Next Article in Journal
Pervious Pavement Blocks Made from Recycled Polyethylene Terephthalate (PET): Fabrication and Engineering Properties
Next Article in Special Issue
Setbacks to IoT Implementation in the Function of FMCG Supply Chain Sustainability during COVID-19 Pandemic
Previous Article in Journal
Gob-Side Entry Retaining Involving Bag Filling Material for Support Wall Construction
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Educational Model for Evaluation of Airport NIS Security for Safe and Sustainable Air Transport

1
Faculty of Aeronautics, Technical University of Kosice, 04121 Kosice, Slovakia
2
Faculty of Information Technologies, Uzhhorod National University, 88000 Uzhhorod, Ukraine
3
Research and Innovation Centre Bioinformatics, USP TECHNICOM, FBERG, Technical University of Košice, 04001 Kosice, Slovakia
4
School of Astronautics, Beihang University, Haidian District, Beijing 100191, China
5
Faculty of Physics, National Kapodistrian University of Athens, GR-15784 Athens, Greece
6
Faculty of Mathematics, Physics and Informatics, Comenius University in Bratislava, Bratislava, 84248 Mlynská Dolina, Slovakia
7
Faculty of Transport, Silesian University of Technology, 44100 Gliwice, Poland
*
Author to whom correspondence should be addressed.
Sustainability 2020, 12(16), 6352; https://doi.org/10.3390/su12166352
Submission received: 14 June 2020 / Revised: 28 July 2020 / Accepted: 6 August 2020 / Published: 7 August 2020
(This article belongs to the Collection Sustainable Freight Transportation System)

Abstract

:
One of the praxeological problems of safe and sustainable air transport (airfreight transport/air cargo, and air passenger transport) is the prevention and management of risks by competent staff, with the support of modern information and communication technologies. This paper presents an educational information model and software for the airport network and information systems risk assessment, primarily intended for aviation education and training of professionals for ensuring safe and sustainable air transport. The solution to the problem is based on the application of the fuzzy logic method in the air transport environment. Based on a fuzzy expert model, the selected scenario, and the input data established separately for airport assets by a group of 23 experts from aviation practice and a university, the following three assessments of airport network information system assets were constructed: Asset A2 (meteorological information systems) has an insignificant risk with an estimated 0.1162, and assets A1 (air traffic control and management (ATM), navigational aids and approach) and A3 (runway monitoring system) received a low risk of airport network and information systems (NIS) security with ratings of 0.2623 and 0.2915, respectively. An airport NIS risk assessment was aggregated (0.2288), indicating a low degree of security risk to the airport’s network and information systems. The aggregated risk assessment of airport NIS, including financial loss data, was calculated as 0.1438, representing a low degree of security risk to the airport’s network and information systems. Scenarios for evaluating airport assets are changing for students during education. The results of the developed model and its software will be part of the Simulation Center of the Faculty of Aeronautics.

