IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Critical Aviation Information Systems: Identification and Protection

Critical Aviation Information Systems: Identification and Protection
View Sample PDF
Author(s): Sergiy Gnatyuk (National Aviation University, Ukraine), Zhengbing Hu (Central China Normal University, China), Viktoriia Sydorenko (National Aviation University, Ukraine), Marek Aleksander (State Higher Vocational School in Nowy Sącz, Poland), Yuliia Polishchuk (National Aviation University, Ukraine)and Khalicha Ibragimovna Yubuzova (Satbayev University, Kazakhstan)
Copyright: 2021
Pages: 26
Source title: Research Anthology on Reliability and Safety in Aviation Systems, Spacecraft, and Air Transport
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-7998-5357-2.ch013

Purchase

View Critical Aviation Information Systems: Identification and Protection on the publisher's website for pricing and purchasing information.

Abstract

This chapter is devoted to developing formalization methods for identification and security objects of critical information infrastructure (CII) in civil aviation. The analysis of modern approaches to the CII identification was carried out that gave a possibility to determine weaknesses and to formalize a scientific researches task. As a result, the unified data model was developed for formalizing the process of a list of CII objects forming in certain field and at the state level. Moreover, the specialized technique was developed. Besides, the identification method was proposed, and it gives a possibility to determine elements of CII field, mutual influences, and influence on functional operations of critical aviation information system. Furthermore, special software was developed and implemented that can be useful for CII elements identification and also for determining its influences on functional operations. Also, the basic aspects of cybersecurity ensuring for identified critical aviation information system were described in this chapter.

Related Content

Suthagar S., Gopalakrishnan K., Kumaran T., Praveen Kumar. © 2022. 25 pages.
Surekha Rathi Samundi D.. © 2022. 29 pages.
Kaliappan S., Raj Kamal M. D., Balaji V., Socrates S., Andrii Kondratiev. © 2022. 18 pages.
Kumaran T., Sivarasan E. N.. © 2022. 14 pages.
Madhankumar G., Mothilal T., Kumar K. M., Muralidharan G., Mala D.. © 2022. 41 pages.
Kaliappan S., Raj Kamal M. D., Joseph Manuel D., Balaji V., Murugan P.. © 2022. 13 pages.
Suresh Chinnasamy, Paramaguru Venugopal, Ramesh Kasimani. © 2022. 15 pages.
Body Bottom