<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Experimental study of the method for prioritizing it incidents at critical information infrastructure facilities of the state ⋆</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Sergiy</forename><surname>Gnatyuk</surname></persName>
							<email>gnatyuk@kai.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">National Aviation University</orgName>
								<address>
									<addrLine>1 Liubomyra Huzara ave</addrLine>
									<postCode>03058</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Viktoria</forename><surname>Sydorenko</surname></persName>
							<email>v.sydorenko@ukr.net</email>
							<affiliation key="aff0">
								<orgName type="institution">National Aviation University</orgName>
								<address>
									<addrLine>1 Liubomyra Huzara ave</addrLine>
									<postCode>03058</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Artem</forename><surname>Polozhentsev</surname></persName>
							<email>artem.polozhentsev@kai.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">National Aviation University</orgName>
								<address>
									<addrLine>1 Liubomyra Huzara ave</addrLine>
									<postCode>03058</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Nazerke</forename><surname>Baisholan</surname></persName>
							<email>baisholan@gmail.com</email>
							<affiliation key="aff1">
								<orgName type="institution">Al Farabi Kazakh National University</orgName>
								<address>
									<addrLine>71 al-Farabi ave</addrLine>
									<postCode>050040</postCode>
									<settlement>Almaty</settlement>
									<country key="KZ">Kazakhstan</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="department">International Workshop on Advanced Applied Information Technologies</orgName>
								<address>
									<addrLine>December 5</addrLine>
									<postCode>2024</postCode>
									<settlement>KhmelnytskyiZilina</settlement>
									<country>Ukraine -, Slovakia</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Experimental study of the method for prioritizing it incidents at critical information infrastructure facilities of the state ⋆</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">1E63CCDEE0EEC0710671CA5175723665</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:48+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Critical infrastructure</term>
					<term>critical information infrastructure</term>
					<term>critical information infrastructure facilities</term>
					<term>IT incidents</term>
					<term>ITIL</term>
					<term>IT incident prioritization</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This paper presents an experimental study of a method for prioritizing IT incidents at critical information infrastructure facilities of the state. The method builds on established frameworks such as ITIL, COBIT, ISO/IEC 20000, and the NIST Cybersecurity Framework, integrating them with the Analytic Hierarchy Process (AHP) to assess and rank IT threats based on their impact. The proposed method involves a multistage approach, including threat identification, local and global prioritization, and synthesis of results for effective IT security management. The method takes into account the impact of incidents on key stakeholders, including citizens, society, the state, and law and order. Experimental validation was conducted using real-world data, demonstrating that hardware incidents hold the highest priority for state protection, while software and security incidents are most critical for citizens. The results highlight the importance of maintaining robust physical infrastructure and developing reliable IT security software. This method provides a practical tool for optimizing resource allocation and enhancing the security and resilience of critical information infrastructure.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Ensuring the security of national critical infrastructure (CI) is one of the most important areas of modern management. In a world where information technology permeates all areas of activity, the reliability and sustainability of IT systems are becoming the foundation of national security. Critical information infrastructure facilities (CIIF) of the state require special attention, as their vulnerability can lead to large-scale negative consequences for the economy, public security and stability of the state (Fig <ref type="figure" target="#fig_0">1</ref>).</p><p>The urgency of studying IT incident priorities is due to the growing number and complexity of threats in the world that require effective management and response methods. IT incidents that occur in critical information infrastructure facilities can have a variety of causes and consequences, so their correct classification and prioritization is a prerequisite for ensuring an appropriate level of security and sustainability.</p><p>This article presents a method for prioritizing IT incidents at critical government information infrastructure facilities, based on the integration of international best practices in the field of IT service management and security. The developed method allows a systematic approach to threat assessment, considering their impact on various aspects of the functioning of critical facilities, as well as the development of effective strategies to minimize risks. In order to achieve a high level of reliability and sustainability of IT systems, the article discusses the key stages of the developed method, including threat identification and assessment, prioritization using the pairwise comparison method (AHP), and synthesis of local and global priorities for IT security management. The described approach allows organizations to adapt existing methods to the specifics of their activities, thus ensuring more effective risk management and maintaining the stability of critical information infrastructures.