<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>V. Chytulian);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Cyber Threats⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Ihor Hanhalo</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vadym Chytulian</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Zhebka Viktoriia</string-name>
          <email>viktoria_zhebka@ukr.net</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bohdan Bebeshko</string-name>
          <email>b.bebeshko@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Karyna Khorolska</string-name>
          <email>k.khorolska@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv Metropolitan University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., 04053 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>State University of Information and Communication Technologies</institution>
          ,
          <addr-line>7 Solomiyanska str, 03110 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>The functional stability of corporate educational information systems (CEIS) is a key aspect of ensuring the continuity of the educational process and information security. This study proposes a methodology for enhancing the functional stability of CEIS based on mathematical models for risk assessment, financial resource optimization, and cybersecurity measures. The proposed approach includes threat analysis, residual risk calculation, loss prediction depending on response time, and evaluation of security measures' effectiveness. Scenario modeling confirms that the proposed methodology reduces residual risk levels by 40-60% and decreases incident response time to one hour. The results demonstrate that integrating adaptive cybersecurity mechanisms with economic modeling enables an optimal balance between security and costs, enhancing the overall resilience of educational platforms.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;functional stability</kwd>
        <kwd>corporate educational information systems</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>residual risk</kwd>
        <kwd>response time</kwd>
        <kwd>cost optimization</kwd>
        <kwd>data backup</kwd>
        <kwd>mathematical modeling</kwd>
        <kwd>threat prediction</kwd>
        <kwd>risk management</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>approaches.
mechanisms.</p>
      <p>The issue of ensuring the functional stability of corporate information systems is particularly
relevant in the context of growing cyberthreats and the increasing demand for the continuous
operation of information platforms. Despite the availability of numerous studies, many approaches
are based on static risk assessment and cost optimization methods that do not account for real-time
threat dynamics. This highlights the need for adaptive methodologies that integrate economic
models, mathematical forecasting, and automated response mechanisms.</p>
      <p>
        The study in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] explores mathematical models for risk assessment in information systems
based on probabilistic approaches that determine the likelihood of threats occurring in dynamic
environments. However, the authors do not address adaptive response mechanisms for adjusting to
changes in threat levels.
      </p>
      <p>
        Cost optimization methodologies for security investments are proposed in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], where the
adaptive allocation of resources between security measures and backup mechanisms is justified
depending on the threat level. However, this study does not include real-time threat prediction
      </p>
      <p>
        Methods for attack forecasting using machine learning algorithms are discussed in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ],
demonstrating the effectiveness of adaptive approaches for detecting anomalous activity. However,
the study does not investigate the integration of attack prediction with resource management
[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] presents approaches to resource backup optimization in corporate systems, taking into account
time-dependent recovery characteristics. However, the authors do not consider the
interdependence between backup levels and the effectiveness of security measures.
      </p>
      <p>
        Modern cybersecurity monitoring methods and adaptive models for real-time threat assessment
are examined in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. However, this study does not consider the integration of monitoring systems
with attack prediction mechanisms. The study [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] focuses on functional stability mechanisms in
distributed information systems, combining adaptive backup strategies and risk management.
However, security cost optimization methods are not considered.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], threat prediction methods using neural networks are explored to minimize losses in the
event of incidents. However, the study lacks an analysis of the impact of response time on loss
levels.
      </p>
      <p>
        An approach to automated cybersecurity monitoring and response using blockchain
technologies is presented in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. However, this methodology does not take into account the
optimization of security and backup costs.
