DEVELOPMENT OF THE SOCIOCYBERPHYSICAL SYSTEMS` MULTI-CONTOUR SECURITY METHODOLOGY

The constant increase in the number of threats to the security of critical infrastructure objects, which include socio-cyberphysical systems, leads to a decrease in the quality of security services and the level of security of infrastructure elements. The object of research is the process of building a complex system of protection in socio-cyberphysical systems. The imperfection of the mechanisms for ensuring the security of critical infrastructure objects, which include socio-cyberphysical systems, the technological complexity of identifying new security threats necessitates an urgent need for a radical revision of the current approaches to its provision. So, it becomes clear that the development of a new approach to ensuring the security of information resources in socio-cyberphysical systems is needed. The article proposes a new approach to the methodological foundations of building multi-contour information protection systems with internal and exter-nal circuits on each of the platforms of socio-cyberphysical systems. This approach is based on a universal classifier of threats, which takes into account not the technical aspect of threats, but also their integration with social engineering methods, their synergy of hybridity. The socio-political influence on the realization of threats is taken into account, and practical mechanisms for providing basic security services based on post-quantum algorithms are also proposed. To provide basic security services in the proposed multi-con-tour protection system, it is proposed to use post-quantum algorithms – McEliece crypto-code constructions, which provide Perr=10 -9


The constant increase in the number of threats to the security of critical infrastructure objects, which include socio-cyberphysical systems, leads to a decrease in the quality of security services and the level of security of infrastructure elements. The object of research is the process of building a complex system of protection in socio-cyberphysical systems. The imperfection of the mechanisms for ensuring the security of critical infrastructure objects, which include socio-cyberphysical systems, the technological complexity of identifying new security threats necessitates an urgent need for a radical revision of the current approaches to its provision. So, it becomes clear that the development of a new approach to ensuring the security of information resources in socio-cyberphysical systems is needed. The article proposes a new approach to the methodological foundations of building multi-contour information protection systems with internal and external circuits on each of the platforms of socio-cyberphysical systems. This approach is based on a universal classifier of threats, which takes into account not the technical aspect of threats, but also their integration with social engineering methods, their synergy of hybridity. The sociopolitical influence on the realization of threats is taken into account, and practical mechanisms for providing basic security services based on post-quantum algorithms are also proposed. To provide basic security services in the proposed multi-contour protection system, it is proposed to use post-quantum algorithms -McEliece crypto-code constructions, which provide Perr=10 -9 -10 -12 , safe time Tsec=10 25 -10 35 group operations. Within the framework of the proposed approach, the problem of increasing the level of information security has been formalized and further ways of solving it have been determined
Keywords: socio-cyberphysical system, cyber security, information security, security of information, critical infrastructure facilities