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Literature review</head><p>Despite the importance of ensuring the IT security of CII, there is currently a lack of scientific research into the development and implementation of methods for prioritizing IT incidents, both internationally and domestically. Therefore, during the analysis, the authors investigated incident management approaches in different areas of CII.</p><p>Article <ref type="bibr" target="#b0">[1]</ref> presents a systematic approach to risk assessment in telecommunications systems, with a particular focus on fifth-generation mobile networks (5G). The study provides an analysis of both standalone and non-standalone 5G networks, examining the migration process from 4G to 5G and identifying vulnerabilities inherent to both network generations. The main objective of the research is to classify potential threats using the STRIDE model <ref type="bibr" target="#b1">[2]</ref> and derive a risk matrix based on the likelihood and impact of 12 threat scenarios affecting the radio access and network core. Also, the methodology <ref type="bibr" target="#b2">[3]</ref> includes an overview of the 5G system specification, highlighting new security features compared to 4G, and analyzing residual vulnerabilities in non-standalone 5G deployments where legacy 4G protocols are still in use. To address these risks, the paper proposes a set of mitigations and security controls, offering a generic framework that can be adapted for different 5G implementations. This approach contributes to understanding security weaknesses in emerging telecommunications systems and provides a basis for developing more robust risk mitigation strategies.</p><p>Article <ref type="bibr" target="#b3">[4]</ref> deals with the problem of managing cyber risks in information systems of critical infrastructure objects. The main objective of the study is to develop methods and models for risk assessment and management, in particular vector and integral risk models. The vector risk model uses a set of parameters to determine the level of risk to which the weighting factor is assigned, and the total risk is calculated as the vector sum of the parameters, taking into account their weighting factors. This model makes it possible to identify the main risk components and to easily visualize and understand risks at different system levels. The integral risk model provides a comprehensive approach to risk assessment, taking into account the relationships between different parameters. In practice, these systems are used to monitor and manage cybersecurity in various critical infrastructure sectors, such as energy, transport and healthcare. The results of the study show that the proposed vector and integral risk models are effective tools for assessing and reducing cyber risks, providing reliable protection of critical infrastructure information systems from cyber threats.</p><p>Article <ref type="bibr" target="#b4">[5]</ref> discusses mathematical methods to protect critical infrastructure from undesired events. The main objective of the study is to provide a template for analyzing and improving the protection and sustainability of critical infrastructure. Incident estimation includes models of the probability of failure of system components and the expected losses from such failures. For cyber security, vulnerability assessment methods and incident response times are considered. Sustainability metrics include the sustainability index, which measures the ability of the system to recover from failures, and the recovery target, which determines the maximum allowable system downtime. The use of these mathematical methods allows us to quantify incidents, evaluate the effectiveness of cybersecurity measures and improve cooperation between stakeholders, which confirms the practical value of the developed methods for effective management of critical infrastructure protection.</p><p>Article <ref type="bibr" target="#b5">[6]</ref> examines the challenges organizations face in managing and responding to cybersecurity incidents through the use of Incident Response, Capability Maturity Models (CMMs). The study highlights that while maturity models such as NIST, CMMI, IRM3, and CERT-RMM provide guidelines for assessing incident response capabilities, they lack systematic methodologies for translating maturity assessment outcomes into actionable incident prioritization metrics. Key factors influencing incident prioritization include organizational preparedness, communication efficiency, and the integration of human and socio-technical elements into maturity assessments. The study also identifies gaps in existing CMMs, such as limited applicability across organizations, excessive complexity, and inadequate alignment with incident prioritization frameworks. Addressing these limitations, the research emphasizes the need for dynamic models and comprehensive guidelines that link maturity assessments with prioritization criteria, enabling organizations to refine their incident management processes in response to evolving threat landscapes and maturity levels.</p><p>Article <ref type="bibr" target="#b6">[7]</ref> presents the development of an algorithm designed to prioritize cyber threats in the cybersecurity system, taking into account their high probability of implementation. The main objective of the study is to create an algorithm that includes a hierarchical model of a cybersecurity system with three levels: cybersecurity, threats and risks. The article discusses in detail the AHP method, which allows to evaluate and compare threat priorities. Key cyber threats such as Trojans, viruses and worms have the highest priority and require targeted mitigation measures. The results of the study confirm the practical value of the developed methodology, which helps to systematically prioritize threats and effectively manage cybersecurity.