evaluate the
relative importance of each criterion or alternative in the system. This step provides a framework
4
where A – a matrix of paired comparisons, aij – elements of the matrix of paired comparisons.</p>
      <p>Step 3.2. Normalization of paired comparison matrices</p>
      <p>At this stage it's necessary to normalize the paired comparison matrices to ensure that the sum
of all elements in each column of the matrix is 1. This allows to compare different criteria and their
weights based on a single scale.
where a 'ij normalized element of the paired comparison matrix, aij – the initial element of the
matrix of paired comparisons.</p>
      <p>After normalizing all the elements of the matrix, we obtain a normalized matrix A′:
where, A′ - normalized pairwise comparison matrix, a 'ij - normalized element of the paired
comparison matrix</p>
      <p>Step 3.3. Calculation of weight vectors and Ax vector</p>
      <p>In this step, we calculate the weight vectors W for each criterion based on a normalized matrix of
paired comparisons A', which is necessary to determine the relative importance of each criterion and
to further analyze their impact on the overall result.
where Wi - the weight coefficient for i-th criterion, a 'ij - normalized element of the paired
comparison matrix, n – number of criteria.</p>
      <p>To calculate the vector that represents the relative importance of each criterion and will be used
for further calculations, we use the following formula:
for further calculations. To do this, create a matrix A of size n×n, where each element aij represents
the ratio of importance between i and j criteria. The elements of the matrix are arranged as follows:
where W - are vectors of weights of comparison criteria.</p>
      <p>Next, to assess the consistency of the matrix of paired comparisons and the accuracy of certain
weight coefficients, which is critical for making informed decisions in the hierarchy analysis method,
it is necessary to calculate the vector Ax:</p>
      <p>
        Ax = A ×W
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        )
aij 
a 'ij =
aij
n
∑ akj
k =1
 a '11

A ' =  
 a '1 j



a '1i 
      </p>
      <p>
 
a 'ij 
Wi =
1 n</p>
      <p>∑ a 'ij
n j=1
W1 
 </p>
      <p>
        W
W =  2 
 
 
Wn 
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
(
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
where A - initial matrix of paired comparisons, W - vector of weights.
      </p>
      <p>So, the vector Ax helps us understand how each criterion affects the overall outcome, given the
relative importance of each criterion.</p>
      <p>Step 3.4. Calculation of the consistency index and ratio.</p>
      <p>At this stage, it is necessary to calculate the consistency index and consistency ratio to check the
consistency of the matrix of paired comparisons, which is an important step for evaluating the
reliability of decisions made based on weighting factors.</p>
      <p>To check the consistency of the matrix of paired comparisons, which ensures logical consistency
and reliability of certain weighting coefficients, we calculate the largest eigenvalue:
λmax =
1 n ( Ax)i</p>
      <p>∑
n i=1 Wi
CI = λmax − n</p>
      <p>n −1
CR =</p>
      <p>CI</p>
      <p>RI
where λmax - the largest eigenvalue, n - number of criteria, Ax - elements of vectors, Wi - elements of
the weight vector.</p>
      <p>The consistency index determines how consistent the matrix of paired comparisons is:
where CI -consistency index, λmax - the largest eigenvalue, n - number of criteria.
