Industrial Control Systems (ICS) cyber prediction model /
Peržiūrėti/ Atidaryti
Data
2023.Autorius
Katina, Joana,
Plėta, Tomas,
Petkevičius, Romualdas,
Lelešienė, Lina,
Metaduomenys
Rodyti detalų aprašąSantrauka
Acceleration of scientific and technical progress, speeding up of technological changes, IT process globalisation and integration of OT processes invoked new challenges in preparing cyber strategies. Issues with adapting strategy for a particular specificity, region and specific cyber-attacks are not applicable. Therefore, a natural need arises to adjust the process for future cyber-attacks. It should be noted that the vast majority of organisations still need to possess a strategy that has been developed in correlation with future cyber-attacks. A part of organisations, irrespective of the lack of methodology and necessary infrastructure at the initial stage, commenced applying strategic management methods as a more dynamic environment demanded adequate changes in the cyber security within the organisation itself. The organisation started to plan such changes because, at the initial stage of the strategic management theory development, the strategy was understood as a plan drawn up to achieve the set objectives, regardless of the future need. Implementing such strategic procedures is grounded on something other than scientific calculations and is often associated with excessive use of funds. Therefore, the main goal of this article is to determine how much the r-Interdiction Median Problem with Fortification (RIMF) module can be used as a model for deciding methods for protecting critical infrastructure systems.