</p><p>As also explored in Articles <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b8">9]</ref>, recent advancements in cybersecurity research have emphasized the critical role of resilience in constructing robust IT infrastructures capable of resisting, restoring, and adapting to cyberattacks. The concept of resilience extends beyond traditional cybersecurity to address the dynamic challenges posed by evolving threats. This work highlights various techniques for enhancing resilience, including adaptive multi-agent systems, game-based simulation frameworks, and anomaly detection mechanisms. These approaches focus on ensuring continuity and stability in critical infrastructure through proactive threat detection and mitigation. For instance, methods such as adaptive distributed resilient observers and moving target defense paradigms have demonstrated effectiveness in countering sophisticated attacks like denialof-service (DoS) and data injection. While these frameworks provide robust mechanisms for maintaining system resilience, they primarily address operational stability rather than the prioritization of IT incidents.</p><p>Thus, in Table <ref type="table">.</ref> 1, it is proposed to compare the approaches described above that can be used to develop a method for prioritizing IT incidents according to the following criteria: ease of use (EU), focus on critical infrastructure (CI), objectivity (OB), possibility of application to IT incidents (IT).  <ref type="table">.</ref> 1 shows that the method developed by the authors of the study <ref type="bibr" target="#b6">[7]</ref> is the best approach on the basis of which it is possible to develop a method for prioritizing IT incidents to ensure the security of CII, because it is easy to use, thanks to a clear hierarchical model that makes the incident assessment process understandable and accessible to users, it includes specific mechanisms for assessing and prioritizing threats specifically for CII, and the use of the hierarchical analysis method provides objectivity in the assessment of threats, as it allows threats to be systematically and transparently compared and ranked on the basis of established criteria.</p><p>Therefore, the purpose of this article is to develop and study a method for prioritizing IT incidents at CIIF.</p><p>To achieve this goal, it's necessary to solve the following tasks: 1) To analyze existing approaches to prioritizing IT incidents and identify their advantages and disadvantages.</p><p>2) To develop a method for IT incidents prioritization at the CIIF, based on the Hierarchy Analysis Method (hereafter referred to as AHP), in order to ensure the reliability and sustainability of the functioning of the CIIF.</p><p>3) To study the experimental method developed at CIIF for IT incidents prioritization.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Materials &amp; methods</head><p>The method developed consists of the following steps:</p><p>Step 1. Definition of the IT Incident Management Structure of a Critical Information Infrastructure Facility.</p><p>At this step, it's necessary to create a structure for managing IT incidents, including the identification and classification of major incidents, such as problems with physical devices, software, security incidents, etc., as well as the creation of an appropriate hierarchical model.</p><p>Step 2. Evaluation of incidents and their priorities at both local and global levels in the IT security system.</p><p>At this step, it is necessary to assess the priority of each IT incident, taking into account its impact on different levels (local and global) of IT security, using the pairwise comparison method (AHP) <ref type="bibr" target="#b9">[10]</ref><ref type="bibr" target="#b10">[11]</ref> to assess the impact of each incident, calculating local and global threat priorities to determine the most critical ones for managing and minimizing risks.</p><p>Step 3. Comparison of elements of the IT security system at different levels to assess their impact and set priorities using the pairwise comparison method (AHP).</p><p>Step 3.1. Construction of pairwise comparison matrices At this step, it's necessary to create a matrix of pairwise comparisons that allows to evaluate the relative importance of each criterion or alternative in the system. This step provides a framework for further calculations. To do this, create a matrix A of size n×n, where each element a ij represents the ratio of importance between i and j criteria. The elements of the matrix are arranged as follows:</p><formula xml:id="formula_0">11 1 1 i j ij a a A a a     =            (1)</formula><p>where A -a matrix of paired comparisons, ij a -elements of the matrix of paired comparisons.</p><p>Step 3.2. Normalization of paired comparison matrices At this stage it's necessary to normalize the paired comparison matrices to ensure that the sum of all elements in each column of the matrix is 1. This allows to compare different criteria and their weights based on a single scale.</p><formula xml:id="formula_1">1 ' ij ij n kj k a a a = = ∑<label>(2)</label></formula><p>where ' ij a normalized element of the paired comparison matrix, ij a -the initial element of the matrix of paired comparisons.</p><p>After normalizing all the elements of the matrix, we obtain a normalized matrix A′:</p><formula xml:id="formula_2">11 1 1 ' ' ' ' ' i j ij a a A a a     =           <label>(3)</label></formula><p>where, A′ -normalized pairwise comparison matrix, ' ij a -normalized element of the paired comparison matrix</p><p>Step 3.3. Calculation of weight vectors and Ax vector In this step, we calculate the weight vectors W for each criterion based on a normalized matrix of paired comparisons A', which is necessary to determine the relative importance of each criterion and to further analyze their impact on the overall result. '</p><formula xml:id="formula_3">n i ij j W a n = = ∑ (4)</formula><p>where W i -the weight coefficient for i-th criterion, ' ij a -normalized element of the paired comparison matrix, n -number of criteria.