Introduction
An important role in ensuring the national security of the state and especially its economic component is assigned to processes related to the protection of state market fundamentals that determine the economic component of competition.Revolutionary changes in infocommunication and computer networks made it possible to form a unification into a single information-cybernetic space, systems based on smart technologies, and led to the formation of socio-cyberphysical systems (SCPS) and the revision of critical infrastructure facilities (CIF).As a result, the range of threats to the national security of the state as a whole has increased significantly.The key and most potentially dangerous of them is the threat of disruption or taking under remote control of control processes in socio-cyberphysical systems.At the same time, SCPS is understood as the evolutionary integration of smart technologies with social networks and messengers.A block diagram of socio-cyberphysical systems is presented in Fig. 1 [1][2][3].
The consequences of the absence or imperfection of security mechanisms in the SCPS (CIF) can be colossal and irreversible, resulting in the collapse of the financial and political system of the state.The solution to the entire range of issues related to ensuring cybersecurity (CS), information security (IS) and security of information (SI) in SCPS (CIF) must be resolved in a comprehensive manner and inextricably from one another.Simply combining forces and means in each individual case to ensure the security of socio-cyberphysical systems (critical infrastructure objects) is inappropriate, both from a practical and scientific point of view.The lack of other alternative approaches prompts an urgent need to solve the current problem -increasing the security of information in socio-cyberphysical systems based on new approaches unknown to date.This approach requires reformatting the mechanisms for constructing security systems for infrastructure elements and requires taking into account the construction of multi-contour information security systems based on post-quantum algorithms [4][5][6].
It is known that computer systems and telecommunications ensure the reliable functioning of a huge number of information systems for various purposes.Most of these systems contain restricted access information that is confidential.Thus, solving the problem of automating data processing processes entailed the generation of a new problem -the problem of information security [7][8][9].Since their inception, social networks and instant messengers have always attracted criminal interest.And this interest was associated not only with the storage of personal data, but also with the possibility of using it as a cyber weapon in the implementation of both political and socio-economic influence projects.At the same time, regardless of the means, mechanisms and technologies used to ensure information security, another pressing problem is ensuring the information security of the individual, society and the state [10][11][12].Data security during storage requires the use of encryption tools that can operate either at the level of data storage or at the level of individual system components, for example, database tables.Security in socio-cyberphysical systems must be ensured using post-quantum algorithms, as well as lightweight encryption algorithms that can be used in low-energy elements of socio-cyberphysical systems.Thus, the problem of cybersecurity is also an integral third component in solving the problem of ensuring the security of banking information [13][14][15][16].Thus, an urgent problem is the need for a new approach to building information security systems that will ensure the required level of SCPS security (CIF) in the post-quantum period.infrastructure facilities).However, the issues of ensuring the security of such objects have not been considered, taking into account the scaling and integration of technologiesthe use of various standards and technologies of data circulation channels, Internet of things and smart technologies.

Security
In [23], the methodology of "Improving the security of European critical infrastructure facilities" is considered, the basis of which is the concept of the risk of "loss of critical infrastructure" as an anthropogenic risk.The main disadvantages in assessing risks in [23] are the lack of integration when assessing the socio-political situation.In addition, the authors do not consider the influence of social aspects, social networks and messengers on cyber-physical systems and do not ensure the formation of multi-contour information protection systems of socio-cyberphysical systems.
The work [24] describes a methodology and its implementation for the assessment of critical infrastructures on a European scale.The methodology considers asset-level impacts, estimates the propagation of network-level failure due to interdependencies, and estimates the economic impact of critical infrastructure failures at the national level.However, the methodology does not take into account aspects of building multi-circuit information protection systems for each of the platforms of socio-cyberphysical systems (critical infrastructure facilities).
An analysis of work [25] showed the need to take into account the socio-political situation in society to prevent threats at critical infrastructure facilities.However, this does not take into account the aspects of how and in what way the assessment needs to be carried out, and what mechanisms need to be used in the context of the rapid growth of smart technologies and targeted attacks.
In [26], aspects of building a national defense system are considered -ways to protect society from terrorist attacks, natural disasters and other threats and dangers.However, the authors do not take into account the platform nature of socio-cyberphysical systems, as well as the need to consider security issues at each of the contours (internal and external) of the information security system.
Thus, the analysis showed that the evolutionary development of technologies and the capabilities of computing systems, on the one hand, make it possible to minimize energy and computational costs and form socio-cyberphysical systems.On the other hand, they do not take into account the capabilities of cyberterrorists, cyber groups, their computing and financial capabilities.Integrating threats with social engineering methods makes it possible to create mixed threats with characteristics of synergy and hybridity, which increases the risk of their implementation.The pursuit of super speeds in mobile technologies and their use (as the basis of communication) in smart technologies "ensures" the implementation of targeted attacks with a probability of more than 95 %.The absence of regulators at the international level of the need to integrate security mechanisms (to obtain emergent security properties) does not allow the formation of comprehensive information security systems.In addition, when building multi-contour information security systems, it is necessary to take into account the socio-political-economic situation in society and the state as a whole.To build multi-contour information protection systems for critical infrastructure facilities (socio-cyberphysical systems), it is necessary to use fundamentally new information protection mechanisms based on post-quantum algorithms.