1. Introduction

In the context of the crisis caused by the COVID-19 pandemic and its consequences, the crucial importance of the sustainable transport of goods in the coordinated activities of international supply chain management has been highlighted more than ever. Airfreight transport (air cargo) is one of the key elements of the global transport system, and an important part of air transport is air passenger transport. According to the International Civil Aviation Organization, today’s aircraft move well over USD 5 trillion worth of goods each year by air. Worldwide, air passenger numbers with a small cargo continued to rise, reaching 4.5 billion journeys annual, creating challenges for air cargo and mail security and facilitation, so maintaining or improving all aspects of air cargo safety and air passengers transport security and safety is essential.
The paper presents an information model and software for airport network and information systems risk assessment, primarily intended for aviation education and training of professionals to fulfill such roles for ensuring safe and sustainable air transport.
The focus of the proposed methodology is based mainly on our national 65 years’ experience in aviation education and practice with the support of international experience of partners. The Slovak Republic faces specific problems including a lack of multi- and interdisciplinary education of specialists for integrated personal protection, data protection, information protection, airport security, air transport security and safety, flight safety, crisis management, and crime prevention for safe and sustainable air transport. The quality of the training of aviation specialists in this area is important, especially given the potential for loss of life for attacks on aircraft operating systems, air traffic control systems, airport network and information systems (NIS), etc. When we consider the sustainability of air transport, security and safety are at the forefront. Lastly, managing the risks in the field of antibacterial and antiviral protection of persons and contamination of material surfaces in air transport is a challenge, not only during this pandemic period, but also for everyday aviation practice. Finding solutions to the praxeological problem of educating these specialists with the support of current Software (SW) tools remains our challenge.
What is novel in the presented approach? The idea of using fuzzy logic in the security models is not new. The paper expands upon the applications of fuzzy logic theory to the digital space of risk assessment of information systems and data protection within airports and air transport, which it also offers within the simulation center and internationalization of these processes as part of the digital aviation education of aviation specialists. Traditionally, experts are included in the risk assessment strategy and valuation of different aspects of security and safety risks, which is common practice. However, we lack the tools for the multi- and interdisciplinary education of students, the new and future specialists who must be competent and skilled for incorporation into teams for risk assessment strategies and validation of various aspects of security and safety risks in aviation practice. To fulfill these roles in the future, staff need to be selected, educated, and trained, and as members of a multi- and interdisciplinary team of aviation risk assessment experts they must be prepared within multi- and interdisciplinary teams of students from the beginning of their professional careers. The results of the study provide practical tools to support these educational processes of air transport personnel.
The plan was to compare at least three relevant methods with metrics for the objective and comprehensive assessment of the risks and incidents of airport network and information systems (NIS) in the air transport sector. The first part of the study focused on innovative solutions used by fuzzy methods and models for civil airport NIS risk assessment. This paper presents the risk assessment in the first part of the ongoing study. In the second part of the study, we used a fuzzy multi-criterion decision-making method (FMCMD) that we developed. In the third part of the study, we used a selected expert system (rule-based expert system). The knowledge gained in individual research questions allowed the relevant methods for these purposes to be compared and practical conclusions to be drawn. We intend to use these study conclusions for a complex solution for the education at the Simulation Center of the Faculty of Aviation of the Technical University in Košice, Slovak Republic, for the training of aviation specialists in this agenda, and to support the development of methodologies for the creation of intelligent systems for measuring and assessing security aspects of civil airport NIS.
