{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T00:07:41Z","timestamp":1723421261089},"reference-count":40,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T00:00:00Z","timestamp":1670803200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Ministry of Finance of the Russian Federation","award":["35\/21-d"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"This article substantiates the relevance of the development of a cognitive model for assessing the security of information systems for various purposes, designed to support decision-making by officials of information security management bodies. The article analyzes scientific papers and research in this area, formulates the requirements for the functional capabilities of the model, and investigates and identifies the most appropriate modeling tools, based on the symmetry property that develops from integrated ontological and neuro-Bayesian models; typical clusters of information systems; tactics and techniques for the implementation of information security threats through the vulnerabilities of objects at various levels of the International Organization of Standardization\/Open Systems Interconnection model (the ISO\/OSI model); protective influences; and attacking influences. This approach allowed us to identify such objects of influence and their current vulnerabilities and scenarios for the implementation of information security threats; to calculate the joint probability distribution of information security events of various origins; and to simulate the process of operational management of information security.<\/jats:p>","DOI":"10.3390\/sym14122631","type":"journal-article","created":{"date-parts":[[2022,12,13]],"date-time":"2022-12-13T07:59:01Z","timestamp":1670918341000},"page":"2631","source":"Crossref","is-referenced-by-count":0,"title":["Cognitive Model for Assessing the Security of Information Systems for Various Purposes"],"prefix":"10.3390","volume":"14","author":[{"given":"Vladimir V.","family":"Baranov","sequence":"first","affiliation":[{"name":"Department of \u201cInformation Security\u201d, M.I. Platov South Russian State Polytechnic University, 346428 Novocherkassk, Russia"}]},{"given":"Alexander A.","family":"Shelupanov","sequence":"additional","affiliation":[{"name":"Department of \u201cIntegrated Information Security of Electronic Computing Systems\u201d, Tomsk State University of Control Systems and Radioelectronics (TUSUR), 634034 Tomsk, Russia"}]}],"member":"1968","published-online":{"date-parts":[[2022,12,12]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"69714","DOI":"10.1109\/ACCESS.2022.3187001","article-title":"Multicriteria and Statistical Approach to Support the Outranking Analysis of the OECD Countries","volume":"10","author":"Pereira","year":"2022","journal-title":"IEEE Access"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"e20210011","DOI":"10.1590\/0103-6513.20210011","article-title":"Multi-criteria analysis applied to aircraft selection by Brazilian Navy","volume":"31","author":"Costa","year":"2021","journal-title":"Production"},{"unstructured":"Baranov, V.V. (2022, August 29). Certificate of State Registration of a Computer Program No. 2022616409 \u201cAutomated System for Developing a Model of Information Security Threats in an Organization\u201d (ASDM IST). Available online: https:\/\/fips.ru\/EGD\/d67bb7df-a7c2-478a-b2ad-aafa33200680.","key":"ref_3"},{"unstructured":"Russell, S., and Norvig, P. (2006). Artificial Intelligence: A Modern Approach, Williams Publishing House. [2nd ed.].","key":"ref_4"},{"unstructured":"(2022). Information Security, Cybersecurity and Privacy Protection\u2014Evaluation Criteria for IT Security\u2014Part 3: Security Assurance Components (Standard No. ISO\/IEC 15408-3). Available online: https:\/\/www.iso.org\/home.html.","key":"ref_5"},{"unstructured":"Giarratano, D. (2007). Expert Systems: Principles of Development and Programming, Williams Publishing House. [4th ed.].","key":"ref_6"},{"unstructured":"(2016). Information Technology-Security Techniques-Information Security Management Systems-Overview and Vocabulary (Standard No. ISO\/IEC 27000). Available online: https:\/\/pqm-online.com\/assets\/files\/pubs\/translations\/std\/iso-mek-27000-2016.pdf.","key":"ref_7"},{"unstructured":"(1994). Information Technology. Basic Reference Model: The Basic Model. Geneva 20 Switzerland (Standard No. ISO\/IEC STANDARD. 