where CR – consistency ratio, CI - consistency index, RI - random consistency index, depends on the
number of criteria and is determined by the table for the corresponding values .</p>
      <p>•
•</p>
      <p>If CR &lt; 0.1, - the matrix of paired comparisons is considered consistent.</p>
      <p>If CR ≥ 0.1, this means that the matrix has significant discrepancies and requires revising
paired comparisons to achieve better consistency.</p>
      <p>This step is crucial for ensuring the reliability and validity of decisions made, as it allows to
identify and eliminate possible inconsistencies in the matrix of paired comparisons.</p>
      <p>Step 4. Synthesis of local and global priorities for the IT security system</p>
      <p>At this step, it is necessary to synthesize local and global priorities for the IT security system,
which will determine the overall importance of each alternative solution, taking into account the
weights of criteria and their priorities.</p>
      <p>For each criterion Ci defining local priorities of alternatives Aj. Local priority of the alternative Aj
by criterion Ci denoted as WCi, Aj.</p>
      <p>Global priority alternatives Aj is calculated as the sum of the products of the weights of criteria
and local priorities of the corresponding alternatives. The formula for calculating global priority is
as follows:</p>
      <p>GAj</p>
      <p>m
=∑(WC ×WCi ,Aj )</p>
      <p>i=1 i
where GA – global priority of the alternative Aj, WC – weight of the criterion Ci, WCi ,Aj - local
j i
priority of the alternative Aj by criterion Ci., m – number of criteria.</p>
      <p>After calculating the global priorities for each alternative, we obtain a vector of global priorities
that allows us to determine the overall importance of each alternative in the IT security system and
to draw informed conclusions about the selection of the highest priority alternative solutions for the
IT security system. The alternative with the highest global priority is the most important and should
be prioritized for implementation.</p>
      <p>
        Step 5. Evaluation and adjustment of IT security priorities
(
        <xref ref-type="bibr" rid="ref7">7</xref>
        )
(
        <xref ref-type="bibr" rid="ref8">8</xref>
        )
(
        <xref ref-type="bibr" rid="ref9">9</xref>
        )
(
        <xref ref-type="bibr" rid="ref10">10</xref>
        )
At this step, it is necessary to calculate the final results of the priority assessment for the IT security
system and adjust these priorities if necessary. This provides an accurate and informed definition of
the most important aspects for protecting critical information infrastructure.
where aij – element of the matrix of paired comparisons, and i - line number, j – column number,
a 'ij – normalized element of the paired comparison matrix, w1, w2,… wn – weighting coefficients
(priorities) defined for each criterion, Y1, Y2,… Yn – results obtained after multiplying the normalized
matrix by the vector of weighting coefficients.
      </p>
      <p>Obtained results Y1, Y2,… Yn reflect the relative importance of each criterion or alternative in the
context of IT security. The analysis of these results allows us to determine which aspects require the
greatest attention and resources to ensure effective protection.</p>
      <p>Based on the results obtained and adjusted, decisions are made on the priority areas for IT incident
protection. This helps to allocate resources efficiently and focus on the most important aspects of
protecting critical information infrastructure.</p>
      <p>
        The implementation scheme of the developed method is shown in Figure 2:
(
        <xref ref-type="bibr" rid="ref11">11</xref>
        )
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Experimental study of the method</title>
      <p>For an experimental study of the developed method, we will apply it to the 'Information services'
sector, the 'mass media' sub-sector, which includes, for example, the provision of television and radio
broadcasting services [12-13].</p>
      <p>Step 1. In the presented model, the first level of the hierarchy has one objective: reliability and
stability of the CIIF. Its priority value is assumed to be one.</p>
      <p>Next, to form the second level of the hierarchy, it is proposed to apply the international standard
ITIL [14] in accordance with the analysis carried out.</p>
      <p>Therefore, the second level of the hierarchy includes different types of threats, classified
according to ITIL:
•
•
•
•
•
•
•
•</p>
      <p>Hardware Incidents (HI);
Software Incidents (SI);
Security Incidents (SEI);
Service Outages (SO);
Connectivity Issues (CI);
User Errors (UE);
Configuration Issues (CFI);</p>
      <p>Performance Issues (PI).</p>
      <p>The priorities of these threats are calculated using a matrix of pairwise comparisons of threats
relative to the CIIF by comparing elements of the second level of the hierarchy with those of the first
level [15].</p>
      <p>The third level of the hierarchy covers the impact on citizens, society, the state and the rule of
law. The impact of threats on these three categories is also assessed using a pairwise comparison
matrix, which allows the priorities of threats for each category to be determined.</p>
      <p>The structure of IT incident management in the CIIF [16], can be illustrated as presented in Fig. 3
(where C – citizen, S – society, St – state, LO – law and order):</p>
      <p>Step 2. Estimates in the Saaty matrix are based on the relative importance of threats to the
Reliability and Sustainability of CIIF. They take into account the potential impact of each threat on
the overall level of security and functionality of the system.</p>
      <p>
        Step 3. According to (
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5 ref6 ref7 ref8 ref9">1-9</xref>
        ), we construct a matrix of pairwise comparisons, which is based on the
scale of importance. The matrix has the following form (Table 2).