In any intelligent decision support systems, a final decision maker (DM) is required. These systems should help, advise, and raise the level of validity of decision-making. Therefore, the decision support is improved with the formalization of expertise together with the quantitative assessments of various aspects of the assessed object. Air transport businesses need to complement the existing solutions with components responsible for security analysis, attack detection, and risk management in cybercrime prevention to align the information security systems with the current requirements [1,2]. Our research focused on developing risk management technologies with the involvement of NIS expertise in an adaptive approach to airport network security for civil aviation, primarily for air transport.

Overview of Domestic and Foreign Research Studies

The urgency of this task is demonstrated by major global studies and scientific publications assessing the risks of NIS security against various threats related to cybercrime prevention.
Simulation technologies and modeling techniques effectively support the assessment of cyber security risks in aviation [3]. To achieve this, it is recommended to develop, maintain, and apply simulation models and cyber-attack modeling scenarios to connect and develop simulation models from gate to gate, and integrate human interaction with cyber-attack modeling scenarios. Thorough evaluations and reviews of cyber risks for companies with internet access have already been explored, such as a recent study presenting a cyber risk vulnerability management software platform for simplifying and improving automation and continuity in cybersecurity assessment [4], also offering risk assessment and classification to the user. Bayesian networks, with various types of induced uncertainty with simplicity of criteria, have also been successfully used in the construction of an expert model for the analysis of cyber threats [5]. This means a fuzzy set of theories should be used to reflect knowledge of an object [6].
To properly assess the risk of airport NIS, it is necessary to learn how to scientifically model information uncertainty by drawing the formally described boundaries between reliable knowledge, knowledge with a certain level of reliability, and what is unknown [7]. To do this, the fuzzy-plural descriptions are used to model uncertainty [8,9]. For example, the fuzzy-plural description works on current information systems and technology [10] or artificial intelligence systems and decision support [11] on fixed point theorems in fuzzy metric spaces [12] or expert information using fuzzy logic [13], considering the general ideas and benefits underlying the current views on the use of fuzzy logic in the decision support systems, as Skorupski J. and Uchrońsk P. [14] presented a model fuzzy logic model supporting the management of a security screening checkpoint’s organization at an airport, but only the role of the human factor was considered.
Cyber-attacks and incidents cause financial losses, but obtaining this business information is difficult. For example, Zurich Insurance Company in the U.K. reported that nearly 850,000 small- and medium-sized businesses were being hit by cyber-attacks, with more than one-fifth of the companies suffering losses of more than USD 13,000 and 1 in 10 companies losing more than USD 69,000 [15]. The 2017 Ponemon data leak damage study found that the average total cost for large companies was approximately USD 3.62 million. According to the findings of the study on global costs related to data leaks, the average cost of cyber-attacks more than doubled between 2014 and 2015, while the average cost of lost or stolen records increased slightly to nearly USD 41 [16]. In the 2018 study, the average cost of a data breach per compromised record was USD 148, and it took an average of 196 days for organizations to detect breaches. The 2019 report found that the average total cost of a breach ranges from USD 2.2 million for incidents with less than 10,000 compromised records to USD 6.9 million for incidents with more than 50,000 compromised records [17]. The 2018 study covered 477 organizations, including data on mega breaches for the first time. Although the cost per record remained consistent at USD 148, large-scale breaches of 50 million records could cost companies over USD 350 million [18]. As DeBrusk Ch. and Mee P. [19] correspondingly reported, the amounts spent by companies in an attempt to protect themselves is also large, estimated at approaching USD 1 trillion annually on a global basis by 2022.
Today, no single method is available for creating risk management technologies by involving expertise using an adaptive approach. An expert model for assessing the risks and incidents of airport NIS using fuzzy sets is an urgently required task to improve civil aviation information security.
This paper is organized as follows. In Section 2, we describe the formal problem statement and the model of input data for assessment of the situation provided by a group of experts based on their knowledge, skills, and at least 15 years of practical experience. We present the fuzzy expert model for incident and risk assessment of airport NIS security for civil aviation. In Section 3, we outline the simulation experiment. In Section 4, we discuss the results of the expert model and its SW developed in the study. In Section 5, we conclude the paper and present the main results. We expand the ideas for future work and improvements.

