Conflict Analysis in the “Subject-to-Subject” Security System

Shevchenko, Svitlana and Zhdanova, Yuliia and Shevchenko, Halina and Nehodenko, Оlena and Spasiteleva, Svitlana (2023) Conflict Analysis in the “Subject-to-Subject” Security System. CPITS 2023: Workshop on Cybersecurity Providing in Information and Telecommunication Systems. pp. 56-66.

[thumbnail of Conflict Analysis in the “Subject-to-Subject” Security.pdf] PDF - Published Version
Download (634kB)

Анотація

The concept of conflict theory is widely used in various sectors of society. This study examines the problem of using the main provisions of the theory of conflicts in the field of information security. With the development of information technologies, the risk of information conflicts is increasing, which can create threats to the integrity, availability, and confidentiality of information, which determines the relevance and importance of this research. The presented work is a continuation of developments describing the applied aspects of the theory of conflict theory in information security systems through the interaction of data streams in the “subject—subject” perspective. It is proposed to analyze the problem at four levels: the level of the individual (criminal—user); business level (internal and/or external violator—company manager); state level (violators/hackers—state institutions, state officials); the level of international relations (states, a group of subjects/hackers—institutions and/or political leaders of another state). Each level is defined as a complex conflict system that has a corresponding structure and stages. It was determined that the main characteristics of an information conflict in cyberspace are: unlimited territory, globality, the problem of attribution, and the superiority of attack over defense. It is substantiated that information security systems have all the features of complex conflict systems, which implies the application of the mathematical theory of conflict, namely, the Lotka-Volterra “predator—predator” model and the conflict triad model. The innovative function of information conflict is determined. The concept of conflict theory is widely used in various sectors of society. This study examines the problem of using the main provisions of the theory of conflicts in the field of information security. With the development of information technologies, the risk of information conflicts is increasing, which can create threats to the integrity, availability, and confidentiality of information, which determines the relevance and importance of this research.

Тип файлу: Стаття
Ключові слова: conflict, information conflict, information security systems, cyber system, cyber conflict, conflict structure, conflict stages, mathematical model of conflict
Теми: За напрямами > Комп’ютерна наука і технологія
Підрозділи: Економічний факультет > Кафедра економіко-математичного моделювання та інформаційних технологій
Розмістив/ла: заввідділу Наталя Денисенко
Дата розміщення: 12 Кві 2024 09:16
Остання зміна: 12 Кві 2024 09:16
URI: https://eprints.oa.edu.ua/id/eprint/9108

Actions (login required)

Переглянути елемент Переглянути елемент