      </p>
      <p>The literature analysis indicates that most studies focus on centralized or static risk assessment
models, whereas adaptive approaches that consider the temporal dynamics of threats require
further research. This confirms the necessity for developing integrative methodologies that
combine economic, mathematical, and automated mechanisms to ensure functional stability in
corporate educational information systems.</p>
      <p>Modern methods for ensuring the functional stability of corporate educational information
systems (CEIS) reveal several significant limitations that hinder their effectiveness. One of the main
drawbacks is the insufficient consideration of the interdependence between costs, risks, and the
dynamics of external and internal factors. In many cases, existing approaches focus on specific
aspects, such as enhancing information security or optimizing costs, while ignoring the integrative
nature of these processes.</p>
      <p>
        For example, in static models, the costs of implementing and maintaining the system are
determined as a one-time expense, whereas risks associated with potential threats may increase
over time due to the evolution of cyber threats or the system’s insufficient adaptation to
environmental changes [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. These interdependencies are often overlooked due to the limitations of
traditional cost assessment approaches, which fail to account for dynamic parameters. The lack of
adaptation to changes over time can lead to significant losses, particularly in situations where the
system fails to respond promptly to critical events [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        Another important limitation is the insufficient integration of risk-oriented approaches into
economic modeling. In particular, many systems underestimate the role of potential losses
associated with downtime, operational failures, or data breaches. The absence of a comprehensive
integration of costs and risks significantly complicates effective decision-making. For instance, if
security investments do not consider potential losses from realized threats, the allocation of
resources may turn out to be irrational [
        <xref ref-type="bibr" rid="ref11 ref12 ref13 ref14">11–14</xref>
        ].
The shortcomings also extend to the process of system backup and recovery. In many cases,
backup systems are implemented without considering the optimal balance between costs and
recovery speed. As a result, backup expenses may become economically unjustified, or the
available backup resources may fail to ensure a sufficiently fast recovery in critical situations. This
issue is particularly crucial for CEIS, where downtime lasting even a few hours can disrupt the
educational process and damage the institution’s reputation.
Another issue is the limited integration of modern forecasting tools into risk management systems.
For example, insufficient use of temporal dynamics models results in many systems failing to adapt
to real-time changes, such as fluctuations in server load or the emergence of new types of threats.
Without a flexible approach to risk forecasting, management decisions remain predominantly
reactive rather than proactive [
        <xref ref-type="bibr" rid="ref15 ref16 ref17">15–17</xref>
        ].
      </p>
      <p>As a result, existing methods fail to achieve a proper balance between economic efficiency and
functional stability. This highlights the need for the development of integrative approaches that
consider both economic parameters and risk factors in a time-dependent perspective. Future
research should focus on adapting existing models to the dynamic operational environment of
CEIS.</p>
      <p>
        The objective of this study is to develop a methodology for optimizing expenditures to ensure
the functional stability of corporate educational information systems. This methodology integrates
risk assessment, cost optimization models, and cybersecurity measures to enhance system
resilience while maintaining economic efficiency [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Theoretical foundations</title>
      <sec id="sec-2-1">
        <title>2.1. Analysis of existing approaches</title>
        <p>The functional sustainability of corporate educational information systems (CEIS) is a key factor in
their effectiveness in modern conditions. Ensuring this parameter requires taking into account the
complex economic dependencies between the costs of implementation, operation, security
measures, and risks arising in the process of use. The economic feasibility of measures should be
justified by integrating cost and risk assessments into a single model.</p>
        <p>The total cost of ownership (TCO) can be used to describe the cost side, which takes into
account all the costs of implementing, maintaining, and upgrading the system over its life cycle.
Formally, it can be described as:</p>
        <p>T
TCO = Cimp+∫ ( Cmaint ( t )+Cupgrade ( t )) dt ,
0
(1)
where Cimp is the initial cost of implementing the system, Cmaint (t ) is the maintenance cost at time
t , and Cupgrade ( t ) is the cost of upgrading technology.