7498-1). Available online: https:\/\/www.ecma-international.org\/wp-content\/uploads\/s020269e.pdf.","key":"ref_8"},{"key":"ref_9","first-page":"88","article-title":"Predicting Destructive Malicious Impacts on the Subject of Critical Information Infrastructure","volume":"1395","author":"Baranov","year":"2021","journal-title":"Commun. Comput. Inf. Sci."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"02009","DOI":"10.1051\/e3sconf\/20186902009","article-title":"Intelligent support tools for strategic decision-making on Smart Grid development","volume":"69","author":"Massel","year":"2018","journal-title":"E3S Web Conf."},{"unstructured":"Kalinichenko, L.A. (2008). Issues of reconciliation of heterogeneous ontological models and ontological contexts. Ontological Modeling, IPI RAN.","key":"ref_11"},{"doi-asserted-by":"crossref","unstructured":"Singhal, A. (2017). Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs, Network Security Metrics.","key":"ref_12","DOI":"10.1007\/978-3-319-66505-4_3"},{"unstructured":"(2022, August 20). Advanced Modeling Using AgenaRisk. Available online: https:\/\/www.agenarisk.com.","key":"ref_13"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1096","DOI":"10.4236\/jsea.2014.713097","article-title":"Ontologies for Software Project Management: A Review","volume":"7","author":"Fitsilis","year":"2014","journal-title":"J. Softw. Eng. Appl."},{"unstructured":"(2022, August 20). Expert Hugin, Building a Bayesian Network. Available online: https:\/\/www.hugin.com\/wp-content\/uploads\/2016\/05\/Building-a-BN-Tutorial.pdf.","key":"ref_15"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1016\/j.giq.2018.09.008","article-title":"Mapping artificial intelligence problems in the public sector: Factual public health data","volume":"36","author":"Sun","year":"2019","journal-title":"Gov. Inf. Q."},{"doi-asserted-by":"crossref","unstructured":"Pawar, U., O\u2019Shea, D., Ri, S., and O\u2019Reilly, R. (2020, January 15\u201319). Explicable AI in healthcare. Proceedings of the 2020 International Conference on Cyber Situational Awareness, Data Analysis and Evaluation (CyberSA), Dublin, Ireland. Available online: https:\/\/www.researchgate.net\/publication\/342600571_Explainable_AI_in_Healthcare.","key":"ref_17","DOI":"10.1109\/CyberSA49311.2020.9139655"},{"doi-asserted-by":"crossref","unstructured":"Radanliev, P., and Roure, D.D. (2022, August 02). Disease Advancing the Cybersecurity of the Healthcare System with Self-Optimising and Self-Adaptative Artifcial Intelligence (Part 2) Health and Technology. Available online: https:\/\/link.springer.com\/article\/10.1007\/s12553-022-00691-6.","key":"ref_18","DOI":"10.1007\/s12553-022-00691-6"},{"doi-asserted-by":"crossref","unstructured":"Trumbach, C.C., McKesson, C., Ghandehari, P., De Can, L., and Eslinger, O. (2016). Innovation and Design Process Ontology. Anticipating Future Innovation Pathways through Large Data Analysis, Springer.","key":"ref_19","DOI":"10.1007\/978-3-319-39056-7_8"},{"unstructured":"Jaxen, F. (2001). Bayesian Networks and Decision Graphs, Sprinnger.","key":"ref_20"},{"unstructured":"Pearl, D. (2022, August 20). Laboratory of Cognitive Systems of the University of California, Los Angeles. Available online: http:\/\/bayes.cs.ucla.edu\/csl_papers.html.","key":"ref_21"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1016\/j.ecolind.2017.12.070","article-title":"Multiple criteria analysis of environmental sustainability and quality of life in post-soviet states","volume":"89","author":"Kaklauskas","year":"2018","journal-title":"Ecol. Indic."},{"doi-asserted-by":"crossref","unstructured":"Anikin, I.V. (2017, January 16\u201319). Using fuzzy logic for vulnerability assessment in telecommunication network. Proceedings of the 2017 International Conference on Industrial Engineering, Applications and Manufacturing, ICIEAM, St. Petersburg, Russia.","key":"ref_23","DOI":"10.1109\/ICIEAM.2017.8076444"},{"doi-asserted-by":"crossref","unstructured":"Katasev, A.S., Kataseva, D.V., and Emaletdinova, L.Y. (2016, January 19\u201320). Neuro-fuzzy model of complex objects approximation with discrete output. Proceedings of the 2nd International Conference on Industrial Engineering, Applications and Manufacturing, ICIEAM, Chelyabinsk, Russia.","key":"ref_24","DOI":"10.1109\/ICIEAM.2016.7911653"},{"doi-asserted-by":"crossref","unstructured":"Miah, S.J., Islam, H., and Samsudin, A.Z.H. (2016, January 8\u201310). Ontology Techniques for Representing the Problem of Discourse: Design of Solution Application Perspective. Proceedings of the IEEE International Conference on Computer and Information Technology (CIT), Nadi, Fiji.","key":"ref_25","DOI":"10.1109\/CIT.2016.115"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/jisp.2007100101","article-title":"An Ontology of Information Security","volume":"1","author":"Herzog","year":"2007","journal-title":"Int. J. Inf. Secur. Priv."