{"title":"A元图模型。网络防护","authors":"Emiliya Koleva, Evgeni Andreev, M. Nikolova","doi":"10.53656/math2022-2-7-ame","DOIUrl":null,"url":null,"abstract":"The aim of this article is to present a developed metagraph model which serves to verify the minimum requirements for cyber security in web-based student information management systems. The model presents the correlation between cyber attacks and cyber defense of the system. The protection is based on a created model for cybersecurity 3-12 and is divided into 3 categories – software, server and information system users. The most common 9 cyber attacks on automated information systems have been selected. Twelve countermeasures to these attacks have been selected. The application of the metagraph model is used to check whether the system meets the requirements of the model 3-12. The developed information system has been tested in foreign language training of students at Nikola Vaptsarov Naval Academy. The developed metagraph model can be applied to other information systems.","PeriodicalId":41818,"journal":{"name":"Mathematics and Informatics","volume":null,"pages":null},"PeriodicalIF":0.2000,"publicationDate":"2022-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Metagraph Model оf Cyber Protection оf аn Information System\",\"authors\":\"Emiliya Koleva, Evgeni Andreev, M. Nikolova\",\"doi\":\"10.53656/math2022-2-7-ame\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The aim of this article is to present a developed metagraph model which serves to verify the minimum requirements for cyber security in web-based student information management systems. The model presents the correlation between cyber attacks and cyber defense of the system. The protection is based on a created model for cybersecurity 3-12 and is divided into 3 categories – software, server and information system users. The most common 9 cyber attacks on automated information systems have been selected. Twelve countermeasures to these attacks have been selected. The application of the metagraph model is used to check whether the system meets the requirements of the model 3-12. The developed information system has been tested in foreign language training of students at Nikola Vaptsarov Naval Academy. The developed metagraph model can be applied to other information systems.\",\"PeriodicalId\":41818,\"journal\":{\"name\":\"Mathematics and Informatics\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.2000,\"publicationDate\":\"2022-04-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Mathematics and Informatics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.53656/math2022-2-7-ame\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"EDUCATION & EDUCATIONAL RESEARCH\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Mathematics and Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.53656/math2022-2-7-ame","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"EDUCATION & EDUCATIONAL RESEARCH","Score":null,"Total":0}
A Metagraph Model оf Cyber Protection оf аn Information System
The aim of this article is to present a developed metagraph model which serves to verify the minimum requirements for cyber security in web-based student information management systems. The model presents the correlation between cyber attacks and cyber defense of the system. The protection is based on a created model for cybersecurity 3-12 and is divided into 3 categories – software, server and information system users. The most common 9 cyber attacks on automated information systems have been selected. Twelve countermeasures to these attacks have been selected. The application of the metagraph model is used to check whether the system meets the requirements of the model 3-12. The developed information system has been tested in foreign language training of students at Nikola Vaptsarov Naval Academy. The developed metagraph model can be applied to other information systems.