Analysis of literature data and problem statement
In [1], crypto-code constructions (CCC) based on elliptic codes and their modifications are proposed, however, in smart technologies with limitations in computational and capacitive parameters, their use is not always possible.In addition, LDPC codes are already used in wireless channels, which simplifies the practical implementation (implementation) of CCC.
The analysis of the work [2] showed that international regulators consider the issue of building information security systems as separate aspects for each of the security components.However, this approach does not allow not only to form the methodological basis for constructing security systems, but also to take into account the evolutionary development of targeted attacks and complex threats.
The work [3] proposes models for constructing multi-contour systems; however, the integration of targeted threats with social engineering methods is not taken into account, which does not allow for an objective assessment of the current state of socio-cyberphysical systems` security.
The work [17] considers the issues of a new approach to building protection systems based on international regulators and taking into account the conduct of hybrid wars.However, the authors do not consider the possibility of building multi-contour systems, do not take into account the platform nature of modern critical infrastructure objects and their evolutionary development into socio-cyberphysical systems.
In [18], the authors classify, analyze threats and opportunities to increase the security level of pseudorandom number generators, and also define standards and testing methods to improve the reliability, security and eliminate vulnerabilities of such generators.However, their use in smart technologies is limited by computing and energy capabilities, which requires either the use of less crypto-resistant generators or requires the development of new approaches to ensure their strength.
In [19], the author proposes the "Security as a Code" methodology -security in cloud environments, which consists of integrating security controls, policies and best practices directly into the processes of software development and deployment.The integration process involves the transformation of security requirements and configurations into software code, which in turn is considered as an integral part of the complete software development life cycle.However, this approach does not take into account the requirements for the construction of multi-contour systems, integration and hybridity of targeted (mixed) threats.
An analysis of work [20] showed that to build security systems, a careful selection of not only metrics, but also classification of threats is required.However, the proposed risk assessment methodology does not take into account the complexity and synergy of target threats.
An analysis of international practices for protecting critical infrastructure facilities in [21] showed the need to integrate protection mechanisms for all security components: cybersecurity (CS), information security (IS) and security of information (SI).However, issues of increasing the level of resistance of the security mechanisms themselves have not been considered, and issues of changing to post-quantum algorithms have not been considered.
The study [22] examined the practical aspects of the methodology for assessing regional infrastructure (critical

Purpose and objectives of the research
The purpose of this research is to develop a methodology for constructing multi-contour information security systems in socio-cyberphysical systems based on post-quantum algorithms and taking into account the multi-contour nature of the security system.This will allow to obtain a fundamentally new approach to the formation of not only the classification of cyber threats, but also to build multi-contour protection systems.At the same time, for each platform, threats to basic security services in each contour (internal and external) are considered, which will allow to obtain an objective assessment of the critical points of the infrastructure, an objective assessment of the current state of protection.This approach also creates new opportunities for the timely development of preventive protective measures.
To achieve the purpose of the work it is necessary to solve the following tasks: to develop security mechanisms based on post-quantum algorithms; to construct a block diagram of the methodology for constructing a multi-contour information security system in socio-cyberphysical systems.

Materials and research methods
The object of the study is the process of building a comprehensive information security system in socio-cyberphysical systems.The current situation is not least due to the imperfection of the mechanisms used today to ensure the security of elements of critical infrastructure facilities, which include socio-cyberphysical systems.
To build multi-contour security systems, let's use a threat classifier that takes into account hybridity, synergy and integration of mixed threats with social engineering methods.The practical implementation of the classifier is given in the resource [39], the main stages of the formation of a multi-contour information security system for socio-cyberphysical systems [6,40,41].
To assess the influence of the socio-political situation in a society (region), it is proposed to use the approach presented in [42], which makes it possible to ensure the use of the results obtained for models based on Lotka-Volterra [43].Thus, the proposed mechanisms make it possible to formulate the methodological basis for constructing multi-circuit information security systems in socio-cyberphysical systems.

