IMPROVEMENT OF PROTECTIVE EFFECTS ON DANGEROUS HIGH-FREQUENCY IMPRESSION SIGNALS

N. Zaika, V. Rakovych, M. Komarov, E. Laureyssens

Èlektron. model. 2024, 46(4):80-86

https://doi.org/10.15407/emodel.46.04.080

ABSTRACT

The paper examines the issue of risk management in critical infrastructure facilities, highlighting the analysis of existing approaches and methods used to assess negative threats. Particular attention is paid to the importance of using information technologies for data collection and processing, as well as to the complexity of developing a systematic risk management methodology. Tracking activity in social networks, analyzing browser history and other data allows you to analyze and track a person’s psychological and physical state. Having access to information about interests and personal issues gives attackers the opportunity to develop various types of influence, including pressure, blackmail and manipulation.

KEYWORDS

risk management, critical infrastructure objects, risk assessment methods, information technology, risk analysis, social engineering, espionage, information risk, cyber protection, personnel, control, recommendations.

REFERENCES

  1. Kuznetsova N.V. (2018). Financial risk management taking into account information risks. Data registration, storage and processing, T 20. No. 1, 30-40.
  2. Honcharenko E.O. (2019). Choosing an approach for assessing information security risks for retail enterprises. 92 p.
  3. Skachek L. M. (2013) The Value of Information in Information Security. Information Security, No. 1, 152-154.
    https://doi.org/10.1201/b15573-3
  4. Naumov V.Yu. (Adult education). (2014). The phenomenon of emotional burnout. Kyiv. 443.
  5. M.Yu., Gonchar S.F., Dimitrieva D.O. (2021). Study of the problem of cyber survivability of objects of critical information infrastructure. Nuclear and Radiation Safety, 59-65.
  6. Kireyenko O. (2017). The model of the violator in information and communication systems. Legal, regulatory and metrological support of the information protection system in Ukraine, T 2(34), 69-78.
  7. Ivanchenko S.O., Havrylenko O.V., Lipskyi O.O. (2016). Technical channels of information leakage. The procedure for creating complexes of technical information protection. Study guide of NTUU "KPI". NTUU "KPI". 104 p.
  8. Polishchuk Y., Hnatyuk S., Seilova N. (2015). Mass media as a channel of manipulative influence on society. Information security. T. 21. No. 3, 301-308.
  9. Zhurylenko B., Nikolayeva N., (2015). Determination of the coefficient of effectiveness of technical protection of information according to its parameters. Information security, T. 21. No. 3, 245-250.
    https://doi.org/10.18372/2225-5036.21.9687

Full text: PDF