2. Model of Experts’ Input Data for Selected Airport Assets Assessment Scenarios

2.1. Formal Problem Statement, and Model of Input Data

Suppose we have a set of information assets of civil aviation security [2] A = { A 1 ;   A 2 ;   ;   A n } , for which many threats to the security of personal data of network and information systems have been identified (the airport network threats in real-time, malicious or anomalous patterns, airport security threats, air transport security and safety threats, aviation communication systems threats, air traffic control threats, the threat of fraudulent acquisition and use of air passengers’ private identification information, airport health threats including antibacterial and antiviral protection, etc.) K = { K i 1 ;   K i 2 ;   ;   K i m } ,   i = 1 ,   n ¯ . Every security threat K i j for an asset A i ,   ( i = 1 ,   n ¯ ,   j = 1 ,   m ¯ ) is assessed by a group of experts in the form of the input data ( T i j ;   μ i j ) ,   ( i = 1 ,   n ¯ ;   j = 1 ,   m ¯ ) . The input data have the following meanings:
  • T represents the consequences of threat implementation K of airport NIS personal data security. This indicator is defined as the value of the next term set: T = { M ; A ; H ; C } , where M is the minimal consequences of the threat, A is the average consequences of the threat, H is the maximum consequences of the threat, and C is the critical consequences of the threat.
  • μ is the degree of possibility of occurrence of an NIS airport threat. This parameter belongs to the interval [0; 1], with different values having the following content: 0 indicates it is impossible that the threat will occur, 0.4 indicates a minimal possibility of the occurrence of the threat, 0.6 indicates average threat occurrence possibility, 0.8 indicates high threat occurrence possibility, and 1 indicates critical occurrence of the threat.
For each asset, we have L , which indicates the severity of the incident’s consequences for the asset. This indicator is defined as the value of the next term set: L = { V ; C ; U } , where V is vital (if its failure lasts more than 2 h as too many flights will be delayed immediately and then canceled), C is critical (if its failure cannot last more than 24 h because too many flights will be delayed), and U is useful or not applicable [2].
Based on the input of expert data, we assessed the security risk of personal data of airport NIS R = { R 1 ;   R 2 ;   ;   R n } separately for assets, calculated financial loss incidents (probability of occurrence of risk) for assets Z = { Z 1 ;   Z 2 ;   ;   Z n } , and constructed one aggregate estimate Y [ 0 ;   1 ] to make additional decisions to prevent cybercrime. The solution to this problem can be demonstrated in the form of a structural diagram of the expert model for evaluation of the civil airport NIS security to support security management with ensuring safe and sustainable air transport (Figure 1).
Assessment of situations using computer technology is knowledge-based (knowledge base and practical experience), and software solutions are used for the interpretation of rules for evaluation. The application of the peer-review method is largely based on the use of experienced experts who work on the basis of personal practice, intuition, and critical thinking and are able to anticipate, summarize, and apply their knowledge. The situation is classified according to the subjective judgments of experts (managers). The selected situation for the training of students determines the training scenario for specific lessons. Therefore, inputs on threats to airport NIS personal data were provided by a group of experts based on their knowledge, skills, practical experience, and additional sources, including:
  • Eleven lecturers from aviation practice (air transport, security and safety, aviation communication systems, air traffic management) and airport management;
  • Researchers’ reports on identified vulnerabilities that could be used to address the threats;
  • Computer investigators´ forensic reports of actual occurrences that analyzed the current situation in the field of computer security of civil aviation;
  • Various studies and publications in the media related to computer crimes;
  • Databases or directories listing and classifying threats.
Table 1 summarizes the NIS assets of the airport for civil aviation that we considered vital. We also present the severity of the effects of the asset incident [2] using the values of L.
Consider the security threats to NIS personal data implemented using inter-network protocols [20] for airport assets.
K i 1 is the network traffic analysis. This threat is realized with the help of a special package parser program, intercepts all packets transmitted by the network segment, and selects from among them those in which the users´ ID and their passwords are transmitted. During the implementation of the threat, the intruder studies the logic of the network, that is, seeks to clear events that occur in the system.
K i 2 is network scanning. The essence of the process of the threat implementation is sending requests to the network services of the personal information system and analyzing their responses. The purpose is identifying protocols used, available network service ports, laws for the formation of connection IDs, the definition of active network services, the selection of user IDs, and passwords.
K i 3 is the threat of password detection. The purpose of this aspect is to gain unauthorized access by overcoming password protection. An attacker can implement the threat by a simple search, searching using special dictionaries, installing a malicious program to intercept the password, and substituting a trusted network object and intercepting packets. Threats are mainly used by special programs that attempt to gain access by sequential password selection.
K i 4 is the substitution of a trusted network object and transmission of messages on its behalf by granting its access rights. This threat is effectively implemented in systems that use unstable algorithms for user identification and authentication. Implementing a threat of this type requires overcoming the message identification and authentication system.
K i 5 is imposing the wrong network route. The possibility of imposing an erroneous route occurs due to the disadvantages inherent in routing algorithms, as a result of which the attacker can access the network, where they can enter the operating environment of the technical tool in the personal information system.
K i 6 is the implementation of a false network object to intercept and violate a search query that will lead to the necessary change of route address data.
K i 7 is denial of service. These threats are based on network software weaknesses and vulnerabilities that allow an intruder to create conditions that, when detected by the operating system, prevents it from processing packages.
K i 8 is remote application launch. The threat involves running various pre-installed malicious programs on a personal information system server: bookmarks, viruses, and network spies. The main objective is to violate confidentiality, integrity, and availability of information, and obtain complete control. It also involves the unauthorized launch of user applications for the unauthorized reception of the necessary data breaches for launching application-driven processes.
For educational purposes, we have the airport facilities divided into four main areas and 25 subsystems of airport facilities (A1–A25), for which we can use (simulate) variable threats (Kii) to the security of personal data in airport network and information systems, etc., which have the potential to have serious consequences. Our students should consider (identify, analyze, and evaluate) security threats to the airport NIS implemented using inter-network protocols for selected airport facilities, according to the situation formulated by their training instructors. The selected situation for the training of students determines the training scenario for specific lessons. The situation is classified according to the subjective judgments of experts (managers). We have a set of information assets of civil aviation security for which many threats to the security of network and information systems, etc., have been identified, and it is important to describe them to our students in some detail.
Thus, the input data of security threats on the assets of the airport, as received from the group of experts, are shown in Table 2.

