DOI: https://doi.org/10.33099/2311-7249/2019-34-1-95-102

Features and main requirements for development and creating ciberpoligons

Yurii Danyk

Abstract


For the effective implementation of a set of measures to ensure information and cybernetic security in the cybernetic space with the development of measures to combat hybrid influences, the creation of cybernetic polygons that provide the opportunity to study complex cybernetic actions and training of cybernetic security specialists is proposed. The methodology of the development of methodological support for simulation on the cyber space of monitoring processes, analytical processing of information, forecasting, planning and implementation of passive and active counteraction to information and cybernetic threats in cybernetic space is proposed. It is proposed to take into account the features of the conditions of a priori uncertainty, the variability of the densities of flows of destructive influences and the significant dynamics of crisis situations, based on the application of situational control methods, fractal analysis, self-organization and bifurcation models. In the article the peculiarities of application of the principles of situational management of the software and hardware environment of the cybernetic polygon are considered, on which a set of measures and processes for ensuring information and cybernetic security in the cybernetic space and through cybernetic space is carried out. These processes are considered as dynamic and cyclic, having certain specifics, depending on the consideration of specific crisis situations in the selected list of necessary and sufficient elements from available and available components of the cybernetic site.


Keywords


cyber renge; cyber security; cybernetic incident; cybernetic space; cyber defense

References


1. Danyk Y. H., Hryshchuk R. V. Osnovy kibernetychnoyi bezpeky: monohrafiya; za zah. red. prof. YU. H. Danyka. Zhytomyr: ZHNAEU, 2016. 636 р.

2. Danyk Y. H. Osoblyvosti formuvannya systemy kibernetychnoyi bezpeky Ukrayiny v konteksti rozvytku systemy kibernetychnoyi bezpeky providnykh krayin svitu / Y. H. Danyk, Y. M. Suprunov // Trudy universytetu. – K. : NUOU. – 2011. – № 7(106).– S. 5–21.

3. Danyk Y. H., Vdovenko S. H. Kontseptualʹni napryamy kompleksnoho vyrishennya problemy zakhystu informatsiyi v systemi skrytoho upravlinnya zbroynykh syl. Suchasni informatsiyni tekhnolohiyi u sferi bezpeky ta oborony 2017. №2(29). S. 98–107.

4. Fundamentals of information protection – Textbook : Y.G.Danyk, S.G. Vdovenko, O.O. Pysarchuk and others; Korolyov Zhytomyr Military Institute, Zhytomyr, 2015.

5. Y. Danyk, T. Maliarchuk, Kohreidze; Hybrid War Technologies, international scientific journal “Business-Engineering, Georgian Technical University, Georgian Academy of Engineering, pp. 49-56, 2017. http://dspace.nplg.gov.ge/bitstream/1234/237163/1/Biznes-Injineringi_2017_N1-2.pdf.

6. Y. Danyk, T. Maliarchuk, Ch. Briggs, Hybrid War: High-tech, Information and Cyber Conflicts, Connections. The Quarterly Journal. vol. 16, no.2 2017, pp. 5–24. URL: http://www.jstor.org/stable/26326478.

7. Y. Danyk, S. Gudz, Special operations for disruption of state and military control system. Security and Defence Quarterly, published by War Studies University, Warsaw, Poland. № 4(9). 2015. URL: https://securityanddefence.pl/resources/html/article/details?id=124640. (дата звернення 27.04.2018).

8. Y. Danyk State Cyber Defense Formation and Development in Conditions of Hybrid Challenges and Threats. International Conference on Information and Telecommunication Technologies and Radio Electronics. September. 11-15, 2017. DOI: https://doi.org/10.1109/UkrMiCo.2017.8095427. (дата звернення 27.04.2018).

9. F.G. Hoffman, Hybrid Warfare and Challenges, Joint Forces Quarterly 52, 2009.

10.B. Boyer, Countering Hybrid Threats in Cyberspace. Cyber Defense Review. Vol. 2 Ed. 3, 2015.