1. Development of security mechanisms based on post-quantum algorithms
To provide security services in socio-cyberphysical systems, it is proposed to use post-quantum algorithms -crypto-code constructions based on LDPC codes with damage [33,[44][45][46][47][48][49][50][51][52].However, the presented practical protocols for decrypting LDPC codes are based on soft decoding, which significantly affects decoding speed and reliability.The LDPC code check matrix is used for construction.For use in McEliece crypto-code constructions, a generating matrix is required, which can be obtained based on the orthogonality property of the check and generating matrices.To implement hybrid McEliece crypto-code constructions on LDPC codes with damage, let's use approaches which structural diagram of data transmission is shown in Fig. 2 [1,28,30,33].

The mathematical model of McEliece's hybrid crypto-code construction uses the following input data:
-set of information resources

. Block diagram of McEliece's hybrid crypto-code construction on LDPC codes with damage
-set of crypto-transformations to form a codeword on the generating matrix of the LDPC code: ϕ=(ϕ 1 , ϕ 2 , …, ϕ s ), where : I , where h j -forms initialization vectors (V 1 -initialization vector, which determines the number and places of "puncture" of symbols in the codeword, V 2 -initialization vector, which determines the number and places of "adding" information symbols in the codeword); -set of crypto transformations that allow to obtain the original information resource: -generating matrix for the LDPC code.To generate the key let's use: , , ,..., , , , where the masking matrices: X i -non-degenerate k×k-matrix; P i -permutative n×n-matrix; D i -diagonal n×n-matrix.
The diagonal matrix of the LDPC code is equal to the identity matrix, and cannot be used; -a set of damaged texts (C(x) i ): { } , ,..., , which defines a bijective mapping between a set of permutations 1 2 2 { , ,..., } n S S S and the set # , The sender generates a code word: , where е -additional session key for each information parcel.
The MV2 algorithm receives a code word + and is converted in the MV2 algorithm into damaged text (remainder) and damage (flag): The communication channel receives ||f(x) i || and ||C(x) i ||, in this case, transmission can be carried out either through one or two independent channels.
On the receiving side, the recipient uses the damage rule , r n F masking, the number and location of zero infor-mation symbols can decode the code word and receive an information message: When using an extended modified LDPC code, the recipient adds zero information symbols (along the initialization vector V 1 ), and also "receives" information symbols (according to the initialization vector V 2 ).
The masking matrices effect is removed from and then decodes the resulting vector using the Berlekamp-Massey algorithm [1,2,33]: .
Let's receive an information resource: To ensure authenticity, the work proposes to use a modified UMAC algorithm on crypto-code constructions; the block diagram is shown in Fig. 3 [32].
In addition, it is proposed to use a modified SSL/TLS protocol on post-quantum algorithms.The protocol is proposed to use the synthesis of McEliece crypto-code constructions with the UMAC algorithm, in which the substrate is formed on the basis of the CCC [32].The block diagram of the modified protocol is shown in Fig. 4. The proposed protocol provides the required level of security and allows to "eliminate" the identified "shortcomings" of the version 1.3 protocol.In addition, the use of various noise-resistant codes makes it possible to ensure the required level of security in the post-quantum period.To ensure various levels of information resources` security, it is proposed to use error-resistant codes with damage [33].In Table 1 shows the results of studies of the relationship between time and the degree of secrecy of information, taking into account the classification of the security level.The results obtained confirm the possibility of using CCC on various codes in the post-quantum cryptoperiod.Table 2 presents the results of the ability to provide security services in the post-quantum period in wireless and mobile technology standards, taking into account the degree of security.Analysis of the Table 2 showed that to ensure security in socio-cyberphysical systems, it is proposed to use post-quantum algorithms, which, in contrast to modern security service mechanisms, make it possible to ensure the required level of cryptographic strength and efficiency.
The presented mathematical apparatus allows to estimate the main parameters of crypto-code struc-tures on LDPC codes with damage and on modified codes.
The length of the plaintext (in bits) arriving at the input of a cryptosystem with unprofitable ones is determined by the following expressions: -for НССС on shortened LDPC-codes: , -number of segments of flawed text; K C =1-K f ≈0,758 -compression ratio of the remainder (flawed text) (at u=8, v=3, z=5); -required for randomization of the MV2 algorithm, the number of permissible transformation rounds; -for HCCC on lengthened LDPC-codes: The length of the codogram (in bits) is determined by the following expressions: -for НССС on shortened LDPC-codes: ( ) -for НССС on lengthened LDPC-codes: ( ) The length of the public key (in bits) is determined by the sum of the matrix elements LDPC X G and is specified by expressions: -for НССС on shortened LDPC-codes: ( ) -for НССС on lengthened LDPC-codes: ( ) The length of the private key (in bits) is determined by the sum of the elements of the matrices X, P, D (in bits) and is given by the expressions: -for НССС on shortened LDPC-codes: ( ) where 2 !v u u F = -power of a set of group transformations; -for НССС on lengthened LDPC-codes: Due to the use of flawed codes in the McEliece HCCC, the required level of stability is ensured, which does not decrease with a decrease in the power of the Galois field.The level of resistance is provided by damage and the use of initialization vectors (when using shortened and/or extended LDPC codes).
The complexity of forming a codogram is determined by the expressions: -for HCCC on shortened LDPC codes: when implementing systematic coding, it is determined by the expression: for non-systematic coding: Secret key ЕС 1 2