      </p>
      <p>Global priorities show the relative strength, size and importance of each element of an IT security
system [17]. Based on the calculations performed, User Errors (UE) has the highest local priority for
IT security compared to other threats - 0.25. In second place is Service Outages (SO) with a global
priority of 0.20. In third place is Security Incidents (SEI) with a global priority of 0.15.</p>
      <p>Software Incidents (SI) and Hardware Incidents (HI) are also important, with global priorities of
0.12 and 0.10 respectively. Configuration Issues (CFI) also deserve attention with a global priority of
0.08. For other threats, the global priorities are as follows Performance Issues (PI) – 0.06, Connectivity
Issues (CI) – 0.04.</p>
      <p>The global priority values obtained allow us to determine which threats are most critical to
ensuring the reliability and sustainability of critical information infrastructures. Focusing on the
highest priority threats helps to effectively manage IT security and minimize risks to citizens, society,
government and public order [18] (Table 3).</p>
      <p>The Paired Comparison Matrix allows to determine which of the threats are most critical to ensuring
IT security. This helps to focus resources and efforts on the most important issues, minimizing the impact
of potential threats on the system [19].</p>
      <p>
        Step 4. The main task of this stage is to determine the local priorities of risks of objects of protection
through the intermediate second level – threats, using pairwise comparison matrices for these threats,
according to (
        <xref ref-type="bibr" rid="ref10">10</xref>
        ). Thus, using a group of pairwise comparison matrices for the above threats, we
consistently form a set of local priorities of the third level regarding the risks of the individual, society
and the state. The values of local priorities of risks of security objects for these threats are shown in Table.
4, taking into account [20].
      </p>
      <sec id="sec-4-1">
        <title>Connectivity Issues (CI)</title>
      </sec>
      <sec id="sec-4-2">
        <title>User Errors (UE)</title>
      </sec>
      <sec id="sec-4-3">
        <title>Configuration Issues (CFI)</title>
      </sec>
      <sec id="sec-4-4">
        <title>Performance Issues (PI)</title>
        <p>
          Step 5. Together with the matrices of the paired comparisons, we obtained measures of the estimates
of the deviation from consistency, which are summarized in Table. 5, according to (
          <xref ref-type="bibr" rid="ref11">11</xref>
          ).
        </p>
        <p>Therefore, it can be concluded that according to the conducted experiment, hardware incidents (HI)
have the highest priority for the state (0.483), which emphasizes the need to support the physical
infrastructure, software incidents (SI) and security incidents (SEI) are the most critical for citizens (0.552
and 0. 565 respectively), requiring attention to reliable software and cyber security; Service Outages (SO)
have a significant impact on citizens and society, but less on the state and law and order; Performance
Issues (PI), User Errors (UE) and Configuration Issues (CFI) have a significant impact on citizens, requiring
improvements in IT services and user training.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>In conclusion, this study successfully achieved its key objectives by thoroughly analyzing international
standards and practices such as ITIL, COBIT, ISO/IEC 20000, and the NIST Cybersecurity Framework.
Through this analysis, the strengths and weaknesses of these approaches were identified, enabling the
selection of the most relevant elements for the development of a new methodology. A notable finding is
the limited scientific research available on IT incident prioritization, which highlights the relevance of
this study. The ITIL framework, in particular, stood out for its structured, flexible, and service-oriented
approach.</p>
      <p>This paper develops a method that integrates international best practices with the Analytic Hierarchy
Process (AHP). It effectively addresses the identification, assessment and prioritization of threats,
incorporating both local and global priorities to improve IT security management. The approach allows
for the consideration of different aspects of security, including their impact on citizens, society, the state
and the rule of law, making it adaptable to different security contexts.</p>
      <p>The practical value of the method was confirmed through experimental testing on real-world data.
The results underscored its capacity to systematically prioritize IT threats, demonstrating that hardware
incidents are of highest priority for state-level protection, while software and security incidents are of
greater concern for citizens. These insights emphasize the importance of maintaining a resilient physical
IT infrastructure and focusing on the development of reliable IT security software. Overall, this study
contributes a significant advancement in IT incident management, providing a practical tool for
improving IT security practices across different sectors.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>The authors have not employed any Generative AI tools.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Holtrup</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lacube</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Percia David</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mermoud</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bovet</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Lenders</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>5G system security analysis</article-title>
          .
          <source>arXiv preprint arXiv:2108</source>
          .08700. https://arxiv.org/abs/2108.08700
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Holtrup</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          , et al. (
          <year>2023</year>
          ).
