Scientific and Methodological bases of Complex Assessment of Threats and Damage to Information Systems of the Digital Economy

Full Text (PDF, 990KB), PP.23-38

Views: 0 Downloads: 0

Author(s)

Alovsat Garaja Aliyev 1,* Roza Ordukhan Shahverdiyeva 1

1. Institute of Information Technology of Azerbaijan National Academy of Sciences. AZ1141, Azerbaijan, Baku

* Corresponding author.

DOI: https://doi.org/10.5815/ijieeb.2022.02.02

Received: 10 Jan. 2022 / Revised: 14 Feb. 2022 / Accepted: 9 Mar. 2022 / Published: 8 Apr. 2022

Index Terms

Digital economy, digitalization, information infrastructure, information systems, information threats, level of economic security, cybersecurity, security technologies, Industrial 4.0 Revolution, expert assessments, fuzzy estimates of losses, complex asse

Abstract

The article examines the scientific and methodological basis of a comprehensive assessment of threats and damage to information systems of the digital economy. The information infrastructure and tasks of the digital economy have been defined. Sources of information security in the digital economy sectors and their information security requirements have been studied. The results of the analysis of the situation in the countries of the world on the Global Cyber security Index are shown schematically. The graph of the dynamics of cybersecurity expenditures in the ICT segments is shown. It is argued that cybersecurity, which is formed and developed through the use of digital systems, is a priority. Many goals and methods of cyber-attacks are given on the platform of the 4.0 Industrial revolution. Cases of information security violations in the digital economy and the processes of assessing the damage caused by them have been studied. Generalized criteria for assessing information damage in the digital economy have been proposed. Threats to information and communication systems and classification of damage are given. A structural scheme of the conceptual model of threats and damage to information systems and resources in the field of digital economy of Azerbaijan has been proposed. An expert description of the ways in which information threats are disseminated has been developed using a fuzzy approach. The main types of damage caused by threats to the security of information systems are given. The security aspects of the abundance and surplus of information in the digital economy are shown. The directions of increasing the level of security and confidence in the digital economy and the structures to ensure its security are given. The main directions of information security in the digital economy have been identified, the directions of ensuring its security and increasing its confidence have been identified. Commonly used universal base technologies have been proposed in the digital economy sectors. Some methodological approaches to integrated risk and damage assessment in the digital economy have been explored. A scientific-methodological approach based on fuzzy methods has been proposed for the implementation of complex risk and damage assessment in the digital economy.

Cite This Paper

Alovsat Garaja Aliyev, Roza Ordukhan Shahverdiyeva, "Scientific and Methodological bases of Complex Assessment of Threats and Damage to Information Systems of the Digital Economy", International Journal of Information Engineering and Electronic Business(IJIEEB), Vol.14, No.2, pp. 23-38, 2022. DOI:10.5815/ijieeb.2022.02.02

