Cyber hygiene of the digital twin of the civil aviation occupational safety management system in the context of quantum transformation

Kayrat Koshekov, Baurzhan Bakirov, Almat Sakhov, Levchenko Nataliіa, Yuri Tanovitskiy, Abay Koshekov, Yakub Kurbanov, Rustam Togambayev

Abstract


The subject matter of this article is cyber hygiene of the digital twin of the occupational safety management system of engineering and technical personnel of civil aviation. The goal is to develop a methodology for assessing the cyber hygiene of the digital twin of the occupational safety management system of engineering and technical personnel of civil aviation in the context of transformation into the quantum future. The tasks: to develop a methodology for assessing the state of the digital twin of the occupational safety management system of engineering and technical personnel of civil aviation using an integral cyber hygiene index; to develop a model of transitions of the functional state of the digital twin, allowing to predict its cybersecurity, cyber vulnerability and recovery capabilities in case of cyber-attacks; to determine cyber hygiene measures for the digital twin in the context of quantum transformation. Results: a methodology for assessing the cyber hygiene of the digital twin of the occupational safety management system of engineering and technical personnel of civil aviation in the context of quantum transformation has been developed; it has been proven that the process of transition of the cyber hygiene system from one state to another, in response to the measures taken, is an iterative process, which allows dynamically monitoring the effectiveness of the taken measures on DT cyber hygiene and predicting its further state; algorithm for the sequence of stages of assessing the state of DT cyber hygiene and their relationship within a cyclic process has been developed. Conclusions: a method for assessing the state of DT cyber hygiene has been developed, which, due to its iterative nature and the use of Markov chains, allows determining the probability of the transition of the cyber hygiene system from one state to another, as a response to the measures taken. The application of this method in practice will allow dynamic monitoring of the cyber hygiene of the digital twin and the effectiveness of the measures taken, as well as predicting its future state.

Keywords


cyber hygiene; cyberspace; cyber security; cyber incidents; cyber-attacks; cyber well-being; cyber activity; cyber vulnerability

Full Text:

PDF

References


In the ranking of countries by cybersecurity, Kazakhstan took 78th place. Available at: https://kapital.kz/tehnology/118681/v-reytinge-stran-po-kiberbezopasnosti-rk-zanyala-78-ye-mesto.html (accessed 12.01.2025). (In Kazakhstan).

Domnin, S. Ne resheto, no sito. Naskolko uyazvim pered kiberatakami kazakhstanskii biznes [Not a sieve, but a sieve. How vulnerable is Kazakhstani business to cyberattacks]. Available at: https://kz.kursiv.media/2024-06-07/print1037-dmnn-cyber/ (accessed 12.01.2025). (In Kazakhstan).

160 vulnerable WordPress-based websites discovered in the Kazakhstani segment of the Internet. Available at: https://profit.kz/news/68209/V-Kazahstanskom-segmente-interneta-obnaruzheno-160-uyazvimih-sajtov-na-baze-WordPress (accessed 12.01.2025). (In Kazakhstan).

On approval of the Concept of digital transformation, development of the information and communication technology and cybersecurity industry for 2023-2029. Resolution of the Government of the Republic of Kazakhstan of March 28, 2023, no. 269. (In Kazakhstan).

Ghelani, D., Hua, T. K., & Koduru, S. K. R. Cyber Security Threats, Vulnerabilities, and Security Solutions Models in Banking. American Journal of Computer Science and Technology, 2022, vol. 10, pp. 1-9. DOI: 10.22541/au.166385206.63311335/v1.

Malatji, M. Industrial control systems cybersecurity: Back to basic cyber hygiene practices. Proceedings of the 2022 International Conference on Electrical, Computer and Energy Technologies, Prague, Czech Republic, IEEE, 2022, pp. 1-7. DOI: 10.1109/ICECET55527.2022.9872810.

Olivares-Rojas, J., Reyes-Archundia, E., Gutiérrez-Gnecchi, J. Molina Moreno, I., Mendez Patino, A., & Cerda Jacobo, J. Cyber Hygiene in Smart Metering Systems. Computación y Sistemas, 2023, vol. 27, no. 2, pp. 459–475 DOI: 10.13053/CyS-27-2-3894.

Esparza, J., Caporusso, N., & Walters, A. Addressing Human Factors in the Design of Cyber Hygiene Self-assessment Tools. Advances in Intelligent Systems and Computing, San Diego, CA, USA, Springer, 2020, vol. 1219, pp. 88-94. DOI: 10.1007/978-3-030-52581-1_12.

Karayel, T., & Akbıyık, A. Managing Cyber Security Risks and Cyber Hygiene in Organizations: Improving Cyber Resilience. Digital Transformation and Innovation in Emerging Markets. Digital Transformation and Innovation in Emerging Markets, 2025, pp. 205-226. DOI: 10.4018/979-8-3373-0086-3.ch010.

