The development of cyber intelligence as a new way of detecting information (information technology) objects in cyberspace is considered, its relationship with the OSI network model is shown, the development of cyber intelligence systems in everyday conditions is determined. Models of information technology object detection systems in the conditions of a complex electronic environment in the information space are presented.
Keywords: cyber intelligence, classification, cyberspace, detection, information and technical objects
The article discusses the use of cybernetic space for the detection of n-dimensional information technology objects and their subsequent identification. A conceptual model of a multidimensional intelligence and search system is presented, the intelligence cycle of searching for information and technical objects is described, as well as the relationship of radio intelligence with cybernetic intelligence.
Keywords: identification, information technology object, infosphere, cyberspace, detection, intelligence, intelligence cycle, recognizing
The article presents a method for quantifying the survivability of information technology objects, in relation to the means of software and hardware impact, including those based on assessing the ratio of direct and indirect risks, the ratio of the probability of catastrophic failures for a damaged and intact system. The necessity of increasing the survivability of information technology facilities to ensure security in the global cyberspace is grounded. It is also necessary to note that to ensure the required level of integrated survivability of an information technology object, it is necessary to protect them from software and hardware impacts in the global cyberspace. Information-technical objects with high cyber-defiance are gradually destroyed, while maintaining limited performance (combat capability with respect to military systems). This allows you to take protective measures, thereby reducing the effects of exposure mainly to primary damage from damage to the elements of an information technology object. Information and technical objects with low survivability are destroyed sharply and catastrophically, which is accompanied by significant secondary and cascade destruction, which are disproportionate (disproportionate) initiating software and hardware effects.
Keywords: survivability, information technology objects, the infosphere, cyber defensiveness, cybernetic weapons, software and hardware effects, the technosphere