</p><p>To calculate the vector that represents the relative importance of each criterion and will be used for further calculations, we use the following formula:</p><formula xml:id="formula_4">1 2 n W W W W       =        (5)</formula><p>where W -are vectors of weights of comparison criteria.</p><p>Next, to assess the consistency of the matrix of paired comparisons and the accuracy of certain weight coefficients, which is critical for making informed decisions in the hierarchy analysis method, it is necessary to calculate the vector Ax:</p><formula xml:id="formula_5">Ax A W = ×<label>(6)</label></formula><p>where A -initial matrix of paired comparisons, W -vector of weights. So, the vector Ax helps us understand how each criterion affects the overall outcome, given the relative importance of each criterion.</p><p>Step 3.4. Calculation of the consistency index and ratio. At this stage, it is necessary to calculate the consistency index and consistency ratio to check the consistency of the matrix of paired comparisons, which is an important step for evaluating the reliability of decisions made based on weighting factors.</p><p>To check the consistency of the matrix of paired comparisons, which ensures logical consistency and reliability of certain weighting coefficients, we calculate the largest eigenvalue:</p><formula xml:id="formula_6">max 1 ( ) 1 n i i i Ax n W λ = = ∑<label>(7)</label></formula><p>where λ max -the largest eigenvalue, n -number of criteria, Ax -elements of vectors, W i -elements of the weight vector.</p><p>The consistency index determines how consistent the matrix of paired comparisons is:</p><formula xml:id="formula_7">max 1 n CI n λ − = −<label>(8)</label></formula><p>where CI -consistency index, λ max -the largest eigenvalue, n -number of criteria.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>CI CR RI = (9)</head><p>where CR -consistency ratio, CI -consistency index, RI -random consistency index, depends on the number of criteria and is determined by the table for the corresponding values 𝑛𝑛.</p><p>• If CR &lt; 0.1, -the matrix of paired comparisons is considered consistent.</p><p>• If CR ≥ 0.1, this means that the matrix has significant discrepancies and requires revising paired comparisons to achieve better consistency.</p><p>This step is crucial for ensuring the reliability and validity of decisions made, as it allows to identify and eliminate possible inconsistencies in the matrix of paired comparisons.</p><p>Step 4. Synthesis of local and global priorities for the IT security system At this step, it is necessary to synthesize local and global priorities for the IT security system, which will determine the overall importance of each alternative solution, taking into account the weights of criteria and their priorities.</p><p>For each criterion C i defining local priorities of alternatives A j . Local priority of the alternative A j by criterion C i denoted as W Ci, Aj .</p><p>Global priority alternatives A j is calculated as the sum of the products of the weights of criteria and local priorities of the corresponding alternatives. The formula for calculating global priority is as follows: , 1 ( )</p><formula xml:id="formula_8">j i i j m A C C A i G W W = = × ∑ (<label>10</label></formula><formula xml:id="formula_9">)</formula><p>where</p><formula xml:id="formula_10">j A G -global priority of the alternative A j , i C W -weight of the criterion C i , , i j C A W -local</formula><p>priority of the alternative A j by criterion C i. , m -number of criteria. After calculating the global priorities for each alternative, we obtain a vector of global priorities that allows us to determine the overall importance of each alternative in the IT security system and to draw informed conclusions about the selection of the highest priority alternative solutions for the IT security system. The alternative with the highest global priority is the most important and should be prioritized for implementation.</p><p>Step 5. Evaluation and adjustment of IT security priorities At this step, it is necessary to calculate the final results of the priority assessment for the IT security system and adjust these priorities if necessary. This provides an accurate and informed definition of the most important aspects for protecting critical information infrastructure.</p><p>(</p><formula xml:id="formula_11">)<label>11</label></formula><p>where ij a -element of the matrix of paired comparisons, and i -line number, j -column number,</p><p>' ij a -normalized element of the paired comparison matrix, w 1 , w 2 ,… w n -weighting coefficients (priorities) defined for each criterion, Y 1 , Y 2 ,… Y n -results obtained after multiplying the normalized matrix by the vector of weighting coefficients.</p><p>Obtained results Y 1 , Y 2 ,… Y n reflect the relative importance of each criterion or alternative in the context of IT security. The analysis of these results allows us to determine which aspects require the greatest attention and resources to ensure effective protection.</p><p>Based on the results obtained and adjusted, decisions are made on the priority areas for IT incident protection. This helps to allocate resources efficiently and focus on the most important aspects of protecting critical information infrastructure. The implementation scheme of the developed method is shown in Figure <ref type="figure" target="#fig_2">2</ref>: </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Experimental study of the method</head><p>For an experimental study of the developed method, we will apply it to the 'Information services' sector, the 'mass media' sub-sector, which includes, for example, the provision of television and radio broadcasting services <ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref>.