Analysis of conditions and factors affecting cyber security in the special purpose information and telecommunication system

Authors

DOI:

https://doi.org/10.15587/2706-5448.2022.261874

Keywords:

cyber security, radio-electronic environment, special purpose information and telecommunication system, operational management

Abstract

The increase in the number of cases of failure of information and telecommunication networks due to cyber attacks determines the need to protect them from this type of attacks. The issue of increasing cyber security in the conditions of conducting operations by groups of troops (forces) is very important. Due to the armed conflict in the East of Ukraine, the military-political instability in the Middle East, the struggle for influence on world financial and energy flows, the global military-political instability is intensifying. This is due to an increase in the number of communication devices in information and telecommunication networks, as well as an increase in the number of possible attacks that can be used to disrupt the operation of an information and telecommunication network. Considering the above, the object of research is a special purpose information and telecommunication system. The subject of research is cyber security of a special purpose information and telecommunication system. Classical methods of scientific knowledge, namely analysis and synthesis, were used during the research. The research identifies factors that affect cyber security in a special purpose information and telecommunications system. All this must be taken into account while planning and deploying a special purpose information and telecommunication system. The analysis of the consequences of the impact on the information and telecommunications system of special purpose of modern devices of defeat and the impact of devices of radio-electronic suppression and other factors was carried out. A typical special purpose information and telecommunication system does not fully meet the requirements for constant readiness to ensure the management of troops (forces), stability, mobility and throughput. A formalized description of the task of improving cyber security in a special purpose information and telecommunications network is provided. The components that affect the level of cyber security of the special purpose information and telecommunication network during the group's operations have been established. The impact of the specified conditions and factors must be reflected: in the planning documents during the planning of the deployment and operation of the group's information and telecommunications system; in the software, during operational management.

Author Biography

Oleg Sova, Military Institute of Telecommunications and Information Technologies named after Heroes of Kruty

Doctor of Technical Sciences, Senior Researcher, Head of Department

Department of Automated Control Systems

References

  1. Shishatckii, A. V., Bashkirov, O. M., Kostina, O. M. (2015). Rozvitok іntegrovanikh sistem zv’iazku ta peredachі danikh dlia potreb Zbroinikh Sil. Ozbroennia ta vіiskova tekhnіka, 1 (5), 35–40.
  2. Timchuk, S. (2017). Methods of Complex Data Processing from Technical Means of Monitoring. Path of Science, 3 (3), 4.1–4.9. doi: http://doi.org/10.22178/pos.20-4
  3. Sokolov, K. O., Gudima, O. P., Tkachenko, V. A., Shiiatii, O. B. (2015). Osnovnі napriami stvorennia ІT-іnfrastrukturi Mіnіsterstva oboroni Ukraini. Zbіrnik naukovikh pratc Tcentru voenno-strategіchnikh doslіdzhen, 3 (6), 26–30.
  4. Shevchenko, D. G. (2020). The set of indicators of the cyber security system in information and telecommunication networks of the armed forces of Ukraine. Suchasnі іnformatcіinі tekhnologіi u sferі bezpeki ta oboroni, 38 (2), 57‒62. doi: https://doi.org/10.33099/2311-7249/2020-38-2-57-62
  5. Makarenko, S. I. (2017). Perspektivy i problemnye voprosy razvitiia setei sviazi spetcialnogo naznacheniia. Sistemy upravleniia, sviazi i bezopasnosti, 2, 18–68.
  6. Zuiev, P., Zhyvotovskyi, R., Zvieriev, O., Hatsenko, S., Kuprii, V., Nakonechnyi, O. (2020). Development of complex methodology of processing heterogeneous data in intelligent decision support systems. Eastern-European Journal of Enterprise Technologies, 4 (9 (106)), 14‒23. doi: http://doi.org/10.15587/1729-4061.2020.208554
  7. Brownlee, J. (2011). Clever algorithms: nature-inspired programming recipes. LuLu, 441.
  8. Gorokhovatsky, V., Stiahlyk, N., Tsarevska, V. (2021). Combination method of accelerated metric data search in image classification problems. Advanced Information Systems, 5 (3), 5–12. doi: http://doi.org/10.20998/2522-9052.2021.3.01
  9. Meleshko, Y., Drieiev, O., Drieieva, H. (2020). Method of identification bot profiles based on neural networks in recommendation systems. Advanced Information Systems, 4 (2), 24–28. doi: https://doi.org/10.20998/2522-9052.2020.2.05
  10. Rybak, V. A., Akhmad, Sh. (2016). Analiticheskii obzor i sravnenie sushchestvuiushchikh tekhnologii podderzhki priniatiia reshenii. Sistemnyi analiz i prikladnaia informatika, 3, 12–18.

Downloads

Published

2022-07-25

How to Cite

Sova, O. (2022). Analysis of conditions and factors affecting cyber security in the special purpose information and telecommunication system. Technology Audit and Production Reserves, 4(2(66), 25–28. https://doi.org/10.15587/2706-5448.2022.261874

Issue

Section

Systems and Control Processes: Reports on Research Projects