          <article-title>Modeling 5G threat scenarios for critical infrastructure protection</article-title>
          .
          <source>In Proceedings of the 15th International Conference on Cyber Conflict: Meeting Reality</source>
          (pp.
          <fpage>161</fpage>
          -
          <lpage>180</lpage>
          ).
          <source>doi:10.23919/CyCon58705</source>
          .
          <year>2023</year>
          .10
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>R.</given-names>
            <surname>Khan</surname>
          </string-name>
          , et al.,
          <article-title>STRIDE-based Threat Modeling for Cyber-Physical Systems</article-title>
          ,
          <string-name>
            <surname>IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe)</surname>
          </string-name>
          (
          <year>2017</year>
          )
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>V.V.</given-names>
            <surname>Mokhor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.E.</given-names>
            <surname>Pukhov</surname>
          </string-name>
          <article-title>Institute for Modelling in Energy Engineering National Academy of Sciences of Ukraine</article-title>
          ,
          <string-name>
            <given-names>S.F.</given-names>
            <surname>Honchar</surname>
          </string-name>
          , &amp; G.E. Pukhov Institute for Modelling in
          <source>Energy Engineering National Academy of Sciences of Ukraine</source>
          . (
          <year>2019</year>
          ).
          <article-title>Evaluation of risks of cyber security of information systems of objects of critical infrastructure</article-title>
          .
          <source>Elektronnoe Modelirovanie</source>
          ,
          <volume>41</volume>
          (
          <issue>6</issue>
          ),
          <fpage>65</fpage>
          -
          <lpage>76</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>D.</given-names>
            <surname>Jablanski</surname>
          </string-name>
          . (
          <year>2023</year>
          ).
          <article-title>Method for Determining the State of Protection of Critical Information Infrastructure Objects from IT Risks</article-title>
          . Scientific Research on Cybersecurity. URL: https://www.researchcybersecurity.com/state-protection-method/ (accessed:
          <fpage>01</fpage>
          .
          <fpage>06</fpage>
          .
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Gulay</surname>
          </string-name>
          , &amp;
          <string-name>
            <surname>L. Maglaras.</surname>
          </string-name>
          (
          <year>2024</year>
          ).
          <article-title>Alignment of Cybersecurity Incident Prioritisation with Incident Response Management Maturity Capabilities</article-title>
          . arXiv preprint, arXiv:
          <fpage>2410</fpage>
          .02259. https://arxiv.org/pdf/2410.02259.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.B.</given-names>
            <surname>Kaczynski</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.I. Varycheva</surname>
          </string-name>
          , &amp;
          <string-name>
            <given-names>S.V.</given-names>
            <surname>Sviridenko</surname>
          </string-name>
          . (
          <year>2016</year>
          ).
          <article-title>Effective IT Incident Management in critical information infrastructure</article-title>
          .
          <source>Information and Law</source>
          , No.
          <volume>2</volume>
          (
          <issue>17</issue>
          ), pp.
          <fpage>114</fpage>
          -
          <lpage>126</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S.</given-names>
            <surname>Lysenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Sokalskyi</surname>
          </string-name>
          ,
          <string-name>
            <surname>&amp; I. Mykhasko.</surname>
          </string-name>
          (
          <year>2022</year>
          ).
          <article-title>Methods for cyberattacks detection in computer networks as a means of resilient IT-infrastructure construction: State-of-art</article-title>
          .
          <source>Computer Systems and Information Technologies, (3)</source>
          ,
          <fpage>31</fpage>
          -
          <lpage>35</lpage>
          . Khmelnytskyi National University. doi:
          <volume>10</volume>
          .31891/csit2021-5-4
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Lysenko</surname>
          </string-name>
          , &amp;
          <string-name>
            <surname>A. Kondratyuk.</surname>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>Technique for the risk assessing of the cyber-physical systems' information security based on the vulnerabilities' interconnect</article-title>
          .
          <source>Computer Systems and Information Technologies, (2)</source>
          ,
          <fpage>54</fpage>
          -
          <lpage>57</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>T.L.</given-names>
            <surname>Saaty</surname>
          </string-name>
          , &amp;
          <string-name>
            <surname>L.G. Vargas.</surname>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>Applications in decision-making: Analytic hierarchy processAHP. In Decision Making with the Analytic Hierarchy Process</article-title>
          (pp.
