The objective of the study is to analyze the methods of describing a computer incident in the field of information security when identifying illegal events and testing cyber-physical systems to improve the quality of work with documentation when protecting cyber-physical systems. To achieve this goal, it is necessary to develop a format for describing incidents. For this purpose, regulatory documents were analyzed, types of computer incidents and their classification were identified, incident criteria were defined, and the degrees of criticality of the consequences when they occurred were identified. A document was developed to describe the incident. These studies are carried out in conjunction with work on developing methods for monitoring and testing the security of cyber-physical systems for automatic detection of illegal operation and (or) abnormal operation in a cyber-physical system. Based on the research results, an algorithm of actions and methods for identifying and preventing the consequences of computer incidents will be formed, due to which it will be possible to increase the security of cyber-physical systems.
Keywords: information security event, computer incident, information system, incident description, documentation generation, incident card, cybersecurity, cyber-physical system
The purpose of the study is to develop a platform that allows for various types of checks to identify weaknesses in the subsystems of unmanned automated systems.
Research methods: when developing the platform, a methodology based on the construction of ontological models was used, which made it possible to link the structural and functional characteristics of unmanned automated systems with threats and vulnerabilities, as well as with attacks on such systems. The process parallelization method was used to scan radio frequency ranges. The decision-making system is based on risk assessment methods.
Research results: the platform allows for optimizing the security testing process of unmanned automated systems. For automated testing, a database is used that includes a catalog of structural and functional characteristics, threats, vulnerabilities, and attacks. The platform can determine which types of structural and functional characteristics correspond to the vulnerabilities of unmanned automated systems. A system consisting of individual components (a sensor for scanning unmanned automated systems, an intelligent system for active analysis of unmanned automated systems). The sensor for scanning unmanned automated systems is implemented as a small-sized device. The system of intelligent active analysis of unmanned automated systems is implemented as software.
The scientific novelty lies in the development of a concept for a system for analyzing the safety of unmanned automated systems based on ontological models and radio frequency range analysis to identify system vulnerabilities during pre-operational checks.
Keywords: data analysis, statistics, attacks, risks, unmanned automated systems