Encryption information c X
Public key Public key  ( ) -for HCCC on extended LDPC codes: when implementing systematic coding, it is determined by the expression: ( ) for non-systematic coding: ( ) The complexity of decoding a codogram is determined by the following expressions: -НССС on shortened LDPC-codes: -НССС on lengthened LDPC-codes: The complexity of the decoding process is determined by the expressions: -for НССС on shortened LDPC-codes: ( ) where ( ) The proposed mathematical apparatus allows not only to obtain various designs of LDPC codes, but also to form asymmetric crypto-code designs, which makes it possible to use them in the post-quantum period.

2. Development of a block diagram of a methodology for constructing a multi-contour information security system in socio-cyberphysical systems
To construct a block diagram of the methodology for a multi-contour information system protection system, the following sequence of actions is proposed: Stage 1.At this stage, a classification of threats is formed based on the set of threats into basic security services.This takes into account the properties of hybridity and synergy of threats, the possibility of their integration with social engi-neering methods, as well as their impact on the contours of each of the SCPS platforms [40]: Internal contour of the information security system: -1 st platform (social networks): where 1platform

SCS ISL
Overall assessment of threats to the internal contour for all platforms: .

SCS SCS ISL ISL C I A Au Af synerg SCS ISL C I A Au Af synerg S СS ISL
External contour of the information security system: -1 st platform (social networks):  ; -2 nd platform (cyberspace):

SCS ESL С I A Au Af synerg
The overall assessment of threats to the external contour for all platforms is: .

SCS SCS ESL ESL C I A Au Af synerg SCS ESL C I A Au Af synerg SCS ESL
The general assessment of threats to a multi-contour information protection system is determined: Stage 2. Assessment (if data is available) of the socio-political and economic state of the society (region).For this purpose, the approach in [42] is used.
A mathematical model for assessing the exposure to social influence of elements of state institutions, media and informal leaders on regional communities: where matrix IMP -generalized matrix of the influence of various institutions on the corresponding age groups of the regional community [42]: ...