Kioskli, K., Fotis, T., Nifakos, S., & Mouratidis, H. The Importance of Conceptualising the Human-Centric Approach in Maintaining and Promoting Cybersecurity-Hygiene in Healthcare 4.0. Applied Sciences, 2023, vol. 13, no. 6, art. no. 3410. DOI: 10.3390/app13063410.

Fikry, A., Hamzah, M., Hussein, Z., Abdul, A., & Abu Bakar K. Defining the Beauty of Cyber Hygiene: A Retrospective Look. IEEE Engineering Management Review, 2024, vol. 52, no. 2, pp. 174-180. DOI: 10.1109/EMR.2024.3361023.

Cain, A. A., Edwards, M. E., & Still, J. D. An exploratory study of cyber hygiene behaviors and knowledge. Journal of Information Security and Applications, 2018, vol. 42, pp. 36–45. DOI: 10.1016/j.jisa.2018.08.002.

Böhm, F., Dietz, M., Preindl T., & Pernul, G. Augmented Reality and the Digital Twin: State-of-the-Art and Perspectives for Cybersecurity. Journal of Cybersecurity and Privacy, 2021, vol. 1, no. 3, pp. 519-538. DOI: 10.3390/jcp1030026.

Koshekov, K., Pirmanov, I., Alibekkyzy, K., Belginova, S., Karymsakova, I., Karmenova, M., & Baidildina, A. Digital twins technology in the educational process of the aviation equipment repair. Indonesian Journal of Electrical Engineering and Computer Science, 2023, vol. 32, no. 2, pp. 752-762. DOI: 10.11591/ijeecs.v32.i2.pp752-762.

Holmes, D., Papathanasaki, M., Maglaras, L., Ferrag, M., Nepal, S., & Janicke, H. Digital Twins and Cyber Security – solution or challenge? Proceedings of the 6th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference, Preveza, Greece, IEEE, 2021, pp. 1-8, DOI: 10.1109/SEEDA-CECNSM53056.2021.9566277.

Sarker, I., Janicke, H., Mohsin, A., Gill, A., & Maglaras, L. Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects. ICT Express, 2024, vol. 10, no. 4, pp. 935-958. DOI: 10.1016/j.icte.2024.05.007.

Ncubukezi, T., Mwansa, L., & Rocaries, F. A Review of the Current Cyber Hygiene in Small and Medium-sized Businesses. Proceedings of the 15th International Conference for Internet Technology and Secured Transactions, London, UK, IEEE, 2020, pp. 1-6. DOI: 10.23919/ICITST51030.2020.9351339.

Gupta, S., & Furnell, S. From Cybersecurity Hygiene to Cyber Well-Being. Lecture Notes in Computer Science, 2022, vol. 13333, pp. 124-134. DOI: 10.1007/978-3-031-05563-8_9.

Fuskele, A.J. Establishing IoT Cyber Hygiene Frameworks with Continuous Monitoring and Risk Assessment in Smart City Infrastructures. International Journal of Wireless and Ad Hoc Communication, 2023, vol. 7, no. 2, pp. 41-55. DOI: 10.54216/IJWAC.070203.

Digital Shield: 2023 CYBERSECURITY REVIEW. Cyber Digest. Available at: https://sts.kz/wp-content/uploads/2024/01/kiberdajdzhest-2023.pdf. (accessed 11.10.2024) (In Kazakhstan).

Mokhtar, R., & Rohaizat, A. Cybercrimes and Cyber Security Trends in the New Normal. The New Normal and Its Impact on Society, 2024, pp. 41-60. DOI: 10.1007/978-981-97-0527-6_4.

Gonçalves de Azambuja, A., Giese, T., Schützer, K., Anderl, R., Schleich, B., & Almeida, V. Digital Twins in Industry 4.0 – Opportunities and challenges related to Cyber Security. Procedia CIRP, 2024, vol. 121, pp. 25-30. DOI: 10.1016/j.procir.2023.09.225.

A New Deal for Aviation. Available at: https://www.itfglobal.org/en/resources/new-deal-aviation. (accessed 11.10.2024)

Number of workers employed in harmful and other unfavorable working conditions in 2023. Available at: https://stat.gov.kz/en/news/ (accessed 11.10.2024) (In Kazakhstan).

Transport of the Republic of Kazakhstan. Available at: https://stat.gov.kz/industries/business-statistics/stat-transport/ (accessed 11.10.2024) (In Kazakhstan).

Key labor indicators in the Republic of Kazakhstan. Available at: https://stat.gov.kz/industries/labor-and-income/stat-wags/ (accessed 11.10.2024) (In Kazakhstan).