11. S. Harris Cyberwar : The Fifth Theater of War. 2014.

12. J. Suler, The Online Disinhibition Effect. CyberPsychology and Behavior, №7, 2004.

13. A. Clarke Cyber War: The Next Threat to National Security and What to Do About It by Richard – http://indianstrategicknowledgeonline.com /web/Cyber_War_-_The_Nex_Threat_to_National_Security_and_What_to_Do_About_It_(Richard_A_Clarke)_(2010).pdf, 2010.

14. What Is Cyber Threat Intelligence , And Why You Need It. – https://blog.unloq.io/what-is-cyber-threat-intelligence-and-why-you-need-it-fd33e24954da. Jan 19, 2017.

15. Y.G. Danyk, Y.I. Katkov, M.F. Pichugin, National security: avoiding of critical situations. Monograph: National University of Defense of Ukraine, Korolyov Zhytomyr Military Institute, Zhytomyr, 2006


GOST Style Citations


1. Даник Ю. Г., Грищук Р. В. Основи кібернетичної безпеки: монографія; за заг. ред. проф. Ю. Г. Даника. Житомир: ЖНАЕУ, 2016. 636 с.

2. Даник Ю. Г. Особливості формування системи кібернетичної безпеки України в контексті розвитку системи кібернетичної безпеки провідних країн світу /  Ю. Г. Даник, Ю. М. Супрунов // Труди університету. – К. : НУОУ. – 2011. – № 7(106).– С. 5–21.

3. Даник Ю. Г., Вдовенко С. Г. Концептуальні напрями комплексного вирішення проблеми захисту інформації в системі скритого управління збройних сил. Сучасні інформаційні технології у сфері безпеки та оборони 2017. №2(29). С. 98–107.

4. Основи захисту інформації підручник: Ю.Г.Даник, С.Г. Вдовенко, О.О. Писарчук та ін; Житомирський військовий інститут ім. Корольова, Житомир, 2015 р.

5. Y. Danyk, T. Maliarchuk, Kohreidze; Hybrid War Technologies, international scientific journal “Business-Engineering, Georgian Technical University, Georgian Academy of Engineering, pp. 49-56, 2017. http://dspace.nplg.gov.ge/bitstream/1234/237163/1/Biznes-Injineringi_2017_N1-2.pdf.

6. Y. Danyk, T. Maliarchuk, Ch. Briggs, Hybrid War: High-tech, Information and Cyber Conflicts, Connections. The Quarterly Journal. vol. 16, no.2 2017, pp. 5–24. URL: http://www.jstor.org/stable/26326478.

7. Y. Danyk, S. Gudz, Special operations for disruption of state and military control system. Security and Defence Quarterly, published by War Studies University, Warsaw, Poland. № 4(9). 2015. URL: https://securityanddefence.pl/resources/html/article/details?id=124640. (дата звернення 27.04.2018).

8. Y. Danyk State Cyber Defense Formation and Development in Conditions of Hybrid Challenges and Threats. International Conference on Information and Telecommunication Technologies and Radio Electronics. September. 11-15, 2017. DOI: https://doi.org/10.1109/UkrMiCo.2017.8095427. (дата звернення 27.04.2018).

9. F.G. Hoffman, Hybrid Warfare and Challenges, Joint Forces Quarterly 52, 2009.

10. B. Boyer, Countering Hybrid Threats in Cyberspace. Cyber Defense Review. Vol. 2 Ed. 3, 2015.

11. S. Harris Cyberwar : The Fifth Theater of War. 2014.

12. J. Suler, The Online Disinhibition Effect.  CyberPsychology and Behavior, №7, 2004.

13. A. Clarke Cyber War: The Next Threat to National Security and What to Do About It by Richard – http://indianstrategicknowledgeonline.com /web/Cyber_War_-_The_Nex_Threat_to_National_Security_and_What_to_Do_About_It_(Richard_A_Clarke)_(2010).pdf, 2010.

14. What Is Cyber Threat Intelligence , And Why You Need It. – https://blog.unloq.io/what-is-cyber-threat-intelligence-and-why-you-need-it-fd33e24954da. Jan 19, 2017.

15. Y.G. Danyk, Y.I. Katkov, M.F. Pichugin, National security: avoiding of critical situations. Monograph: National University of Defense of Ukraine, Korolyov Zhytomyr Military Institute, Zhytomyr, 2006





ISSN 2410-7336 (Online)

ISSN 2311-7249 (Print)