Analysis of conditions and factors affecting cyber security in the special purpose information and telecommunication system
DOI:
https://doi.org/10.15587/2706-5448.2022.261874Keywords:
cyber security, radio-electronic environment, special purpose information and telecommunication system, operational managementAbstract
The increase in the number of cases of failure of information and telecommunication networks due to cyber attacks determines the need to protect them from this type of attacks. The issue of increasing cyber security in the conditions of conducting operations by groups of troops (forces) is very important. Due to the armed conflict in the East of Ukraine, the military-political instability in the Middle East, the struggle for influence on world financial and energy flows, the global military-political instability is intensifying. This is due to an increase in the number of communication devices in information and telecommunication networks, as well as an increase in the number of possible attacks that can be used to disrupt the operation of an information and telecommunication network. Considering the above, the object of research is a special purpose information and telecommunication system. The subject of research is cyber security of a special purpose information and telecommunication system. Classical methods of scientific knowledge, namely analysis and synthesis, were used during the research. The research identifies factors that affect cyber security in a special purpose information and telecommunications system. All this must be taken into account while planning and deploying a special purpose information and telecommunication system. The analysis of the consequences of the impact on the information and telecommunications system of special purpose of modern devices of defeat and the impact of devices of radio-electronic suppression and other factors was carried out. A typical special purpose information and telecommunication system does not fully meet the requirements for constant readiness to ensure the management of troops (forces), stability, mobility and throughput. A formalized description of the task of improving cyber security in a special purpose information and telecommunications network is provided. The components that affect the level of cyber security of the special purpose information and telecommunication network during the group's operations have been established. The impact of the specified conditions and factors must be reflected: in the planning documents during the planning of the deployment and operation of the group's information and telecommunications system; in the software, during operational management.
References
- Shishatckii, A. V., Bashkirov, O. M., Kostina, O. M. (2015). Rozvitok іntegrovanikh sistem zv’iazku ta peredachі danikh dlia potreb Zbroinikh Sil. Ozbroennia ta vіiskova tekhnіka, 1 (5), 35–40.
- Timchuk, S. (2017). Methods of Complex Data Processing from Technical Means of Monitoring. Path of Science, 3 (3), 4.1–4.9. doi: http://doi.org/10.22178/pos.20-4
- Sokolov, K. O., Gudima, O. P., Tkachenko, V. A., Shiiatii, O. B. (2015). Osnovnі napriami stvorennia ІT-іnfrastrukturi Mіnіsterstva oboroni Ukraini. Zbіrnik naukovikh pratc Tcentru voenno-strategіchnikh doslіdzhen, 3 (6), 26–30.
- Shevchenko, D. G. (2020). The set of indicators of the cyber security system in information and telecommunication networks of the armed forces of Ukraine. Suchasnі іnformatcіinі tekhnologіi u sferі bezpeki ta oboroni, 38 (2), 57‒62. doi: https://doi.org/10.33099/2311-7249/2020-38-2-57-62
- Makarenko, S. I. (2017). Perspektivy i problemnye voprosy razvitiia setei sviazi spetcialnogo naznacheniia. Sistemy upravleniia, sviazi i bezopasnosti, 2, 18–68.
- Zuiev, P., Zhyvotovskyi, R., Zvieriev, O., Hatsenko, S., Kuprii, V., Nakonechnyi, O. (2020). Development of complex methodology of processing heterogeneous data in intelligent decision support systems. Eastern-European Journal of Enterprise Technologies, 4 (9 (106)), 14‒23. doi: http://doi.org/10.15587/1729-4061.2020.208554
- Brownlee, J. (2011). Clever algorithms: nature-inspired programming recipes. LuLu, 441.
- Gorokhovatsky, V., Stiahlyk, N., Tsarevska, V. (2021). Combination method of accelerated metric data search in image classification problems. Advanced Information Systems, 5 (3), 5–12. doi: http://doi.org/10.20998/2522-9052.2021.3.01
- Meleshko, Y., Drieiev, O., Drieieva, H. (2020). Method of identification bot profiles based on neural networks in recommendation systems. Advanced Information Systems, 4 (2), 24–28. doi: https://doi.org/10.20998/2522-9052.2020.2.05
- Rybak, V. A., Akhmad, Sh. (2016). Analiticheskii obzor i sravnenie sushchestvuiushchikh tekhnologii podderzhki priniatiia reshenii. Sistemnyi analiz i prikladnaia informatika, 3, 12–18.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Oleg Sova
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.