On work-related injuries and occupational diseases in the Republic of Kazakhstan. Available at: https://stat.gov.kz/en/industries/social-statistics/stat-medicine/publications/ (accessed 11.10.2024) (In Kazakhstan).

Social Security Statistics. Available at: https://stat.gov.kz/industries/social-statistics/stat-medicine/ (accessed 11.10.2024) (In Kazakhstan).

On approval of the Concept of safe labor of the Republic of Kazakhstan for 2024 – 2030”. Resolution of the Government of the Republic of Kazakhstan of December 28, 2023 №1182. (In Kazakhstan).

Skarga-Bandurova, I., Kotsiuba, I., & Velasco, E. Cyber Hygiene Maturity Assessment Framework for Smart Grid Scenarios. Frontiers in Computer Science, 2021, vol. 3, article no. 614337. DOI: 10.3389/fcomp.2021.614337.

Editable CMMC & NIST 800-171 Policies, Standards & Procedures Templates. Available at: https://complianceforge.com/cmmc-nist-800-171-templates. (accessed 11.10.2024)

Deibert J. D. Toward a Human-Centric Approach to Cybersecurity. Ethics & International Affairs, 2018, vol. 32, no. 4, pp. 411-424. DOI: 10.1017/S0892679418000618.

Panda, S., Panaousis, E., Loukas, G., & Laoudias, C. Optimizing Investments in Cyber Hygiene for Protecting Healthcare Users. Lecture Notes in Computer Science, 2020, vol. 12065, pp. 268-291. DOI: 10.1007/978-3-030-41103-9_11.

Angelini, M., Bonomi, S., & Palma, A. A Methodology to Support Automatic Cyber Risk Assessment Review. ArXiv, 2022. DOI: 10.48550/arXiv.2207.03269.

Cryptographic Module Validation Program. Available at: https://csrc.nist.gov/projects/cryptographic-module-validation-program. (accessed 11.10.2024)

Hawdon, J. Cybercrime: Victimization, perpetration, and techniques. American Journal of Criminal Justice, 2021, vol. 46, pp. 837-842. DOI: 10.1007/s12103-021-09652-7.

Van Der Zee, S. Shifting the blame? Investigation of user compliance with digital payment regulations. The human factor in victimization, offending, and policing, 2021, pp. 61-78. DOI: 10.1007/978-3-030-60527-8_5.

Kamar, E., Howell, C. J., Maimon, D., & Berenblum, T. The moderating role of thoughtfully reflective decision-making on the relationship between information security messages and SMiShing victimization: An experiment. Justice Quarterly, 2022, vol. 40, no. 6, pp. 837-858. DOI: 10.1080/07418825.2022.2127845.

The Security of Self: A Human-centric Approach to Cybersecurity. Available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5046484#:~:text=This%20collection%20offers%20a%20new,of%20a%20secure%20cyber%20environment. (accessed 11.10.2024).

Al-Hawamleh, A. M. Predictions of Cybersecurity Experts on Future Cyber-Attacks and Related Cybersecurity Measures. International Journal of Advanced Computer Science and Applications, 2023, vol. 2(14), pp. 801-809. DOI: 10.14569/IJACSA.2023.0140292.

Kour, M., & Pierce, J. Cybersecurity Policies Implementation: A Theoretical Model Based on Process Thinking Perspective. Strengthening Industrial Cybersecurity to Protect Business Intelligence, 2024, pp. 149-179. DOI: 10.4018/979-8-3693-0839-4.ch007.

Kalhoro, S., Rehman, M., Ponnusamy V., & Shaikh F. Extracting Key Factors of Cyber Hygiene Behaviour Among Software Engineers: A Systematic Literature Review. IEEE Access, 2021, vol. 9, pp. 99339-99363. DOI: 10.1109/ACCESS.2021.3097144.

Ainakulov, Z., Pirmanov, I., Koshekov, K., Astapenko, N., Fedorov, I., Zuev, D., & Kurmankulova, G. Risk Assessment of the Operation of Aviation Maintenance Personnel Trained on Virtual Reality Simulators. Transport and Telecommunication, 2022, vol. 4(23), pp. 320-333. DOI: 10.2478/ttj-2022-0026.

Quantum technologies in defence & security. Available at: https://www.nato.int/docu/review/articles/2021/06/03/quantum-technologies-in-defence-security/index.html. (accessed 11.10.2024).

Howell, С., Maimon, D., Muniz, C., Kamar, E., & Berenblum, T. Engaging in cyber hygiene: the role of thoughtful decision-making and informational interventions. Frontiers in Psychology, 2024, vol. 15, DOI: 10.3389/fpsyg.2024.1372681.




DOI: https://doi.org/10.32620/reks.2025.1.16

Refbacks

  • There are currently no refbacks.