Reference

[1]Decree of the President of the Republic of Azerbaijan on Improving Governance in the Field of Digital Transformation. Baku, april 27, 2021. https://president.az/articles/51299.
[2]Decree of the President of the Republic of Azerbaijan on some measures to improve governance in the field of digitalization, innovation, high technologies and communications in the Republic of Azerbaijan. Baku, october 11, 2021. https://president.az/articles/53407.
[3]Nevmyvako V.P. Tsifrovaya ekonomika i Industriya 4.0: novyye vyzovy dlya malogo i srednego predprinimatel'stva. Problemy rynochnoy ekonomiki. 2021, №1, s.96-109.
[4]Uspayeva M.G., Gachayev A.M. Razvitiye struktury tsifrovoy ekonomiki v usloviyakh globalizatsii mirovoy ekonomiki. Economics: Yesterday, Today and Tomorrow, 2021, vol. 11, Is. 3A, pp. 92-101.
[5]Alguliyev R.M., İmamverdiyev Y.N., Mahmudov R.Sh. Information security as a national security component. Problems of Information Society, 2020, №1, pp.3-25.
[6]Grigor'yeva V.V., Strukov G.N., Slepokurova YU.I., Slepokurova A.A. Ekonomicheskaya bezopasnost' Rossiyskoy Federatsii: sovremennoye sostoyaniye, uroven' i ugrozy. Vestnik VGUIT. 2017, T.79, №3, s.238-252.
[7]Aliyev A.G. Directions and technologies to ensure cyber security in the information economy. IV Republican conference "Actual multidisciplinary scientific-practical problems of information security". Baku, december 14, 2018, pp.150-154.
[8]Aliyev A.G. Methodological aspects of estimation of ICT-based economic development. International Journal Management Dynamics in the Knowledge Economy. 2018, vol.6 no.2, pp.227-245
[9]Sidorov A., Senchenko P. Regional digital economy: Assessment of development levels. Mathematics 2020, 8(12), pp.21-43.
[10]Sarygulov A.I., Rapgof V.B. Problemy modernizatsii i perekhoda k innovatsionnoy ekonomike. Problemy sovremennoy ekonomiki, 2020, №2(74), s.1-4.
[11]Aliyev A.G., Shahverdiyeva R.O. Formation of technological innovation sectors of ICT-based economy and the aspects of their impact on socio-economic processes. Problems of Information Society, 2021, №1, PP.94-110.
[12]Tsifrovaya ekonomika: osnovnyye napravleniya razvitiya. Monografiya/Pod nauchnoy redaktsiyey N.V.Apatovoy. Simferopol', 2018.
[13]Vinze Ajay S., Raghu T. Information security in the knowledge economy. Int. J. Human-Computer Studies, 2007, 65, pp.1-2.
[14]Kargina L.A., Lebedeva S.L. Rol' informatsionnoy bezopasnosti v tsifrovoy ekonomike. Avtomatika, svyaz', informatika, 2021, №4, s.28-30.
[15]Boban, Marija. Information security and the right to privacy in digital economy- the case of republic of Croatia. Conference: 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).Croatia, may 26-30, 2014, pp.1503-1508.
[16]Varfolomeyev A.A.Osnovy informatsionnoy bezopasnosti. Moskva, 2008.
[17]Koroleva N.SH., Topunova I.R. Informatsionnaya bezopasnost' kak usloviye razvitiya tsifrovoy ekonomiki. Modern Economy Success, 2019, №3, s.110-116.
[18]Global Cybersecurity Index, 2020. International Telecommunication Union. ITUPublications. 172 p. https://www.itu.int/en/ITU-D/Cybersecurity/Pages/global-cybersecurity-index.aspx. https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2021-PDF-E.pdf.
[19]Ahmet Ali Süzen. A risk-assessment of cyber attacks and defense strategies in Industry 4.0 ecosystem. I.J.Computer Network and Information Security, 2020, 1, pp.1-12. DOI: 10.5815/ijcnis.2020.01.01
[20]Golovenchik G.G. Problemy kiberbezopasnosti v usloviyakh tsifrovoy transformatsii ekonomiki i obshchestva. Ekonomika. Upravleniye. Innovatsii, 2018, №2(4), s.23-33.