Alongside cost analysis, risk assessment is a crucial component. The risks that arise during the
operation of CEIS can be quantified using a loss integration model within a temporal dynamic
framework:
where Pi ( t ) represents the probability of occurrence of the i-th threat at time t , I i is the economic
impact of the i-th threat, β s the system’s sensitivity coefficient to changes, and t 0 denotes the
initial moment of risk assessment. This approach allows for the consideration of not only the
probability and impact of risks but also their dynamic nature within a given time frame.</p>
        <p>The optimization of security and system resilience costs can be formalized through a
multicriteria model that balances expenditures and risk reduction. The goal of such optimization is to
minimize overall costs while ensuring the required level of functional stability. The corresponding
model is expressed as:</p>
        <p>T
min Ctotal =∫ ( k1 ∙ Rloss ( t )+ k2 ∙ M sec ( t )) dt ,</p>
        <p>0
where Rloss represents the losses incurred due to risk realization at time t , M sec ( t ) denotes the
expenditures on security measures, and k1 and k2 are weighting coefficients that account for the
priorities of reducing losses or costs.</p>
        <p>Ensuring the functional stability of CEIS also involves the implementation of backup systems.
The costs associated with backup measures include additional servers, data storage, and ensuring
system availability in case of failures. The system recovery time can be described using a recovery
model:
(2)
(3)
(4)
Trec = 0</p>
        <p>T
∫ ( 1−)∙ f ( t ) dt e−μ∙t</p>
        <p>T
∫ f ( t ) dt
0
,
where μ is the system recovery rate parameter, and f ( t )represents the distribution of resources
allocated for recovery.</p>
        <p>The complexity of economic analysis in CEIS lies in the need to account for interdependencies
between different system components. For instance, increasing monitoring expenditures may
reduce the probability of risks but lead to higher operational costs. Therefore, decision-making
must rely on integrative approaches based on advanced mathematical models.</p>
        <p>The conclusions drawn from this analysis confirm the necessity of combining quantitative risk
assessment methods with economic models that consider the temporal dynamics of costs. This
approach enables well-founded managerial decisions regarding resource allocation in educational
systems.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Scientific Contribution of the Study</title>
        <p>The scientific contribution of this study lies in the development of an approach to ensuring the
functional stability of corporate educational information systems (CEIS), considering the complex
interdependencies between costs, risks, and response speed to incidents. The foundation of this
approach is based on mathematical models that allow not only for the assessment of the system’s
current state but also for predicting its stability over time.
One of the key elements of the proposed methodology is the balancing of expenditures between
security measures and backup strategies. This issue is addressed through a model that establishes
the relationship between the key budget components allocated for ensuring system resilience:
M sec + M backup = C safe ,
(5)
where M sec represents the expenditures on security measures, M backupdenotes the expenditures on
backup and recovery, and C safe is the total budget. This model serves as a universal framework for
assessing the efficiency of resource allocation, as each of these components significantly impacts
the overall system resilience.</p>
        <p>For instance, insufficient funding for backup mechanisms may result in prolonged downtimes in
case of failures, whereas excessive spending on this area might be economically unjustified. Thus,
the proposed approach enables budget optimization based on priorities and actual threats.</p>
        <p>Another critical aspect is considering the temporal dynamics of losses incurred during system
failures. It has been established that the level of losses can decrease exponentially with a reduction
in response time. This justifies the economic feasibility of investing in system responsiveness. To
model this, the following equation is proposed:</p>
        <p>Rloss ( t )= Rinit ∙ e−k Trec ,
where Rinit is the initial level of losses, k is the coefficient determining the rate of loss reduction
depending on the recovery time, and T rec represents the time required for full system recovery.</p>
        <p>This model confirms that even a slight reduction in response time can significantly impact
overall economic outcomes. Specifically, analysis shows that the less time is spent on recovery, the
lower the risks of incurring major losses, which is crucial for educational platforms where failures
can severely disrupt the learning process.</p>
        <p>Particular attention is given to evaluating the impact of expenditures on the functional
resilience of the system. To model the relationship between security investments and system
stability, a nonlinear model is used, which accounts for the threshold effect of security measures’
