To date, the most prominent examples of CPSs are
systems that provide the implementation of the
concept of smart home and the Internet of Things
(IoT), Industrial Control Systems (ICS), as well as
Supervisory Control And Data Acquisition
(SCADA). Geographically distributed CPSs include
traffic control and management systems. Examples of
local cyber-physical systems are the modern
automobile and sophisticated medical equipment.
Cyber-physical systems, being information
systems, are susceptible to the digital environment's
destructive factors - threats to information security. In
contrast to conventional information systems
designed to provide data processing, the main task of
CPSs is to manage and control the physical processes
of the real world. This defines a change in the
attackers' primary targets. For traditional information
systems, it is unauthorized access to protected
information and violation of data and services
availability. The main targets of attacks on CPSs are
to disrupt information flows within the system and
intercept the control of the actors (actuators). As a
result of changing the attackers' targets, the
consequences of successfully executed attacks
change as well. For information systems, this is
usually a financial and reputational loss. In the case
of CPSs, the damage can be quite different, ranging
from damage and destruction of technical facilities
and objects to harming human health and even
endangering human life. The situation is complicated
by the fact that targeted computer attacks using zero-
day vulnerabilities, social engineering, and specially
designed tools can be carried out against cyber-
physical systems. The complexity and heterogeneity
of CPSs, the presence of multiple cyber threats and
attackers with special means and high qualifications,
and great potential damage require the
implementation of a complex multipurpose
information security system.
The protection subsystem is a fully or partially
independent metasystem concerning the protected
and consists of a set of processes aimed at identifying
and neutralizing threats. At the same time, the
information security subsystem management process
should be viewed as even more high-level. Most of
the research focuses specifically on security
processes rather than on security management.
Simultaneously, in the absence of command decisions
adequate to the real situation, even the most perfect
system will not be able to achieve its targets with the
required indicators.
Another important issue is the selection and
justification of the requirements for the CPS
protection system. In this situation, it is necessary to
build a mathematical model of the system, which
would evaluate the prototype's characteristics even
before its creation. Currently, the prevailing approach
is to build models based on analysis. In their simpler
implementation, these solutions do not take into
account all the regularities and conditions of the
existence of the target processes within the system.
Thus, the implemented security systems do not have
the required properties and/or indicators and do not
provide the required security level.
Given the above, ensuring the secure functioning
of cyber-physical systems is a priority in the context
of their rapid development and widespread
deployment. At the same time, current approaches to
the organization and provision of the CPS safety
management processes do not allow achieving
management objectives with a guaranteed result. This
poses threats of unacceptable damage.
The purpose of this study is to develop a model of
the CPS safety management process that allows a
guaranteed result. A smart home was used as the
object on which the proposed approach was tested.
2 PROPOSED METHODOLOGY
At the heart of the management process is a
management decision. Any solution is built on the
basis of a control process or subsystem model. Thus,
if this model is not "good", it becomes impossible to
work out the right solution. What criteria does the
model have to meet? Its main and most important
property is adequacy. A model must sufficiently
account for the patterns and attributes of the objects
being reflected. When we talk about the management
process, which by definition is a continuum, it is
crucial to define its conditions of existence. Only with
the right solution to this problem is it possible to
achieve the management objectives. Whether it is a
human or an information management system, which
is ultimately the realization of the intentions of its
developers, the decision-maker has a conceptual and
logical apparatus used in problem-solving (Andreev,
Burlov and Grachev, 2019; Burlov, 2020). This
process is not an atomic operation but consists of the
following steps: decomposition, abstraction or
formalization, and aggregation (three-component
cognition). At the first stage, the problem is broken
down into separate complete blocks, which can be
solved using the system's methods. The formalization
process moves to a certain level of abstraction by
highlighting the properties and their evaluation
criteria required to solve each problem. The final step
is to process and merge the individual results
INFSEC 2021 - International Scientific and Practical Conference on Computer and Information Security
88