The development of computing technologies has made it possible not only to expand the range of mobile communication services, but also to significantly increase computing capabilities. The emergence of mobile Internet, 4G, 5G technologies makes it possible to talk about a fundamentally different approach to ensuring the quality of service to network customers, creating fundamentally new approaches to ensuring the efficiency and reliability of transmitted information flows. However, such a rapid growth of GSM technologies without the introduction of security services leads to active actions of attackers and cyber terrorists, the emergence of new and modification of known threats. Mobile communication channels are used by cybercriminals for selfish purposes of access to database resources not only of the mobile Internet, but also to the databases of information and communication systems and networks. The article proposes a fundamentally new approach to ensuring the closure of the voice channel of the mobile Internet based on post-quantum cryptography algorithms – McEliece and Niederreiter crypto-code constructions on elliptic codes. This approach provides not only the offline mode of closing the voice channel and creating a VPN channel in tunnel mode, but also the required level of cryptographic strength in the face of the emergence of full-scale quantum computers.
The subject are the bounded rationality agents of cyber security system. The purpose of this work is is to build a classification system for agents of a cybersecurity system with limited rationality. The tasks: consideration of the decisionmaking process by agents in cybersecurity systems, analysis of various manifestations of bounded rationality of agents of the cybersecurity system, introduction of classification features of bounded rationality, formal presentation of bounded rationality of various types, combining agents with various types of bounded rationality into a whole classification system. Results. Presents approaches to the classification of the concept of rationality in relation to cybersecurity systems. Such types of rationality are considered as strong, semi-strong, weak. Further classification of types of rationality is carried out on the basis of the place of manifestation of rationality. For this, the decision-making process in the cybersecurity system has been considered, formal relations have been introduced, which characterize its various stages. Such types of bounded rationality as informational, methodological, predictive, evaluative and conditional are considered. The ratio of the considered types of rationality is presented. Conclusion: A comparison of various types of bounded rationality, based primarily on its place in the decision-making process, made it possible to propose a classification scheme of bounded rationality characteristic of agents of the cybersecurity system. The result of the formalization of the description of bounded rationality is presented, which can be used as the basis for the development of models of behavior of interacting agents of cybersecurity systems.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.