dc.contributor.author |
Aktayeva, Alimbubi |
|
dc.contributor.author |
Makatov, Yerkhan |
|
dc.contributor.author |
Kubigenova, Akku Tulegenovna |
|
dc.contributor.author |
Dautov, Aibek |
|
dc.contributor.author |
Niyazova, Rozamgul |
|
dc.contributor.author |
Zhamankarin, Maxud |
|
dc.contributor.author |
Khan, Sergey |
|
dc.date.accessioned |
2024-11-22T07:33:54Z |
|
dc.date.available |
2024-11-22T07:33:54Z |
|
dc.date.issued |
2023 |
|
dc.identifier.citation |
Aktayeva, A.; Makatov, Y.; Tulegenovna, A.K.; Dautov, A.; Niyazova, R.; Zhamankarin, M.; Khan, S. Cybersecurity Risk Assessments within Critical Infrastructure Social Networks. Data 2023, 8, 156. https://doi.org/ 10.3390/data8100156 |
ru |
dc.identifier.issn |
2823-3379 |
|
dc.identifier.other |
doi.org/ 10.3390/data8100156 |
|
dc.identifier.uri |
http://rep.enu.kz/handle/enu/19218 |
|
dc.description.abstract |
Cybersecurity social networking is a new scientific and engineering discipline that was interdisciplinary in its early days, but is now transdisciplinary. The issues of reviewing and analyzing of
principal tasks related to information collection, monitoring of social networks, assessment methods,
and preventing and combating cybersecurity threats are, therefore, essential and pending. There is a
need to design certain methods, models, and program complexes aimed at estimating risks related to
the cyberspace of social networks and the support of their activities. This study considers a risk to be
the combination of consequences of a given event (or incident) with a probable occurrence (likelihood
of occurrence) involved, while risk assessment is a general issue of identification, estimation, and
evaluation of risk. The findings of the study made it possible to elucidate that the technique of
cognitive modeling for risk assessment is part of a comprehensive cybersecurity approach included in
the requirements of basic IT standards, including IT security risk management. The study presents a
comprehensive approach in the field of cybersecurity in social networks that allows for consideration
of all the elements that constitute cybersecurity as a complex, interconnected system. The ultimate
goal of this approach to cybersecurity is the organization of an uninterrupted scheme of protection
against any impacts related to physical, hardware, software, network, and human objects or resources
of the critical infrastructure of social networks, as well as the integration of various levels and means
of protection. |
ru |
dc.language.iso |
en |
ru |
dc.publisher |
Data |
ru |
dc.relation.ispartofseries |
8, 156; |
|
dc.subject |
fractal characteristics |
ru |
dc.subject |
self-similarity |
ru |
dc.subject |
social network security |
ru |
dc.subject |
network anomaly detection |
ru |
dc.subject |
social network security |
ru |
dc.subject |
network anomaly detection |
ru |
dc.subject |
social network traffic |
ru |
dc.subject |
risk assessment |
ru |
dc.title |
Cybersecurity Risk Assessments within Critical Infrastructure Social Networks |
ru |
dc.type |
Article |
ru |