efficiency:</p>
        <p>1
Ssys = 1+e−α ( Msec−Mcrit )
,
where Ssys represents the system’s stability level, M sec denotes the expenditures on security
measures, M crit is the critical level of expenditures required to achieve a minimum level of stability,
and α is the sensitivity parameter that determines how system stability responds to changes in
security spending.</p>
        <p>This model demonstrates that expenditures below a certain critical threshold have little impact
on system stability while exceeding this threshold leads to a sharp increase in effectiveness. This
highlights the importance of rational budget management, as excessive investments may become
inefficient if the system has already reached the required level of protection.</p>
        <p>Thus, the developed models provide a comprehensive approach to assessing and improving the
functional stability of CEIS. They enable the integration of economic, temporal, and technical
parameters into a unified system, facilitating optimal managerial decisions. This approach not only
reduces losses and enhances efficiency but also ensures the economic feasibility of educational
platform usage in the long-term perspective.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Methodology for Ensuring the Functional Stability of Corporate</title>
    </sec>
    <sec id="sec-4">
      <title>Educational Information Systems Considering Cybersecurity</title>
      <sec id="sec-4-1">
        <title>3.1. General Principles and Methods for Assessing CEIS Functional Stability</title>
        <p>The functional stability of corporate educational information systems (CEIS) is a critical factor in
ensuring the continuity of the learning process, data protection, and effective resource
management within an educational institution. In the modern landscape of increasing
cybersecurity threats, ensuring system stability becomes a complex challenge requiring the
integration of risk analysis mathematical methods, economic modeling, and adaptive cybersecurity
mechanisms.</p>
        <p>The proposed methodology for assessing and enhancing functional stability consists of the
following key stages:</p>
        <p>Threat identification and risk analysis—Evaluating potential security threats and their
probability of occurrence.</p>
        <p>Optimization of security measures and resource allocation—Balancing investments between
security measures and backup strategies.</p>
        <p>Cybersecurity monitoring and evaluation of security measures’ effectiveness—Continuous
assessment of the system’s ability to mitigate risks.</p>
        <p>Attack forecasting and incident management—Implementing proactive mechanisms to
detect and respond to emerging threats.</p>
        <p>To ensure an adaptive approach to functional stability assessment, the following mathematical
models are applied:</p>
        <p>Cyber risk assessment model, which is based on the probability of threat realization and its
potential impact on the system.</p>
        <p>Cost optimization model for balancing security measures and backup systems, enabling an
optimal trade-off between protection efficiency and economic feasibility.</p>
        <p>A stochastic model for incident response time prediction, which assesses the effectiveness
of security measures depending on response time.</p>
        <p>The proposed approach provides a comprehensive assessment of system resilience and enables
effective resource management to minimize potential attack-induced losses. By integrating
predictive risk modeling, economic evaluation, and adaptive cybersecurity strategies, this
methodology enhances the overall reliability and efficiency of corporate educational systems.</p>
      </sec>
      <sec id="sec-4-2">
        <title>3.2. Detailing the Methodology for Assessing and Enhancing CEIS Functional</title>
      </sec>
      <sec id="sec-4-3">
        <title>Stability</title>
        <sec id="sec-4-3-1">
          <title>Stage 1. Threat and Risk Assessment</title>
          <p>The first stage of the methodology involves identifying, classifying, and assessing potential
cybersecurity threats that may impact the functional stability of CEIS. Risk analysis considers the
probability of a threat occurring, denoted as Pthreat ( t ), which is determined based on statistical
data and attack history. The system’s vulnerability level, represented as Pvuln( t ), depends on the
implemented security measures and system architecture. Additionally, the level of threat control
denoted as Pcontrol ( t ), reflects the effectiveness of security measures in mitigating potential risks.</p>
          <p>Psuccess ( t )=</p>
          <p>Pthreat ( t )∙ Pvuln( t )</p>
          <p>Pcontrol ( t )
where Psuccess represents the probability that a threat will be successfully executed.
(8)</p>
          <p>Based on the obtained values, the potential loss level in the event of a successful attack is
evaluated as</p>
          <p>Nthreats
Rattack ( t )= ∑
i=1</p>
          <p>Psuccess ,i ( t )∙ I loss ,i ∙ e−λTrec ,
(9)
where I loss ,i represents the potential financial losses resulting from the execution of the i-th threat,
and T rec denotes the incident response time.