MM
-influence of mass media;
Stage 3. Assessment of the ratio of threats to the number of attackers ("predators") and infrastructure elements of socio-cyberphysical systems ("victims") based on the approach in [53,54]: -model 1. Computing capabilities and targeting of cyber-attacks: , where The calculation of individual components is given in the work [42].
The model provides the formation of a classifier of threats and attackers, as well as their relationship.This approach forms the point of irreversibility, at which the "impossibility" of carrying out a targeted attack is determined.
Model 2 takes into account the "interest" of criminals and/or cyber groups in carrying out a targeted attack, their motivation and competition: -model 2. Possible competition of attackers [42]: where the number of "predators" belongs to the plural The model provides the computing capabilities of attackers and the vector of technology development: -model 3. Opportunities for grouping attackers/cyber groups to achieve the goals of a cyber-attack [42]: The model takes into account the financial capabilities of cyber groups (attackers), their political and social motivations for implementing threats: -model 4. Relationships between "prey" species and "predator" species [42]: where coefficients ε, ζ>0 -harming the "prey" and "predator" respectively [42].
The proposed models practically allow to take into account the modern financial computing capabilities of attackers.
Stage 4. Assessment of the integrated indicator of the current security level of a multi-contour protection system.
Stage 5. Modification of security service mechanisms in a multi-contour information security system (integration of post-quantum algorithms).Using post-quantum algorithms to provide essential security services.Fig. 5, 6 show a block diagram of the methodology for constructing a multi-contour information security system.The main difference from known approaches is the possibility of synthesizing both expert and system analysis of not only targeted threats to socio-cyberphysical systems, but also the possibility of objectively assessing the current state of information security.This approach allows to respond in a timely manner to possible changes (modifications) of targeted threats, as well as take into account their synergy and hybridity, and the possibility of combining them with social engineering methods.The proposed practical solutions for providing security services based on post-quantum algorithms make it possible to ensure the required level of security of confidential information with different levels of secrecy.
To assess the integrated security indicator, it is proposed to use an assessment software package [39], as well as the proposed methodology and limitations: 1 st Step.Formation of expert assessments of threats, their impact on security services, the possibility of signs of synergy and hybridity, as well as the integration of social engineering methods.Determine the impact of the threat on the infrastructure layer (ISO/OSI models).In this case, a matrix of weighting coefficients is formed: where і -security services, j -corresponding threat, 1 .
Step.Formation of a matrix of correspondence between information resources and security services: where і -security services, l -information resource, 1 .l L ∈∀  When filling out the matrix, the need to provide an appropriate security service is taken into account (1 -service, 0 -service is not needed).
3 rd Step.Forming a dependency between information resources and infrastructure levels (ISO/OSI models) where information circulates and/or is stored: where k -presence and type of connection, infrastructure element (level) where information is stored, l -information resource, 1 .l L ∈∀  4 th Step.Formation of dependence of threats and information resources (assessment of infrastructure criticality): This step allows to determine the criticality of unauthorized access to a particular information resource.
5 th Step.Formation of dependency between threats and infrastructure elements (ISO/OSI model level): where k -presence and type of communication, infrastructure element (level) where information is stored, j -corresponding threat, 1 .j N ∈∀  The step allows to identify critical points in the infrastructure and determine preventive security measures in advance.
6 th Step.Formation of an assessment of the security of a socio-cyberphysical system based on the analysis of Steps 2 and 3 (finding the connection between information resources, infrastructure elements (critical points of unauthorized access/information leakage) and security services).7 th Step.Forming an assessment of the capabilities of the current information security system to counter threats: * threats / protection system threats / protection system , qj s s

S S =
where q -the presence of a mechanism to counter the threat, j -corresponding threat, 1 .j N ∈∀  8 th Step.Formation of assessment of regulators and legislative acts.9 th Step.Formation of an assessment of the current state of the security system.This takes into account the results of steps 7-9.
The presented methodology uses the following requirements.
After calculating the key compliance matrices, it is necessary to determine the synergistic effect of the interaction of cybersecurity components (security services, information resources and infrastructure elements).
For the correspondence matrix between security services and information resources: where і -security services, l -information resource.
After calculating the matrix, the level of importance of each service is determined ( ) and each resource ( ) inf , l S where і=1,…,5, l=1,…,8, by formulas: After this, the total levels of service importance are determined ( ) where l=1,…,8.Services and resources are then ranked according to certain weights from largest to smallest to determine the most significant services/resources according to their interaction matrix.
Next, an integral indicator of the current security level is formed for the correspondence matrix between security services and information resources.For this purpose, the absolute and relative value of the integral indicator is determined: where inf_ abs IS -absolute integral indicator of the current level of information security for the compliance matrix of security services and information resources; inf_ rel IS -relative integral indicator of the current level of information security for the compliance matrix of security services and information resources; inf il S -elements of the general matrix of compliance between security services and information resources; i -number of security services; l -number of information resources; inf min il S -minimum element of the compliance matrix between security services and information resources; inf max il S -minimum element of the matrix of compliance between security services and information resources.
For a dependency matrix between information resources and infrastructure layers (ISO/OSI models) where information circulates and/or is stored: where k -presence and type of connection, infrastructure element (level) where information is stored, l -information resource.

