EVALUATION OF ALTERNATIVE SOLUTIONS FOR THE EFFECTIVE STRUCTURE OF THE CYBER SECURITY SYSTEM IN CRITICAL INFORMATION INFRASTRUCTURES BY THE HIERARCHICAL ANALYSIS METHOD

10 fevral 2026

Xülasə

The subject matter of this article is the evaluation of alternative solutions for ensuring cyber security of critical information infrastructures and the selection of a more effective solution. The goal of the study is to create a cybersecurity system with an effective structure for critical information infrastructures. The tasks to be solved include determining the methods, tools, and measures to be included in the system. For this purpose, the hierarchical analysis method was used, and first of all, the decomposition of the problem was given and the corresponding hierarchical structure was compiled. On the basis of expert evaluations for each level of the hierarchical structure, pairwise comparison matrices of alternatives and priorities were constructed and their priority vectors were calculated sequentially. Taking into account the main priorities vector (Confidentiality, Integrity, Availability, Manageability), the degrees of importance of information protection measures (methods and means) were calculated and sorted according to the pairwise preference relations of alternative solutions obtained from the synthesis of the intermediate priorities vector (Physical Security, Network Security, Data Security, Application Security, Access Security). As a result of such a ranking, it is possible to determine which security measures should be given more importance to ensure the cyber security of critical information infrastructures. Conclusion. Thus, based on the hierarchical analysis method, it is possible to quantitatively evaluate alternative solutions for ensuring cyber security of critical information infrastructures, which allows for easy ranking of these solutions by degree of importance. As a result, an effective decision can be made about which methods are more important to include in the cyber security system, and which are relatively less important. The corresponding calculations and analyses were performed on the example of special purpose organizations based on a generalized hierarchical scheme of the cyber security system of critical infrastructures. Thus, the information infrastructure of one of the organizations producing special equipment was taken as the object of the study. According to the obtained results, it was determined that among the methods, means and measures of security, cryptographic and steganographic methods of data protection for this type of organization have higher degrees of importance than others.

Məzmun mövcud deyil.

EVALUATION OF ALTERNATIVE SOLUTIONS FOR THE EFFECTIVE STRUCTURE OF THE CYBER SECURITY SYSTEM IN CRITICAL INFORMATION INFRASTRUCTURES BY THE HIERARCHICAL ANALYSIS METHOD | BEU