The graph illustrates how losses Rattack ( t ) decrease as the incident response time T rec shortens.
This confirms that rapid response significantly reduces financial losses.</p>
        </sec>
        <sec id="sec-4-3-2">
          <title>Stage 2. Threat and Risk Assessment</title>
          <p>The second stage involves determining the optimal allocation of financial resources between
security measures and backup mechanisms. To achieve this, an economic model, described in
Equation 6, is utilized. By integrating this model with a risk-based approach, it becomes possible to
evaluate how financial investments influence the overall security posture of the system. The
determination of the optimal expenditure level is carried out by constructing a dependency
function between security levels and financial investments, as described in Equation 7.</p>
        </sec>
        <sec id="sec-4-3-3">
          <title>Stage 3. Cybersecurity Monitoring and Attack Prediction</title>
          <p>The third stage involves dynamic tracking of system security levels and predicting potential
attacks. This process is implemented through attack trend analysis and the identification of
changes in threat levels. By continuously monitoring system activity and analyzing historical
attack patterns, it becomes possible to detect emerging threats and adjust security measures
proactively. This approach enhances threat intelligence capabilities and allows for the early
identification of vulnerabilities, improving the overall resilience of the corporate educational
information system.</p>
          <p>Anomalous activity monitoring in the system is carried out using machine learning
algorithms, enabling the detection of new types of threats.</p>
          <p>Attack prediction is based on the analysis of previous incidents and the identification of
behavioral patterns of attacking entities.</p>
          <p>This stage enables a proactive adaptation of security measures to current threats, minimizing the
likelihood of attacks being executed.</p>
          <p>The flowchart (Fig. 2) illustrates the cybersecurity decision-making process within CEIS. It
begins with threat analysis and attack probability assessment, based on historical data and
predictive models. Next, resource allocation is performed, distributing funds and infrastructure
between security measures, backup mechanisms, and incident response strategies.</p>
          <p>Following the implementation of security measures, effectiveness monitoring is conducted to
identify weaknesses and adjust the strategy accordingly. In the event of an incident, a response
mechanism is activated, minimizing losses and recovery time. A key component of this process is
feedback integration, which allows the system to continuously adapt to emerging threats and
improve its resilience.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>4. Evaluation of the effectiveness of the methodology for ensuring the functional resilience of CEIS</title>
      <p>The assessment of the effectiveness of the proposed methodology for ensuring the functional
resilience of corporate educational information systems (CEIS) is conducted based on a quantitative
and qualitative analysis of risk levels, cost optimization, and the response system’s time
characteristics. The main efficiency criteria include reducing the level of residual risk, minimizing
incident response time, optimizing security costs, and ensuring the economic feasibility of the
implemented mechanisms. The analysis of indicators is carried out through the modeling of CEIS
operation scenarios under different threat levels and security funding conditions.</p>
      <p>Determining the level of residual risk is one of the key parameters for assessing the
effectiveness of the methodology. Its dynamics are reflected in a formula that takes into account
the impact of security measures on the level of threats that remain relevant after the
implementation of protection policies:</p>
      <p>Rres= Rinit ∙ e−η Msec ,
(10)
where Rinit is the initial risk level, η is the efficiency coefficient of security measures, and M sec is
expenditures on cybersecurity measures. This equation demonstrates that as security expenditures
increase, the level of residual risk decreases exponentially. However, after reaching a certain
critical expenditure level, further increases in security funding do not yield a significant effect. This
confirms the necessity of determining the optimal security budget that ensures maximum risk
reduction with minimal costs.</p>
      <p>Incident response time has a significant impact on overall system losses, as prolonged downtime
can lead to substantial economic damage and the loss of critical data. The system recovery time is
evaluated using a stochastic model, which considers response speed and the scale of the threat, as
described in Equation 9.</p>
      <p>The implementation of automated cybersecurity mechanisms and early warning systems
significantly reduces response time and, accordingly, the level of financial losses.</p>
      <p>To confirm the effectiveness of the methodology, system operation was modeled in three main
scenarios. In the first scenario, the system operates without active cybersecurity, leading to a high
residual risk level of 85%, while the average recovery time after attacks exceeds 12 hours. In the
second scenario, only backup and recovery mechanisms are implemented, reducing the residual
risk level to 60% and shortening the average recovery time to 4 hours. In the third scenario, a
comprehensive approach is implemented with the introduction of active cybersecurity
mechanisms, allowing the residual risk level to be reduced to 25% and the incident response time to
be shortened to 1 hour. The obtained results demonstrate that a comprehensive approach, which
includes adaptive access control mechanisms, attack prediction, and automated backup,
significantly enhances system resilience.