</p><p>Step 1. In the presented model, the first level of the hierarchy has one objective: reliability and stability of the CIIF. Its priority value is assumed to be one.</p><p>Next, to form the second level of the hierarchy, it is proposed to apply the international standard ITIL <ref type="bibr" target="#b13">[14]</ref> in accordance with the analysis carried out.</p><p>Therefore, the second level of the hierarchy includes different types of threats, classified according to ITIL: The priorities of these threats are calculated using a matrix of pairwise comparisons of threats relative to the CIIF by comparing elements of the second level of the hierarchy with those of the first level <ref type="bibr" target="#b14">[15]</ref>.</p><formula xml:id="formula_12">•</formula><p>The third level of the hierarchy covers the impact on citizens, society, the state and the rule of law. The impact of threats on these three categories is also assessed using a pairwise comparison matrix, which allows the priorities of threats for each category to be determined.</p><p>The structure of IT incident management in the CIIF <ref type="bibr" target="#b15">[16]</ref>, can be illustrated as presented in Fig. <ref type="figure" target="#fig_4">3</ref> (where C -citizen, S -society, St -state, LO -law and order): Step 2. Estimates in the Saaty matrix are based on the relative importance of threats to the Reliability and Sustainability of CIIF. They take into account the potential impact of each threat on the overall level of security and functionality of the system.</p><p>Step 3. According to (1-9), we construct a matrix of pairwise comparisons, which is based on the scale of importance. The matrix has the following form (Table <ref type="table" target="#tab_1">2</ref>).</p><p>Global priorities show the relative strength, size and importance of each element of an IT security system <ref type="bibr" target="#b16">[17]</ref>. Based on the calculations performed, User Errors (UE) has the highest local priority for IT security compared to other threats -0.25. In second place is Service Outages (SO) with a global priority of 0.20. In third place is Security Incidents (SEI) with a global priority of 0.15. Software Incidents (SI) and Hardware Incidents (HI) are also important, with global priorities of 0.12 and 0.10 respectively. Configuration Issues (CFI) also deserve attention with a global priority of 0.08. For other threats, the global priorities are as follows Performance Issues (PI) -0.06, Connectivity Issues (CI) -0.04.</p><p>The global priority values obtained allow us to determine which threats are most critical to ensuring the reliability and sustainability of critical information infrastructures. Focusing on the highest priority threats helps to effectively manage IT security and minimize risks to citizens, society, government and public order <ref type="bibr" target="#b17">[18]</ref> (Table <ref type="table" target="#tab_2">3</ref>). The Paired Comparison Matrix allows to determine which of the threats are most critical to ensuring IT security. This helps to focus resources and efforts on the most important issues, minimizing the impact of potential threats on the system <ref type="bibr" target="#b18">[19]</ref>.</p><p>Step 4. The main task of this stage is to determine the local priorities of risks of objects of protection through the intermediate second level -threats, using pairwise comparison matrices for these threats, according to <ref type="bibr" target="#b9">(10)</ref>. Thus, using a group of pairwise comparison matrices for the above threats, we consistently form a set of local priorities of the third level regarding the risks of the individual, society and the state. The values of local priorities of risks of security objects for these threats are shown in Table <ref type="table">.</ref> 4, taking into account <ref type="bibr" target="#b19">[20]</ref>. Step 5. Together with the matrices of the paired comparisons, we obtained measures of the estimates of the deviation from consistency, which are summarized in Table <ref type="table">.</ref> 5, according to <ref type="bibr" target="#b10">(11)</ref>.</p><p>Therefore, it can be concluded that according to the conducted experiment, hardware incidents (HI) have the highest priority for the state (0.483), which emphasizes the need to support the physical infrastructure, software incidents (SI) and security incidents (SEI) are the most critical for citizens (0.552 and 0. 565 respectively), requiring attention to reliable software and cyber security; Service Outages (SO) have a significant impact on citizens and society, but less on the state and law and order; Performance Issues (PI), User Errors (UE) and Configuration Issues (CFI) have a significant impact on citizens, requiring improvements in IT services and user training. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusion</head><p>In conclusion, this study successfully achieved its key objectives by thoroughly analyzing international standards and practices such as ITIL, COBIT, ISO/IEC 20000, and the NIST Cybersecurity Framework. Through this analysis, the strengths and weaknesses of these approaches were identified, enabling the selection of the most relevant elements for the development of a new methodology. A notable finding is the limited scientific research available on IT incident prioritization, which highlights the relevance of this study. The ITIL framework, in particular, stood out for its structured, flexible, and service-oriented approach. This paper develops a method that integrates international best practices with the Analytic Hierarchy Process (AHP). It effectively addresses the identification, assessment and prioritization of threats, incorporating both local and global priorities to improve IT security management. The approach allows for the consideration of different aspects of security, including their impact on citizens, society, the state and the rule of law, making it adaptable to different security contexts.