EconPapers    
Economics at your fingertips  
 

Cybersecurity Risk Assessments within Critical Infrastructure Social Networks

Alimbubi Aktayeva (), Yerkhan Makatov, Akku Kubigenova Tulegenovna, Aibek Dautov, Rozamgul Niyazova, Maxud Zhamankarin and Sergey Khan
Additional contact information
Alimbubi Aktayeva: Department of Information Systems and Informatics, Abay Myrzakhmetov Kokshetau University, Kokshetau 000002, Kazakhstan
Yerkhan Makatov: Department of Information Security, L. N. Gumilyov Eurasian National University, Astana 010000, Kazakhstan
Akku Kubigenova Tulegenovna: Department of Information Systems, S. Seifullin Kazakh Agrotechnical University, Astana 010000, Kazakhstan
Aibek Dautov: Department of Information Systems and Informatics, Abay Myrzakhmetov Kokshetau University, Kokshetau 000002, Kazakhstan
Rozamgul Niyazova: Department of Artificial Intelligence Technologies, L. N. Gumilyov Eurasian National University, Astana 010000, Kazakhstan
Maxud Zhamankarin: Department of Information Systems and Informatics, Abay Myrzakhmetov Kokshetau University, Kokshetau 000002, Kazakhstan
Sergey Khan: Department of Information and Communication Technologies, Sh. Ualikhanov Kokshetau University, Kokshetau 000002, Kazakhstan

Data, 2023, vol. 8, issue 10, 1-18

Abstract: Cybersecurity social networking is a new scientific and engineering discipline that was interdisciplinary in its early days, but is now transdisciplinary. The issues of reviewing and analyzing of principal tasks related to information collection, monitoring of social networks, assessment methods, and preventing and combating cybersecurity threats are, therefore, essential and pending. There is a need to design certain methods, models, and program complexes aimed at estimating risks related to the cyberspace of social networks and the support of their activities. This study considers a risk to be the combination of consequences of a given event (or incident) with a probable occurrence (likelihood of occurrence) involved, while risk assessment is a general issue of identification, estimation, and evaluation of risk. The findings of the study made it possible to elucidate that the technique of cognitive modeling for risk assessment is part of a comprehensive cybersecurity approach included in the requirements of basic IT standards, including IT security risk management. The study presents a comprehensive approach in the field of cybersecurity in social networks that allows for consideration of all the elements that constitute cybersecurity as a complex, interconnected system. The ultimate goal of this approach to cybersecurity is the organization of an uninterrupted scheme of protection against any impacts related to physical, hardware, software, network, and human objects or resources of the critical infrastructure of social networks, as well as the integration of various levels and means of protection.

Keywords: fractal characteristics; self-similarity; social network security; network anomaly detection; social network traffic; critical social network infrastructure; risk assessment (search for similar items in EconPapers)
JEL-codes: C8 C80 C81 C82 C83 (search for similar items in EconPapers)
Date: 2023
References: View references in EconPapers View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/2306-5729/8/10/156/pdf (application/pdf)
https://www.mdpi.com/2306-5729/8/10/156/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jdataj:v:8:y:2023:i:10:p:156-:d:1263099

Access Statistics for this article

Data is currently edited by Ms. Cecilia Yang

More articles in Data from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jdataj:v:8:y:2023:i:10:p:156-:d:1263099