A detailed analysis of the dependence of the residual risk level on the level of security funding
shows that the optimal budget for achieving maximum efficiency should be at the level of M crit,
after which further increases in funding do not provide a proportional increase in security
effectiveness. The dynamics of this dependence are described by Equation 7. This model confirms
the necessity of finding a balance between the level of cybersecurity expenditures and the overall
resilience of the system.
Graphical visualization of the obtained results shows that in systems without security measures,
the number of attacks remains consistently high, and the recovery costs exceed economically
feasible values. The proposed approach helps to avoid such issues and ensures an efficient
allocation of resources between security measures, backup, and rapid response mechanisms.</p>
      <p>Thus, the conducted evaluation of the methodology’s effectiveness confirms that the proposed
approach significantly reduces risk levels, optimizes financial expenditures, and improves the
overall resilience of corporate educational systems. The integration of mathematical risk
assessment models, economic cost analysis, and automated response mechanisms allows for
achieving maximum efficiency at an optimal funding level. The proposed methodology is adaptive
and can be used to enhance cybersecurity in various information systems utilized in the education
sector.</p>
    </sec>
    <sec id="sec-6">
      <title>Conclusions</title>
      <p>As a result of the conducted research, a comprehensive methodology for ensuring the functional
stability of corporate educational information systems (CEIS) has been proposed, taking into
account economic, temporal, and technical parameters. The methodology is based on the
integration of mathematical models for risk assessment, cost optimization, and adaptive
cybersecurity mechanisms. The developed approach enhances system protection, minimizes
economic losses, and ensures uninterrupted operation in a dynamic threat environment.</p>
      <p>The proposed mathematical models allow for optimized financial resource allocation between
security measures and backup systems while also evaluating the effectiveness of security measures
based on incident response time. A comprehensive approach to residual risk assessment and attack
prediction improves cybersecurity system efficiency and its adaptability to emerging threats.</p>
      <p>Future research directions include the integration of artificial intelligence and machine learning
technologies to automate risk assessment, attack forecasting, and decision-making processes.
Further advancements in adaptive resource backup models and anomaly detection monitoring will
improve system responsiveness and optimize expenditures. A relevant research area is the
development of real-time security measure effectiveness evaluation methodologies, which will
facilitate the operational adaptation of CEIS to environmental changes.</p>
      <p>The proposed approach can be applied to enhance the functional stability of information
systems across various industries, including the education, financial, and corporate sectors.
While preparing this work, the authors used the AI programs Grammarly Pro to correct text
grammar and Strike Plagiarism to search for possible plagiarism. After using this tool, the authors
reviewed and edited the content as needed and took full responsibility for the publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1] V. T. 
          <article-title>Busel, Large explanatory dictionary of the modern Ukrainian language: 250000</article-title>
          ,
          <string-name>
            <surname>Kyiv</surname>
            , Irpin, Perun,
            <given-names>VIII</given-names>
          </string-name>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>E.</surname>
          </string-name>
           Ukkonen,
          <article-title>Approximate string-matching with q-grams and maximal matches</article-title>
          ,
          <source>Theor. Comput. Sci</source>
          .
