{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T20:16:24Z","timestamp":1762460184272,"version":"build-2065373602"},"reference-count":24,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2023,10,19]],"date-time":"2023-10-19T00:00:00Z","timestamp":1697673600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Data"],"abstract":"<jats:p>Cybersecurity social networking is a new scientific and engineering discipline that was interdisciplinary in its early days, but is now transdisciplinary. The issues of reviewing and analyzing of principal tasks related to information collection, monitoring of social networks, assessment methods, and preventing and combating cybersecurity threats are, therefore, essential and pending. There is a need to design certain methods, models, and program complexes aimed at estimating risks related to the cyberspace of social networks and the support of their activities. This study considers a risk to be the combination of consequences of a given event (or incident) with a probable occurrence (likelihood of occurrence) involved, while risk assessment is a general issue of identification, estimation, and evaluation of risk. The findings of the study made it possible to elucidate that the technique of cognitive modeling for risk assessment is part of a comprehensive cybersecurity approach included in the requirements of basic IT standards, including IT security risk management. The study presents a comprehensive approach in the field of cybersecurity in social networks that allows for consideration of all the elements that constitute cybersecurity as a complex, interconnected system. The ultimate goal of this approach to cybersecurity is the organization of an uninterrupted scheme of protection against any impacts related to physical, hardware, software, network, and human objects or resources of the critical infrastructure of social networks, as well as the integration of various levels and means of protection.<\/jats:p>","DOI":"10.3390\/data8100156","type":"journal-article","created":{"date-parts":[[2023,10,19]],"date-time":"2023-10-19T07:15:36Z","timestamp":1697699736000},"page":"156","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Cybersecurity Risk Assessments within Critical Infrastructure Social Networks"],"prefix":"10.3390","volume":"8","author":[{"given":"Alimbubi","family":"Aktayeva","sequence":"first","affiliation":[{"name":"Department of Information Systems and Informatics, Abay Myrzakhmetov Kokshetau University, Kokshetau 000002, Kazakhstan"}]},{"given":"Yerkhan","family":"Makatov","sequence":"additional","affiliation":[{"name":"Department of Information Security, L. N. Gumilyov Eurasian National University, Astana 010000, Kazakhstan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0342-5253","authenticated-orcid":false,"given":"Akku Kubigenova","family":"Tulegenovna","sequence":"additional","affiliation":[{"name":"Department of Information Systems, S. Seifullin Kazakh Agrotechnical University, Astana 010000, Kazakhstan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7785-8799","authenticated-orcid":false,"given":"Aibek","family":"Dautov","sequence":"additional","affiliation":[{"name":"Department of Information Systems and Informatics, Abay Myrzakhmetov Kokshetau University, Kokshetau 000002, Kazakhstan"}]},{"given":"Rozamgul","family":"Niyazova","sequence":"additional","affiliation":[{"name":"Department of Artificial Intelligence Technologies, L. N. Gumilyov Eurasian National University, Astana 010000, Kazakhstan"}]},{"given":"Maxud","family":"Zhamankarin","sequence":"additional","affiliation":[{"name":"Department of Information Systems and Informatics, Abay Myrzakhmetov Kokshetau University, Kokshetau 000002, Kazakhstan"}]},{"given":"Sergey","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Technologies, Sh. Ualikhanov Kokshetau University, Kokshetau 000002, Kazakhstan"}]}],"member":"1968","published-online":{"date-parts":[[2023,10,19]]},"reference":[{"key":"ref_1","unstructured":"(2023, October 16). Council Directive 2008\/114\/EC of 8 December 2008 on the Identification and Designation of European Critical Infrastructures and the Assessment of the Need to Improve Their Protection. Available online: https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A32008L0114&qid=1697471770811."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.ress.2016.02.009","article-title":"Challenges in the vulnerability and risk analysis of critical infrastructures","volume":"152","author":"Zio","year":"2016","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Haimes, Y.Y. (2008). Systems-Based Risk Analysis: Global Catastrophic Risks, Oxford University Press.","DOI":"10.1093\/oso\/9780198570509.003.0011"},{"key":"ref_4","unstructured":"(2012). Information technology\u2014Security Techniques\u2014Guidelines for Cybersecurity. Standard No. ISO\/IEC 27032:2012. Available online: https:\/\/www.iso.org\/ru\/standard\/44375.html."},{"key":"ref_5","unstructured":"(2012). Information Technology: Security Methods. Standard No. ISO\/IES 27032:2012."