IDEAS home Printed from https://ideas.repec.org/b/baq/pcbook/978-617-7319-31-2.redif.html
   My bibliography  Save this book

Synergy of building cybersecurity systems

Author

Listed:
  • Serhii Yevseiev

    (Simon Kuznets Kharkiv National University of Economics)

  • Volodymir Ponomarenko

    (Simon Kuznets Kharkiv National University of Economics)

  • Oleksandr Laptiev

    (State University of Telecommunications)

  • Oleksandr Milov

    (Simon Kuznets Kharkiv National University of Economics)

  • Olha Korol

    (Simon Kuznets Kharkiv National University of Economics)

  • Stanislav Milevskyi

    (Simon Kuznets Kharkiv National University of Economics)

  • Serhii Pohasii

    (Simon Kuznets Kharkiv National University of Economics)

  • Andrii Tkachov

    (Simon Kuznets Kharkiv National University of Economics)

  • Olexander Shmatko

    (National Technical University "Kharkiv Polytechnic Institute")

  • Yevgen Melenti

    (Yaroslav Mudryi National Law University)

  • Оleksandr Sievierinov

    (Kharkiv National University of Radio Electronics)

  • Sergey Ostapov

    (Yuriy Fedkovych Chernivtsi National University)

  • Alla Gavrilova

    (Simon Kuznets Kharkiv National University of Economics)

  • Oleksii Tsyhanenko

    (Simon Kuznets Kharkiv National University of Economics)

  • Sergey Herasimov

    (Ivan Kozhedub Kharkiv National Air Force University)

  • Elena Nyemkova

    (National University Lviv Polytechnic)

  • Bogdan Tomashevsky

    (Ternopil Ivan Puluj National Technical University)

  • Ivan Hrod

    (Ternopil Ivan Puluj National Technical University)

  • Ivan Opirskyy

    (Lviv Polytechnic National University)

  • Volodymyr Zvieriev

    (Kyiv National University of Trade and Economics)

  • Oleksandr Prokopenko

    (National Defence University of Ukraine named after Ivan Cherniakhovskyi)

  • Vitalii Savchenko

    (State University of Telecommunications)

  • Oleg Barabash

    (National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute")

  • Valentyn Sobchuk

    (State University of Telecommunications)

  • German Shuklin

    (State University of Telecommunications)

  • Vladyslav Khvostenko

    (Simon Kuznets Kharkiv National University of Economics)

  • Oleksandr Tymochko

    (Ivan Kozhedub Kharkiv National Air Force University)

  • Maksim Pavlenko

    (Ivan Kozhedub Kharkiv National Air Force University)

  • Andrii Trystan

    (Ivan Kozhedub Kharkiv National Air Force University)

  • Serhii Florov

    (National Technical University Dnipro Polytechnic)

Abstract

The development of the modern world community is closely related to advances in computing resources and cyberspace. The formation and expansion of the range of services is based on the achievements of mankind in the field of high technologies. However, the rapid growth of computing resources, the emergence of a full-scale quantum computer tightens the requirements for security systems not only for information and communication systems, but also for cyber-physical systems and technologies. The methodological foundations of building security systems for critical infrastructure facilities based on modeling the processes of behavior of antagonistic agents in security systems are discussed in the first chapter. The concept of information security in social networks, based on mathematical models of data protection, taking into account the influence of specific parameters of the social network, the effects on the network are proposed in second chapter. The nonlinear relationships of the parameters of the defense system, attacks, social networks, as well as the influence of individual characteristics of users and the nature of the relationships between them, takes into account. In the third section, practical aspects of the methodology for constructing post-quantum algorithms for asymmetric McEliece and Niederreiter cryptosystems on algebraic codes (elliptic and modified elliptic codes), their mathematical models and practical algorithms are considered. Hybrid crypto-code constructions of McEliece and Niederreiter on defective codes are proposed. They can significantly reduce the energy costs for implementation, while ensuring the required level of cryptographic strength of the system as a whole. The concept of security of corporate information and educational systems based on the construction of an adaptive information security system is proposed.

Suggested Citation

  • Serhii Yevseiev & Volodymir Ponomarenko & Oleksandr Laptiev & Oleksandr Milov & Olha Korol & Stanislav Milevskyi & Serhii Pohasii & Andrii Tkachov & Olexander Shmatko & Yevgen Melenti & Оleksandr Siev, 2021. "Synergy of building cybersecurity systems," Monographs, PC TECHNOLOGY CENTER, number 978-617-7319-31-2.redif, December.
  • Handle: RePEc:baq:pcbook:978-617-7319-31-2.redif
    DOI: 10.15587/978-617-7319-31-2
    as

    Download full text from publisher

    File URL: http://monograph.com.ua/pctc/catalog/view/64/52/231-1
    Download Restriction: no

    File URL: https://libkey.io/10.15587/978-617-7319-31-2?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:baq:pcbook:978-617-7319-31-2.redif. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Iryna Prudius (email available below). General contact details of provider: http://monograph.com.ua/pctc/catalog .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.