          <volume>92</volume>
          (
          <issue>1</issue>
          ) (
          <year>1992</year>
          )
          <fpage>191</fpage>
          -
          <lpage>211</lpage>
          . doi:
          <volume>10</volume>
          .1016/
          <fpage>0304</fpage>
          -
          <lpage>3975</lpage>
          (
          <issue>92</issue>
          )
          <fpage>90143</fpage>
          -
          <lpage>4</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>S.</surname>
          </string-name>
           Kumar,
          <string-name>
            <given-names>T.</given-names>
             
            <surname>Utsab</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
           
          <article-title>Raychoudhury, Image compression using approximate matching and run length</article-title>
          ,
          <source>Int. J. Adv. Comput. Sci. Appl</source>
          .
          <volume>2</volume>
          (
          <issue>6</issue>
          ) (
          <year>2011</year>
          ). doi:
          <volume>10</volume>
          .14569/ijacsa.
          <year>2011</year>
          .020617
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Gupta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Bansal</surname>
          </string-name>
          ,
          <string-name>
            <surname>V.</surname>
          </string-name>
           
          <article-title>Khanduja, Modern lossless compression techniques: Review, comparison and analysis</article-title>
          ,
          <source>in: 2nd Int. Conf. on Electrical, Computer and Communication Technologies</source>
          ,
          <string-name>
            <surname>ICECCT</surname>
          </string-name>
          ,
          <year>2017</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          . doi:
          <volume>10</volume>
          .1109/icecct.
          <year>2017</year>
          .8117850
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>P.</given-names>
             
            <surname>Venkatram</surname>
          </string-name>
          ,
          <article-title>A new lossless data compression algorithm exploiting positional redundancy</article-title>
          , arXiv,
          <year>2021</year>
          . doi:
          <volume>10</volume>
          .48550/arXiv.2107.13801
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>S.</surname>
          </string-name>
           Yamagiwa,
          <article-title>Stream-based lossless data compression</article-title>
          ,
          <source>in: Sublinear Computation Paradigm</source>
          ,
          <year>2021</year>
          ,
          <fpage>391</fpage>
          -
          <lpage>410</lpage>
          . doi:
          <volume>10</volume>
          .1007/
          <fpage>978</fpage>
          -981-16-4095-7_
          <fpage>16</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Serkov</surname>
          </string-name>
          , et al.,
          <article-title>Noise-like signals in wireless information transmission systems</article-title>
          ,
          <source>Adv. Inf. Syst</source>
          .
          <volume>1</volume>
          (
          <issue>2</issue>
          ) (
          <year>2017</year>
          )
          <fpage>33</fpage>
          -
          <lpage>38</lpage>
          . doi:
          <volume>10</volume>
          .20998/
          <fpage>2522</fpage>
          -
          <lpage>9052</lpage>
          .
          <year>2017</year>
          .
          <volume>2</volume>
          .
          <fpage>06</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Pieshkin</surname>
          </string-name>
          , et al.,
          <article-title>The comparative assessment of corrective parameters for antinoise convolutional and block codes</article-title>
          ,
          <source>in: Int. Conf. on Inf. and Telecom. Technologies and Radio Electronics, UkrMiCo</source>
          ,
          <year>2018</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . doi:
          <volume>10</volume>
          .1109/ukrmico43733.
          <year>2018</year>
          .9047530
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Kostiuk</surname>
          </string-name>
          , et al.,
          <article-title>Models and algorithms for analyzing information risks during the security audit of personal data information system</article-title>
          ,
          <source>in: 3rd International Conference on Cyber Hygiene &amp; Conflict Management in Global Information Networks (CH&amp;CMiGIN)</source>
          , Kyiv, Ukraine, vol.