},{"key":"ref_6","unstructured":"(2018). Information Technology\u2014Security Techniques\u2014Information Security Risk Management. Standard No. ISO\/IEC 27005:2018."},{"key":"ref_7","first-page":"30","article-title":"Cybersecurity.Threats, Calls, Solutions","volume":"5","author":"Zgoba","year":"2014","journal-title":"Vopr. Kiberbezopasnosti"},{"key":"ref_8","first-page":"78","article-title":"Fuzzy Assessment of Information Security Risk Factors","volume":"23","author":"Anikin","year":"2016","journal-title":"IT Secur."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"61","DOI":"10.21681\/2311-3456-2016-4-61-71","article-title":"Scientific and methodological support of integrated risk management of violations of the security of functionally oriented information resources of information management systems","volume":"4","author":"Chucklyaev","year":"2016","journal-title":"Vopr. Kiberbezopasnosti"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"115383","DOI":"10.1016\/j.eswa.2021.115383","article-title":"A Software Defined Network information security risk assessment based on Pythagorean fuzzy sets","volume":"183","author":"Deb","year":"2021","journal-title":"Expert Syst. Appl. Int. J."},{"key":"ref_11","first-page":"49","article-title":"Analysis of methods and tools which are used in the various stages of information security risk assessment","volume":"4","author":"Mikov","year":"2014","journal-title":"Vopr. Kiberbezopasnosti"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"8","DOI":"10.21681\/2311-3456-2017-3-8-15","article-title":"Ensuring consistency and adequacy of assessment of information security risk factors","volume":"3","author":"Buldakova","year":"2017","journal-title":"Vopr. Kiberbezopasnosti"},{"key":"ref_13","unstructured":"(2016). Information Technology\u2014Security Techniques\u2014Information Security. Management\u2014Monitoring, Measurement, Analysis. Standard No. ISO\/IEC 27004:2016."},{"key":"ref_14","unstructured":"(2013). Information Technologies. Security Methods. Information Security Risk Management. Standard No. ST RK ISO\/IEC 27005-2013."},{"key":"ref_15","unstructured":"(2019). Risk Management\u2014Risk Assessment Techniques. Standard No. IEC 31010:2019. Available online: https:\/\/www.iso.org\/standard\/72140.html."},{"key":"ref_16","unstructured":"Fung, C.C., Akbari Roumani, M., and Wong, K.P. (2013). IEEE Power & Energy Society General Meeting, IEEE."},{"key":"ref_17","first-page":"67","article-title":"Information security management: Basic concepts","volume":"1","author":"Dorofeev","year":"2014","journal-title":"Vopr. Kiberbezopasnosti"},{"key":"ref_18","unstructured":"Rot, A. (2008, January 22\u201424). IT Risk Assessment: Quantitative and Qualitative Approach. Proceedings of the World Congress on Engineering and Computer Science 2008, (WCECS 2008), San Francisco, CA, USA. Available online: https:\/\/www.researchgate.net\/publication\/44262457_IT_Risk_Assessment_Quantitative_and_Qualitative_Approach."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Aven, T. (2011). Quantitative Risk Assessment: The Scientific Platform, Cambridge University Press.","DOI":"10.1017\/CBO9780511974120"},{"key":"ref_20","unstructured":"Neural Network Toolbox (2023, October 16). User\u2019s Guide. Version 4, 2002. The Math Works. Available online: http:\/\/cda.psych.uiuc.edu\/matlab_pdf\/nnet.pdf."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"149","DOI":"10.18287\/2223-9537-2016-6-2-149-161","article-title":"Fractal approach to knowledge structuring and examples of its application","volume":"6","author":"Massel","year":"2016","journal-title":"Des. Ontol."},{"key":"ref_22","first-page":"159","article-title":"Application of risk-based approach to identify critical facilities in the energy sector with regard to cyber threats","volume":"Volume 1","author":"Massel","year":"2017","journal-title":"Proceedings of the 19th International Workshop on Computer Science and Information Technologies"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Maglaras, L., Janicke, H., and Ferrag, M.A. (2022). Cybersecurity of Critical Infrastructures: Challenges and Solutions. Sensors, 22.","DOI":"10.3390\/s22145105"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"3383251","DOI":"10.1155\/2022\/3383251","article-title":"Information Security Risk Management Model for Big Data","volume":"2022","author":"Yang","year":"2022","journal-title":"Adv. Multimed."}],"container-title":["Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2306-5729\/8\/10\/156\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T21:09:46Z","timestamp":1760130586000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2306-5729\/8\/10\/156"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,19]]},"references-count":24,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2023,10]]}},"alternative-id":["data8100156"],"URL":"https:\/\/doi.org\/10.3390\/data8100156","relation":{},"ISSN":["2306-5729"],"issn-type":[{"type":"electronic","value":"2306-5729"}],"subject":[],"published":{"date-parts":[[2023,10,19]]}}}