},{"doi-asserted-by":"crossref","unstructured":"Al-Mohannadi, H., Mirza, Q., Namanya, A., Awan, I., Cullen, A., and Disso, J. (2016, January 22\u201324). Cyber-Attack Modeling Analysis Techniques: An Overview. Proceedings of the FiCloud 2016: IEEE 4th International Conference on Future Internet of Things and Cloud, Vienna, Austria.","key":"ref_27","DOI":"10.1109\/W-FiCloud.2016.29"},{"doi-asserted-by":"crossref","unstructured":"Hastie, T., Tibshirani, R., and Friedman, J. (2001). The Elements of Statistical Learning, Springer.","key":"ref_28","DOI":"10.1007\/978-0-387-21606-5"},{"doi-asserted-by":"crossref","unstructured":"Azar, A.T. (2010). Adaptive Neuro-Fuzzy Systems, IN-TECH. Fuzzy Systems.","key":"ref_29","DOI":"10.5772\/7220"},{"doi-asserted-by":"crossref","unstructured":"Moreira, M.\u00c2.L., de Ara\u00fajo Costa, I.P., Pereira, M.T., dos Santos, M., Gomes, C.F.S., and Muradas, F.M. (2021). PROMETHEE-SAPEVO-M1 a Hybrid Approach Based on Ordinal and Cardinal Inputs: Multi-Criteria Evaluation of Helicopters to Support Brazilian Navy Operations. Algorithms, 14.","key":"ref_30","DOI":"10.3390\/a14050140"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"647","DOI":"10.1287\/mnsc.31.6.647","article-title":"A preference ranking organization method: The PROMETHEE method for multiple criteria decisionmaking","volume":"31","author":"Brans","year":"1985","journal-title":"Manag. Sci."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1590\/0101-7438.2020.040.00226524","article-title":"SAPEVO-M: A group multicriteria ordinal ranking method","volume":"40","author":"Gomes","year":"2020","journal-title":"Pesqui. Oper."},{"key":"ref_33","first-page":"139","article-title":"Multicriteria ranking with ordinal data","volume":"27","author":"Gomes","year":"1997","journal-title":"Syst. Anal."},{"key":"ref_34","first-page":"381","article-title":"PROMETHEE-SAPEVO-M1 a hybrid modeling proposal: Multicriteria evaluation of drones for use in naval warfare","volume":"337","author":"Moreira","year":"2020","journal-title":"Proc. Int. Joint Conf. Ind. Eng. Oper. Manag."},{"unstructured":"Moreira, C.F.S., Santos, M.\u00c2.L., and Gomes, M.D. (2022, June 28). Promethee-Sapevo-M1 Software Web (V.1). Available online: http:\/\/promethee-sapevo.com.","key":"ref_35"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"012119","DOI":"10.1088\/1742-6596\/1661\/1\/012119","article-title":"Robot technological system of analysis of cybersecurity information systems and communication networks","volume":"1661","author":"Baranov","year":"2020","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1840","DOI":"10.3390\/sym12111840","article-title":"A Model of Threats to the Confidentiality of Information Processed in Cyberspace Based on the Information Flows Model","volume":"12","author":"Egoshin","year":"2020","journal-title":"Symmetry"},{"doi-asserted-by":"crossref","unstructured":"Koryshev, N., Hodashinsky, I., and Shelupanov, A. (2021). Building a fuzzy classifier based on whale optimization algorithm to detect network intrusions. Symmetry, 13.","key":"ref_38","DOI":"10.3390\/sym13071211"},{"doi-asserted-by":"crossref","unstructured":"Poltavtseva, M., Shelupanov, A., Bragin, D., Zegzhda, D., and Alexandrova, E. (2021). Key concepts of systemological approach to CPS adaptive information security monitoring. Symmetry, 13.","key":"ref_39","DOI":"10.3390\/sym13122425"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/978-3-030-32648-7_16","article-title":"Industrial Cyber-Physical Systems: Risks Assessment and Attacks Modeling","volume":"260","author":"Kravets","year":"2020","journal-title":"Stud. Syst. Decis. Control."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/14\/12\/2631\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,11]],"date-time":"2024-08-11T03:09:39Z","timestamp":1723345779000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/14\/12\/2631"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,12]]},"references-count":40,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2022,12]]}},"alternative-id":["sym14122631"],"URL":"https:\/\/doi.org\/10.3390\/sym14122631","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2022,12,12]]}}}