SOCIO-POLITICAL, ECONOMIC INFLUENCE
"predator-prey" models taking into account computing capabilities and the focus of targeted cyber attacks (model 1) taking into account the possible competition of attackers in relation to the "victim" (model 2) taking into account the possibility of grouping attackers/cyber groups in order to achieve the goals of a cyber attack (model 3) taking into account the relationships between "prey types" and "predator types" of cyberattack targets (model 4) where l=1, …, 7.

Causing damage
Ensuring  The resources and layers of infrastructure are then ranked according to certain weighting factors from largest to smallest to determine the most significant resources/ layers in accordance with the matrix of their interactions.
Next, an integral indicator of the current security level is formed for the correspondence matrix between information resources and infrastructure levels.For this purpose, the absolute and relative value of the integral indicator is determined: where _ ISO abs

IS
-absolute integral indicator of the current level of information security for the correspondence matrix between information resources and infrastructure levels; _ ISO rel

IS
-relative integral indicator of the current level of information security for the correspondence matrix between information resources and infrastructure levels; where l=1,…,7.
Services and resources are then weighted from largest to smallest to determine the most significant services/infrastructure layers according to their interaction matrix.
Next, an integral indicator of the current security level is formed for the correspondence matrix between security services and infrastructure levels.For this purpose, the absolute and relative value of the integral indicator is determined: where IS serv_abs -absolute integral indicator of the current level of information security for the correspondence matrix of security services and infrastructure levels; IS serv_rel -relative integral indicator of the current level of information security for the matrix of correspondence between security services and infrastructure levels; -minimum element of the matrix of correspondence between security services and infrastructure levels.
The general integral indicator of the current level of information security in the analyzed security system is formed by additive convolution of individual absolute integral indicators and multiplicative convolution of individual relative integral indicators.
The additive integral indicator of the current level of information security in the security system is calculated using the formula: The multiplicative integral indicator of the current level of information protection in the security system is calculated using the formula: In this way, it is possible to determine the overall integral assessment of the security of the system: the closer the value of the relative indicator is to 1, the higher the influence of the relevant factors on the security of information in the security system.

