DSpace Repository

Cybersecurity Risk Assessments within Critical Infrastructure Social Networks

Show simple item record

dc.contributor.author Aktayeva, Alimbubi
dc.contributor.author Makatov, Yerkhan
dc.contributor.author Kubigenova, Akku Tulegenovna
dc.contributor.author Dautov, Aibek
dc.contributor.author Niyazova, Rozamgul
dc.contributor.author Zhamankarin, Maxud
dc.contributor.author Khan, Sergey
dc.date.accessioned 2024-11-22T07:33:54Z
dc.date.available 2024-11-22T07:33:54Z
dc.date.issued 2023
dc.identifier.citation Aktayeva, A.; Makatov, Y.; Tulegenovna, A.K.; Dautov, A.; Niyazova, R.; Zhamankarin, M.; Khan, S. Cybersecurity Risk Assessments within Critical Infrastructure Social Networks. Data 2023, 8, 156. https://doi.org/ 10.3390/data8100156 ru
dc.identifier.issn 2823-3379
dc.identifier.other doi.org/ 10.3390/data8100156
dc.identifier.uri http://rep.enu.kz/handle/enu/19218
dc.description.abstract Cybersecurity social networking is a new scientific and engineering discipline that was interdisciplinary in its early days, but is now transdisciplinary. The issues of reviewing and analyzing of principal tasks related to information collection, monitoring of social networks, assessment methods, and preventing and combating cybersecurity threats are, therefore, essential and pending. There is a need to design certain methods, models, and program complexes aimed at estimating risks related to the cyberspace of social networks and the support of their activities. This study considers a risk to be the combination of consequences of a given event (or incident) with a probable occurrence (likelihood of occurrence) involved, while risk assessment is a general issue of identification, estimation, and evaluation of risk. The findings of the study made it possible to elucidate that the technique of cognitive modeling for risk assessment is part of a comprehensive cybersecurity approach included in the requirements of basic IT standards, including IT security risk management. The study presents a comprehensive approach in the field of cybersecurity in social networks that allows for consideration of all the elements that constitute cybersecurity as a complex, interconnected system. The ultimate goal of this approach to cybersecurity is the organization of an uninterrupted scheme of protection against any impacts related to physical, hardware, software, network, and human objects or resources of the critical infrastructure of social networks, as well as the integration of various levels and means of protection. ru
dc.language.iso en ru
dc.publisher Data ru
dc.relation.ispartofseries 8, 156;
dc.subject fractal characteristics ru
dc.subject self-similarity ru
dc.subject social network security ru
dc.subject network anomaly detection ru
dc.subject social network security ru
dc.subject network anomaly detection ru
dc.subject social network traffic ru
dc.subject risk assessment ru
dc.title Cybersecurity Risk Assessments within Critical Infrastructure Social Networks ru
dc.type Article ru


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Browse

My Account