</p><p>The practical value of the method was confirmed through experimental testing on real-world data. The results underscored its capacity to systematically prioritize IT threats, demonstrating that hardware incidents are of highest priority for state-level protection, while software and security incidents are of greater concern for citizens. These insights emphasize the importance of maintaining a resilient physical IT infrastructure and focusing on the development of reliable IT security software. Overall, this study contributes a significant advancement in IT incident management, providing a practical tool for improving IT security practices across different sectors.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Declaration on Generative AI</head></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Critical information infrastructure of the state.</figDesc><graphic coords="2,89.43,104.94,421.72,258.65" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Implementation scheme for the prioritization of IT incidents on critical information infrastructure facilities.</figDesc><graphic coords="7,76.55,356.26,454.00,290.40" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head></head><label></label><figDesc>Hardware Incidents (HI); • Software Incidents (SI); • Security Incidents (SEI); • Service Outages (SO); • Connectivity Issues (CI); • User Errors (UE); • Configuration Issues (CFI); • Performance Issues (PI).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: IT incident management structure at the Critical Information Infrastructure Facility.</figDesc><graphic coords="8,102.32,397.06,395.95,225.58" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>Comparison of approaches for prioritizing IT/security incidents</figDesc><table><row><cell>Approach / criterion</cell><cell>EU</cell><cell>CI</cell><cell>OB</cell><cell>IT</cell></row><row><cell>Method for risk assessment in telecommunications systems</cell><cell>-</cell><cell>+</cell><cell>+</cell><cell>-</cell></row><row><cell>Method for assessing</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>cybersecurity risks of inf. OCI</cell><cell>-</cell><cell>+</cell><cell>+</cell><cell>-</cell></row><row><cell>systems</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Methodology for ranking cyberscenarios and critical objects</cell><cell>-</cell><cell>-</cell><cell>+</cell><cell>-</cell></row><row><cell>Incident Prioritization with</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Incident Response Management</cell><cell>-</cell><cell>-</cell><cell>+</cell><cell>+</cell></row><row><cell>Maturity Capabilities</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Method for assessing the</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>priorities of a cyber security</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>-</cell></row><row><cell>system</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Resilience-based techniques for IT infrastructures</cell><cell>+</cell><cell>+</cell><cell>-</cell><cell>-</cell></row><row><cell>Thus, Table</cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2</head><label>2</label><figDesc>Matrix of pairwise comparisons of IT incidents on CIIF</figDesc><table><row><cell></cell><cell>HI</cell><cell>SI</cell><cell>SEI</cell><cell>SO</cell><cell>CI</cell><cell>UE</cell><cell>CFI</cell><cell>PI</cell></row><row><cell>HI</cell><cell>1</cell><cell>3</cell><cell>2</cell><cell>4</cell><cell>5</cell><cell>6</cell><cell>7</cell><cell>3</cell></row><row><cell>SI</cell><cell>1/3</cell><cell>1</cell><cell>1/2</cell><cell>2</cell><cell>3</cell><cell>4</cell><cell>5</cell><cell>2</cell></row><row><cell>SEI</cell><cell>1/2</cell><cell>2</cell><cell>1</cell><cell>5</cell><cell>6</cell><cell>7</cell><cell>8</cell><cell>4</cell></row><row><cell>SO</cell><cell>1/4</cell><cell>1/2</cell><cell>1/5</cell><cell>1</cell><cell>3</cell><cell>4</cell><cell>2</cell><cell>1/2</cell></row><row><cell>CI</cell><cell>1/5</cell><cell>1/3</cell><cell>1/6</cell><cell>1/3</cell><cell>1</cell><cell>2</cell><cell>1/2</cell><cell>1/3</cell></row><row><cell>UE</cell><cell>1/6</cell><cell>1/4</cell><cell>1/7</cell><cell>1/4</cell><cell>1/2</cell><cell>1</cell><cell>3</cell><cell>1/2</cell></row><row><cell>CFI</cell><cell>1/7</cell><cell>1/5</cell><cell>1/8</cell><cell>1/2</cell><cell>2</cell><cell>1/3</cell><cell>1</cell><cell>1/4</cell></row><row><cell>PI</cell><cell>1/3</cell><cell>1/2</cell><cell>1/4</cell><cell>2</cell><cell>3</cell><cell>2</cell><cell>4</cell><cell>1</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 3</head><label>3</label><figDesc>Importance of global IT incident priorities CIIF</figDesc><table><row><cell>Threat</cell><cell>Global priority</cell></row><row><cell>UE</cell><cell>0.25</cell></row><row><cell>SO</cell><cell>0.20</cell></row><row><cell>SEI</cell><cell>0.15</cell></row><row><cell>SI</cell><cell>0.12</cell></row><row><cell>HI</cell><cell>0.10</cell></row><row><cell>CFI</cell><cell>0.08</cell></row><row><cell>PI</cell><cell>0.06</cell></row><row><cell>CI</cell><cell>0.04</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>Table 4</head><label>4</label><figDesc>Importance of local priorities for IT incidents in CIIF</figDesc><table><row><cell>Hardware Incidents (HI) -problems with physical</cell><cell>Software Incidents (SI) -software problems</cell></row><row><cell>devices</cell><cell></cell></row><row><cell>Security Incidents (SEI)</cell><cell>Service Outages (SO)</cell></row><row><cell>Connectivity Issues (CI)</cell><cell>User Errors (UE)</cell></row><row><cell>Configuration Issues (CFI)</cell><cell>Performance Issues (PI)</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_4"><head>Table 5</head><label>5</label><figDesc>Measures of deviation from consistency estimates</figDesc><table><row><cell>Levels</cell><cell>Priorities</cell><cell>n</cell><cell>Λmax</cell><cell>CR</cell></row><row><cell>1</cell><cell>RSCIP</cell><cell>8</cell><cell>8.57373</cell><cell>0.05812</cell></row><row><cell>2</cell><cell>HI</cell><cell>4</cell><cell>4.01452</cell><cell>0.005</cell></row><row><cell>2</cell><cell>SI</cell><cell>4</cell><cell>4.17244</cell><cell>0.05748</cell></row><row><cell>2</cell><cell>SEI</cell><cell>4</cell><cell>4.27255</cell><cell>0.09085</cell></row><row><cell>2</cell><cell>SO</cell><cell>4</cell><cell>4.17244</cell><cell>0.05748</cell></row><row><cell>2</cell><cell>CI</cell><cell>4</cell><cell>4.12326</cell><cell>0.04109</cell></row><row><cell>2</cell><cell>UE</cell><cell>4</cell><cell>4.03098</cell><cell>0.01033</cell></row><row><cell>2</cell><cell>CFI</cell><cell>4</cell><cell>4.03098</cell><cell>0.01033</cell></row><row><cell>2</cell><cell>PI</cell><cell>4</cell><cell>4.13199</cell><cell>0.04400</cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The authors have not employed any Generative AI tools.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m" type="main">5G system security analysis</title>
		<author>
			<persName><forename type="first">G</forename><surname>Holtrup</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Lacube</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Percia David</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Mermoud</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Bovet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Lenders</surname></persName>
		</author>
		<idno type="arXiv">arXiv:2108.08700</idno>
		<ptr target="https://arxiv.org/abs/2108.08700" />
		<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Modeling 5G threat scenarios for critical infrastructure protection</title>
		<author>
			<persName><forename type="first">G</forename><surname>Holtrup</surname></persName>
		</author>
		<idno type="DOI">10.23919/CyCon58705.2023.10</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 15th International Conference on Cyber Conflict: Meeting Reality</title>
				<meeting>the 15th International Conference on Cyber Conflict: Meeting Reality</meeting>
		<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="161" to="180" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">STRIDE-based Threat Modeling for Cyber-Physical Systems</title>
		<author>
			<persName><forename type="first">R</forename><surname>Khan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe)</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Evaluation of risks of cyber security of information systems of objects of critical infrastructure</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">V</forename><surname>Mokhor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">E</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Elektronnoe Modelirovanie</title>
		<editor>S.F. Honchar, &amp; G.E. Pukhov</editor>
		<imprint>
			<biblScope unit="volume">41</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="65" to="76" />
			<date type="published" when="2019">2019</date>
		</imprint>
		<respStmt>
			<orgName>Institute for Modelling in Energy Engineering National Academy of Sciences of Ukraine</orgName>
		</respStmt>
	</monogr>
	<note>Pukhov Institute for Modelling in Energy Engineering National Academy of Sciences of Ukraine</note>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Method for Determining the State of Protection of Critical Information Infrastructure Objects from IT Risks</title>
		<author>
			<persName><forename type="first">D</forename><surname>Jablanski</surname></persName>
		</author>
		<ptr target="https://www.researchcybersecurity.com/state-protection-method/" />
	</analytic>
	<monogr>
		<title level="j">Scientific Research on Cybersecurity</title>
		<imprint>
			<date type="published" when="2023-01">2023. 01.06.2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">Alignment of Cybersecurity Incident Prioritisation with Incident Response Management Maturity Capabilities</title>
		<author>
			<persName><forename type="first">A</forename><surname>Gulay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Maglaras</surname></persName>
		</author>
		<idno type="arXiv">arXiv:2410.02259</idno>
		<ptr target="https://arxiv.org/pdf/2410.02259" />
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Effective IT Incident Management in critical information infrastructure</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">B</forename><surname>Kaczynski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">I</forename><surname>Varycheva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">V</forename><surname>Sviridenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information and Law</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">17</biblScope>
			<biblScope unit="page" from="114" to="126" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Methods for cyberattacks detection in computer networks as a means of resilient IT-infrastructure construction: State-of-art</title>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Sokalskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Mykhasko</surname></persName>
		</author>
		<idno type="DOI">10.31891/csit-2021-5-4</idno>
	</analytic>
	<monogr>
		<title level="j">Computer Systems and Information Technologies</title>
		<imprint>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="31" to="35" />
			<date type="published" when="2022">2022</date>
		</imprint>
		<respStmt>