Discussion of the results of assessing the current state of a multi-contour information security system
The emergence of socio-cyberphysical systems (block diagram in Fig. 1) requires new approaches to building security systems.First, a new approach to building multi-contour systems is needed, taking into account platforms and safety loops.Secondly, it is necessary to take into account the possibility of differentiating information resources (Table 1) taking into account the technologies on which the cyberphysical one is built.Thirdly, the need to use post-quantum algorithms, among which crypto-code constructions "stand out".Such post-quantum algorithms make it possible to build asymmetric cryptosystems that are resistant in the post-quantum cryptoperiod, and also to provide the required level of efficiency and increase the level of reliability in an integrated manner.
To ensure security in multi-contour information security systems, it is proposed to use, firstly, post-quantum algorithms, since the emergence of a full-scale computer may occur in the next year or two.At the same time, US NIST experts question the possibility of using symmetric and asymmetric cryptography cryptosystems, which will ensure the required level of security.The competition for post-quantum algorithms showed the possibility of providing security services based on combining cryptography mechanisms with noise-resistant coding methods on lattices or Galois fields.However, it is necessary to use Galois fields (2 10 -2 13 ), which is a significant drawback when using them in smart and Internet of Things technologies, which require low-capacity solutions and significant limitations on computational parameters.Thus, the need arose to "react" to this problem.Secondly, international regulators and legislation still consider the components of security and define threats and mechanisms of preventive action for each component.This approach does not allow for an objective assessment of the current state of the defense system, the possibility of synergy and hybridity of threats, or their integration with social engineering methods.To ensure the further development of post-quantum algorithms -crypto-code constructions, it is proposed to use a modification of noise-resistant codes (shortening and lengthening).This approach makes it possible to ensure the required level of security over the GF(2 6 -2 8 ) without compromising security.Resilience is ensured using additional initialization vectors: when shortened, the initialization vector "indicates" the number and places of "removal" of symbols in the codogram (cryptogram).A further reduction in the computational and capacitive parameters of building a hybrid crypto-code design is defective codes.Analysis [1][2][3] showed that the use of HCCC provides a significant reduction in the complexity of generating (≈12 and decoding (≈20 times) a cryptogram compared to the McEliece crypto-code construction on classical codes.At the same time, HCCC can be built over the GF(2 4 -2 6 ), which allows reducing computational and capacity costs, while resistance is ensured by transmitting damaged text and damage (the "reduction" rules in each plaintext character).
The analysis of the use of various noise-resistant codes in crypto-code constructions and the analysis of technologies for constructing socio-cyberphysical systems based on smart technologies (Tables 1, 2) showed that the use of various codes allows to differentiate the main indicators of cryptosystems and take into account the level of secrecy of information resources.This approach will reduce not only computational and capacity costs, but also increase the level of security through various modifications and selection of noise-resistant codes.This mechanism will reduce the possibility of hacking crypto-code constructions and provide the required level of security.Fig. 5, 6 present a methodology for constructing multi-contour information security systems, which ensures an objective assessment of the current state of security of infrastructure elements of socio-cyberphysical systems.The construction of a multi-contour protection system based on post-quantum algorithms will ensure the required level of security, taking into account the amount of secrecy of information resources, their circulation and storage.
A promising direction is the use of neural networks and "adding" threats from metric databases, for example KDD99 NCL, which will "expand" the range of threats and vulnerabilities, as well as provide the required level of objectivity for taking preventive measures.

Conclusions
1.The analysis of threats to socio-cyberphysical systems (critical infrastructure objects) allows to formulate a methodology for constructing multi-contour information protection systems.One of the main elements of such systems is proposed to use post-quantum algorithms -crypto-code constructions based on various noise-resistant codes with the possibility of causing damage.The proposed McEliece crypto-code constructions on LDPC codes ensure efficiency and durability, providing the required level of basic security services.
2. The proposed block diagram of the methodology for constructing multi-contour information security systems provides the opportunity to obtain an objective assessment of the current state of security in socio-cyberphysical systems.The proposed assessment software package allows to obtain an integrated security indicator, identify critical points of vulnerability and the "opportunity" of an attacker to gain access to confidential information.And the proposed mechanisms and protocols based on post-quantum algorithms will provide the required level of stability and efficiency during the period of the emergence of a full-scale quantum computer.

Fig. 1 .
Fig. 1.Structural-logical diagram of socio-cyberphysical systems of damage (f(x) i -flag): of formation of damaged text and damage (based on the algorithm key MV2) -

Fig. 3 .
Fig. 3. Block diagram of a modified UMAC based on the McEliece crypto-code construction with modified (lengthened/shortened) codes

Fig. 4 .
Fig. 4. Block diagram of the formation of an authenticated message based on crypto-code constructions on modified elliptic codes


assessing the susceptibility to social influence of elements of state institutions , Mathematical model of the influence of regional society on the formation of the ranking of political forces total intensity forming the rating of political power

Fig. 5 .
Fig.5.Block diagram of constructing a system for assessing the current state of a multi-contour protection system

Fig. 6 .
Fig. 6.Block diagram of mechanisms for providing security services in multi-contour information security systems general matrix of correspondence between information resources and infrastructure levels; k -number of information resources; l -number of infrastructure levels;min kl ISO S-the minimum element of the correspondence matrix between information resources and infrastructure levels;max kl ISO S-the minimum element of the correspondence matrix between information resources and infrastructure levels.For the mapping matrix between security services and infrastructure layers: * , security service, l -infrastructure level.After calculating the matrix, the level of of each service is determined ( )

Table 2
Comparative characteristics of wireless and mobileInternet technologies