[21]Klimov S.M. Metodika otsenki vozmozhnogo ushcherba ot narusheniya bezopasnosti informatsii avtomatizirovannoy sistemy. Izvestiya YUFU. Tekhnicheskiye Nauki, 2003, №4, s.27-31.
[22]Aliyev A.G. Issues of complex assessment of damage to the security of information systems. I Republican Scientific-Practical Conference "Problems of Information Security". Baku, may 16-17, 2013, pp.71-74.
[23]Yazov YU.K., Grigor'yeva T.V. K voprosu o postroyenii yedinoy kolichestvennoy shkaly otsenok raznorodnykh ushcherbov ot realizatsii ugroz bezopasnosti informatsii v komp'yuternykh sistemakh. Informatsiya i bezopasnost', 2008, №1.
[24]Dzhabrailova L.KH. Informatsionnaya bezopasnost' kak prioritetnoye napravleniye razvitiya tsifrovoy ekonomiki. Monografiya, 2020, 118 s.
[25]Dubinin Ye.A., Kopytov V.V., Tebuyeva F.B. Obrabotka rezul'tatov ekspertnoy otsenki ushcherba informatsionnoy sisteme dlya vyvoda integral'noy funktsii prinadlezhnosti. Infokommunikatsionnyye tekhnologii, 2012, №1, s.89-96.
[26]Rosenko A.P., Avetisov R.S. Metodika otsenki velichiny ushcherba ot vozdeystviya na avtomatizirovannuyu informatsionnuyu sistemu vnutrennikh ugroz. Izvestiya SGU. 2006, №8, str.113-118.
[27]Grusho A.A., Grusho N.A., Zabezhaylo M.I., Timonina Ye.Ye. Metody otsenki zashchishchennosti komp'yuternykh sistem informatsionnoy podderzhki tsifrovoy ekonomiki. International Journal of Open Information Technologies, 2019, T.7, №4, s.61-66.
[28]Soshina O.N. Osnovnyye problemy obespecheniya urovnya ekonomicheskoy bezopasnosti regiona v tsifrovoy ekonomike. Ekonomika. Informatika, 2020, Tom 47, №1, pp.31-39.
[29]Modenov A.K., Vlasov M.P. Osobennosti ekonomicheskoy bezopasnosti v tsifrovoy ekonomike. Peterburgskiy ekonomicheskiy zhurnal, 2020, №2, s.121-134.
[30]Olad'ko V.S. Intsidenty setevoy bezopasnosti v sisteme tsifrovoy ekonomiki. Nauchnyy rezul'tat. Informatsionnyye tekhnologii, 2019, T.4, №4, s.19-30.
[31]Minzov A.S., Nevskiy A.YU., Baranov O.YU. Informatsionnaya bezopasnost' v tsifrovoy ekonomike. ZH., ITNOU, 2018, №3, s.52-59.
[32]Mamayeva L.N. Kharakternyye problemy informatsionnoy bezopasnosti v sovremennoy ekonomike. Nauchno-prakticheskiy zhurnal Informatsionnaya bezopasnost' regionov, 2016, №1(22), s.21-24.
[33]Svetlakov A.G., Glotina I.M. Vliyaniye informatsionnogo prostranstva na ekonomicheskuyu bezopasnost' regiona. Ekonomika regiona, 2018, T.14, vypusk 2, s.474-484.
[34]Petrenko S.A. Vyzovy i ugrozy bezopasnosti tsifrovoy ekonomiki Rossiyskoy Federatsii. Finansovo-ekonomicheskoye i informatsionnoye obespecheniye innovatsionnogo razvitiya regiona. Sbornik materialov Vserossiyskoy nauchno-prakticheskoy konferentsii, 2018, s.74-77.
[35]Mohammadinejad H., Mohammadhoseini F. Privacy protection in smart cities by a personal data management protocol in blockchain. I. J. Computer Network and Information Security, 2020, №3, pp.44-52.
[36]Lidong Wanga, Guanghui Wang. Big Data in cyber-physical systems, digital manufacturing and Industry 4.0. I.J. Engineering and Manufacturing, 2016, №4, pp.1-8.
[37]Volodymyr Tolubko, Viktor Vyshnivskyi, Vadym Mukhin, et al. Method for determination of cyber threats based on machine learning for real-time information system. I.J. Intelligent Systems and Applications, 2018, №8, pp.11-18.
[38]Rida Qayyum, Hina Ejaz. Data security in mobile cloud computing: A state of the art review. I.J. Modern Education and Computer Science, 2020, №2, pp.30-35.
[39]Mohamed Nazih Omri, Wafa Mribah. Towards an intelligent machine learning-based business approach. I.J. Intelligent Systems and Applications, 2022, №1, pp.1-23.
[40]Petrenko S.A. Kiberustoychivost' tsifrovoy ekonomiki. Kak obespechit' bezopasnost' i nepreryvnost' biznesa. Izdatel'skiy dom" Piter", 2021, s.384.