          <volume>3925</volume>
          ,
          <year>2025</year>
          ,
          <fpage>155</fpage>
          -
          <lpage>171</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Kostiuk</surname>
          </string-name>
          , et al.,
          <article-title>A System for assessing the interdependencies of information system agents in information security risk management using cognitive maps</article-title>
          ,
          <source>in: 3rd Int. Conf. on Cyber Hygiene &amp; Conflict Manag. in Global Inf. Networks (CH&amp;CMiGIN)</source>
          , vol.
          <volume>3925</volume>
          ,
          <year>2025</year>
          ,
          <fpage>249</fpage>
          -
          <lpage>264</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>B.</given-names>
             
            <surname>Zhurakovskyi</surname>
          </string-name>
          , et al.,
          <article-title>Enhancing information transmission security with stochastic codes</article-title>
          , in: Classic, Quantum, and
          <string-name>
            <surname>Post-Quantum</surname>
            <given-names>Cryptography</given-names>
          </string-name>
          ,
          <string-name>
            <surname>CQPC</surname>
          </string-name>
          , vol.
          <volume>3829</volume>
          ,
          <year>2024</year>
          ,
          <fpage>62</fpage>
          -
          <lpage>69</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>M. </surname>
          </string-name>
          <article-title>Pratsiovytyi, Two-symbol image systems (coding) of real numbers</article-title>
          ,
          <source>in: Students' Physical and Mathematical Sketches</source>
          , vol.
          <volume>9</volume>
          ,
          <year>2010</year>
          ,
          <fpage>6</fpage>
          -
          <lpage>26</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>M. </surname>
          </string-name>
          <article-title>Pratsiovytyi, Geometry of real numbers in their encodings by means of an infinite alphabet as the basis of topological, metric, fractal and probabilistic theories, Sci</article-title>
          .
          <string-name>
            <given-names>J.</given-names>
            <surname>Natl</surname>
          </string-name>
          . Pedag. Dragomanov Univ.
          <volume>1</volume>
          (
          <issue>14</issue>
          ) (
          <year>2013</year>
          )
          <fpage>189</fpage>
          -
          <lpage>216</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Pratsiovytyi</surname>
          </string-name>
          , et al.,
          <article-title>G-representation of real numbers and some of its applications</article-title>
          ,
          <source>Nonlinear Oscil</source>
          .
          <volume>25</volume>
          (
          <issue>4</issue>
          ) (
          <year>2022</year>
          )
          <fpage>377</fpage>
          -
          <lpage>387</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>I.</surname>
          </string-name>
           Lysenko,
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Maslova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Pratsiovytyi</surname>
          </string-name>
          ,
          <article-title>The binary number system with different bases and special functions associated with it</article-title>
          ,
          <source>in: Proceedings of the Institute of Mathematics of the NAS of Ukraine</source>
          , vol.
          <volume>16</volume>
          (
          <issue>2</issue>
          ),
          <year>2019</year>
          ,
          <fpage>50</fpage>
          -
          <lpage>62</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Pratsiovytyi</surname>
          </string-name>
          ,
          <string-name>
            <surname>I.</surname>
          </string-name>
           Lysenko,
          <string-name>
            <surname>Y.</surname>
          </string-name>
           
          <article-title>Maslova, Geometry of number series: a series as a model of a real number in a new two-symbol number coding system</article-title>
          ,
          <source>in: Proceedings of the Institute of Mathematics of the NAS of Ukraine</source>
          , vol.
          <volume>15</volume>
          (
          <issue>1</issue>
          ),
          <year>2018</year>
          ,
          <fpage>132</fpage>
          -
          <lpage>146</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>M. </surname>
          </string-name>
          <article-title>Pratsiovytyi, Two-symbol encoding systems of real numbers and their application</article-title>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Zhebka</surname>
          </string-name>
          , et al.,
          <article-title>Optimization of machine learning method to improve the management efficiency of heterogeneous telecommunication network</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication System</source>
          , vol.
          <volume>3288</volume>
          ,
          <year>2022</year>
          ,
          <fpage>149</fpage>
          -
          <lpage>155</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>