          <fpage>129</fpage>
          -
          <lpage>152</lpage>
          ). Springer. doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -39891-
          <issue>0</issue>
          _
          <fpage>6</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.U.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <surname>Y. Ali.</surname>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>Analytical Hierarchy Process (AHP) and Analytic Network Process Methods and Their Applications: A Twenty-Year Review from 2000-2019</article-title>
          .
          <source>International Journal of the Analytic Hierarchy Process</source>
          ,
          <volume>12</volume>
          (
          <issue>3</issue>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <article-title>Law of Ukraine on Critical Infrastructure. The Verkhovna Rada of Ukraine</article-title>
          . URL: https://zakon.rada.gov.ua/laws/show/1882-20#Text (accessed:
          <fpage>01</fpage>
          .
          <fpage>06</fpage>
          .
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <source>[13] Cabinet Of Ministers of Ukraine</source>
          . (
          <year>2020</year>
          ).
          <article-title>Certain issues of critical infrastructure facilities:</article-title>
          <source>Resolution No. 1109 of October 9</source>
          ,
          <year>2020</year>
          . URL: https://zakon.rada.gov.ua/laws/show/1109-2020- %
          <source>D0%BF#Text (accessed: 01.06</source>
          .
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>PeopleCert.</surname>
          </string-name>
          (
          <year>2023</year>
          ).
          <article-title>ITIL 4 Management Practices 2023</article-title>
          . Retrieved from https://www.peoplecert.org
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>S.</given-names>
            <surname>Seo</surname>
          </string-name>
          ,
          <string-name>
            <surname>D. Kim.</surname>
          </string-name>
          (
          <year>2020</year>
          ).
          <source>Study on Inside Threats Based on Analytic Hierarchy Process. Symmetry</source>
          ,
          <volume>12</volume>
          (
          <issue>8</issue>
          ):
          <fpage>1255</fpage>
          . doi:
          <volume>10</volume>
          .3390/sym12081255
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sydorenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Polozhentsev</surname>
          </string-name>
          ,
          <string-name>
            <surname>V. Sokolov.</surname>
          </string-name>
          (
          <year>2024</year>
          ).
          <article-title>Method for managing IT incidents in critical information infrastructure facilities</article-title>
          .
          <source>Proceedings of the Workshop on Cybersecurity Providing in Information and Telecommunication Systems II (CPITS-II</source>
          <year>2024</year>
          ),
          <volume>3826</volume>
          ,
          <fpage>326</fpage>
          -
          <lpage>333</lpage>
          . https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3826</volume>
          /short24.pdf
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>S. Lipovetsky.</surname>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>Understanding the Analytic Hierarchy Process: by Konrad Kulakowski, Boca Raton</article-title>
          , FL: Chapman and Hall/CRC, Taylor &amp; Francis Group,
          <year>2021</year>
          , 262 pp.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>M.I.</given-names>
            <surname>Tariq</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.A.</given-names>
            <surname>Memon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tayyaba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.W.</given-names>
            <surname>Ashraf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Nazir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hussain</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.E.</given-names>
            <surname>Balas</surname>
          </string-name>
          , &amp;
          <string-name>
            <surname>M.M. Balas</surname>
          </string-name>
          . (
          <year>2020</year>
          ).
          <article-title>Prioritization of Information Security Controls through Fuzzy AHP for Cloud Computing Networks and Wireless Sensor Networks</article-title>
          .
          <source>Sensors</source>
          ,
          <volume>20</volume>
          (
          <issue>5</issue>
          ):
          <fpage>1310</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>I.</given-names>
            <surname>Canco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Kruja</surname>
          </string-name>
          , &amp; T. Iancu. (
          <year>2021</year>
          ).
          <article-title>AHP, a Reliable Method for Quality Decision Making: A Case Study in Business</article-title>
          . Sustainability,
          <volume>13</volume>
          (
          <issue>24</issue>
          ):
          <fpage>13932</fpage>
          . doi:
          <volume>10</volume>
          .3390/su132413932
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <article-title>ISACA</article-title>
          .
          <article-title>COBIT 2019 Framework: Governance and Management Objectives</article-title>
          .
          <source>Information Systems Audit and Control Association (ISACA)</source>
          , Available at ISACA (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>