			<orgName>Khmelnytskyi National University</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Technique for the risk assessing of the cyber-physical systems&apos; information security based on the vulnerabilities&apos; interconnect</title>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kondratyuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Systems and Information Technologies</title>
		<imprint>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="54" to="57" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Applications in decision-making: Analytic hierarchy process-AHP</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">L</forename><surname>Saaty</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">G</forename><surname>Vargas</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-39891-0_6</idno>
	</analytic>
	<monogr>
		<title level="m">Decision Making with the Analytic Hierarchy Process</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="129" to="152" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Analytical Hierarchy Process (AHP) and Analytic Network Process Methods and Their Applications: A Twenty-Year Review from 2000-2019</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">U</forename><surname>Khan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Ali</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of the Analytic Hierarchy Process</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">3</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<ptr target="https://zakon.rada.gov.ua/laws/show/1882-20#Text" />
		<title level="m">Law of Ukraine on Critical Infrastructure</title>
				<imprint>
			<date type="published" when="2024-06-01">01.06.2024</date>
		</imprint>
	</monogr>
	<note>The Verkhovna Rada of Ukraine</note>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">Certain issues of critical infrastructure facilities: Resolution No</title>
		<ptr target="https://zakon.rada.gov.ua/laws/show/1109-2020-%D0%BF#Text" />
		<imprint>
			<date type="published" when="1109-10-09">2020. 1109. October 9, 2020. 01.06.2024</date>
			<publisher>Cabinet Of Ministers of Ukraine</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<title level="m" type="main">ITIL 4 Management Practices</title>
		<author>
			<persName><surname>Peoplecert</surname></persName>
		</author>
		<ptr target="https://www.peoplecert.org" />
		<imprint>
			<date type="published" when="2023">2023. 2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Study on Inside Threats Based on Analytic Hierarchy Process</title>
		<author>
			<persName><forename type="first">S</forename><surname>Seo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Kim</surname></persName>
		</author>
		<idno type="DOI">10.3390/sym12081255</idno>
	</analytic>
	<monogr>
		<title level="j">Symmetry</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page">1255</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Method for managing IT incidents in critical information infrastructure facilities</title>
		<author>
			<persName><forename type="first">S</forename><surname>Gnatyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sydorenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Polozhentsev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sokolov</surname></persName>
		</author>
		<ptr target="https://ceur-ws.org/Vol-3826/short24.pdf" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Workshop on Cybersecurity Providing in Information and Telecommunication Systems II (CPITS-II</title>
				<meeting>the Workshop on Cybersecurity Providing in Information and Telecommunication Systems II (CPITS-II</meeting>
		<imprint>
			<date type="published" when="2024">2024. 2024</date>
			<biblScope unit="volume">3826</biblScope>
			<biblScope unit="page" from="326" to="333" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">Understanding the Analytic Hierarchy Process: by Konrad Kulakowski</title>
		<author>
			<persName><forename type="first">S</forename><surname>Lipovetsky</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2021">2021. 2021</date>
			<publisher>Chapman and Hall/CRC, Taylor &amp; Francis Group</publisher>
			<biblScope unit="page">262</biblScope>
			<pubPlace>Boca Raton, FL</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Prioritization of Information Security Controls through Fuzzy AHP for Cloud Computing Networks and Wireless Sensor Networks</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">I</forename><surname>Tariq</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ahmed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">A</forename><surname>Memon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Tayyaba</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">W</forename><surname>Ashraf</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Nazir</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Hussain</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">E</forename><surname>Balas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Balas</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page">1310</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">AHP, a Reliable Method for Quality Decision Making: A Case Study in Business</title>
		<author>
			<persName><forename type="first">I</forename><surname>Canco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Kruja</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Iancu</surname></persName>
		</author>
		<idno type="DOI">10.3390/su132413932</idno>
	</analytic>
	<monogr>
		<title level="j">Sustainability</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">24</biblScope>
			<biblScope unit="page">13932</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<title level="m">COBIT 2019 Framework: Governance and Management Objectives</title>
				<imprint>
			<publisher>Available at ISACA</publisher>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
	<note>Information Systems Audit and Control Association (ISACA)</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