2.2. Fuzzy Expert Model for Incident and Risk Assessment NIS Airport Security for Civil Aviation

Here, we outline a model for conducting a comprehensive airport NIS risk assessment in the form of an algorithm consisting of the following steps:
Step 1. Fuzzification of the input data.
In the first step, we consider the dependence of the consequences of the implementation of the threat of airport NIS and the degree of possibility of realization. To do this, the following approach, based on fuzzy set theories, was used [21,22].
Consider the consequences of the threat of airport NIS. Their terms T = { M ; A ; H ; C } can be adequately determined on a percentage scale [0; 100], each of which is given an interval value [ a ;   b ] . Example, “M” = [0; 20], “A” = [20; 50], “H” = [50; 80], and “C” = [80; 100]. This approximation has the following meaning: If a threat is realized at, for example, 90%, then it is treated as a critical consequence of the threat.
The dependence of the consequences of threat realization T i j and the degree of possibility of such sales μ i j ( i = 1 ,   n ¯ ;   j = 1 ,   m ¯ ) are naturally considered as a membership functions statement “value x greater”. The higher the threat capability and the more critical the impact, the more dangerous the NIS incident, which entails a high security risk for airport operations. In this case, for example, we can take an S-like membership function or another similar to it [23,24]:
μ i j = { 0 , x i j     a ; 2 ( x i j a b a ) 2 , a < x i j     a + b 2 ; 1 2 ( b x i j b a ) 2 , a + b 2 < x i j < b ; 1 , x i j     b .   ,   ( i = 1 ,   n ¯ ;   j = 1 ,   m ¯ ) .
Because the probability of occurrence of the known threat is μ i j and intervals of numerical values for T i j are known, then for each threat for the assets under consideration, we express our dependence x i j from Formula (1) as:
x i j = { μ i j 2 ( b a ) + a , 0 μ i j 0.5 b 1 μ i j 2 ( b a ) , 0.5 < μ i j 1
where a   and   b are the values of the edges of the intervals, which depend on the linguistic variable T i j , ( i = 1 ,   n ¯ ;   j = 1 ,   m ¯ ) . The terms are defined on a percentage scale [0; 100], then the obtained values x i j [ 0 ; 100 ] are normalized by:
f i j = x i j 100 , ( i = 1 ,   n ¯ ;   j = 1 ,   m ¯ ) .
The value obtained, f i j , is named the incident rate, which is interpreted as a function of revealing the uncertainty of fuzzy expert judgment, the consequences of the implementation of the threat to the airport NIS, and the extent of its possible implementation on the ith asset of the jth threat. The greater the value f i j [ 0 ;   1 ] , the greater the jth security threat to the airport NIS within the ith asset.
We present a graphical interpretation of the fuzzification of the input data in Figure 2.
So, in the first step, the incoming data were fuzzified and the NIS airport incident rate was obtained.
Step 2. Aggregation of the incident rate within the asset.
In the second step, we output the aggregate value, which we denote α i , for asset A i using the following formula:
α i = 1 k i j = 1 m f i j , i = 1 ,   n ¯ ,
where k i is the number of NIS airport threats to the asset A i . Estimations α i [ 0 ; 1 ] represent the quantitative normalized security indicators of the airport NIS of the relevant asset A i . The greater the value α i [ 0 ; 1 ] , the worse the security of the airport NIS within the ith asset. So, when α i = 0 , we evaluate 100% security of the ith asset.
Step 3. Security risk assessment of the airport NIS.
NIS risk depends on the incident rate and severity of the consequences, L . Each value is evaluated by an expert or a team of experts at the intervals [ 0.1 ;   1 ] , where V is Vital [ 0.8 ;   1 ] , C is Critical [ 0.4 ;   0.8 ] , and U is Useful or not applicable [ 0.1 ;   0.4 ] .
We define the risk assessment as a multiplication by:
R i = α i L i , i = 1 ,   n ¯ .
The greater the consequence for an airport asset, the greater the risk, and valuation R approaches one.
The estimation R has been normalized. Based on this, we determine the level of risk of the airport asset using the following linguistic interpretation { r 1 ,   r 2 ,   r 3 ,   r 4 ,   r 5 } :
  • R i [0; 0.1]— r 1 is insignificant risk of airport NIS security by ith asset;
  • R i (0.1; 0.3]— r 2 is low risk of airport NIS security by ith asset;
  • R i (0.3; 0.5]— r 3 is average risk of airport NIS security by ith asset;
  • R i (0.5; 0.7]— r 4 is high risk of airport NIS security by ith asset;
  • R i (0.7; 1]— r 5 is the highest risk of airport NIS security by ith asset.
Step 4. Consideration of the importance of an airport asset.
Set weights for each asset for further decisions about the airport NIS security { w 1 ,   w 2 ,   ,   w n } from the interval [1; 10]. If the experts do not need the weights for each asset, without reducing the generality, assets are considered in equilibrium. Because all the calculations are reduced to a single scale, we define the normalized weights separately:
v i = w i i = 1 n w i ,   i = 1 , n ¯ .
Step 5. Defuzzification of the data.
Next, we derive a summary of the airport NIS risk assessment for the assets under consideration for further decisions [25]. Estimates received R i ,   i = 1 ,   n ¯ are normalized, but the focus of the goal must be changed because the smaller the R , the lower the risk, and the greater the risk, v , the more important the asset. To do this, we use one of the situations depending on the experts’ opinion of the situation, changing the focus of the goal R . The final result is:
Y 1 = 1 1 i = 1 n v i ( 1 R i )   for   pessimistic   opinions   of   experts ;
Y 2 = 1 i = 1 n ( 1 R i ) v i   for   careful   expert   opinions ;
Y 3 = 1 i = 1 n v i   ( 1 R i )   for   average   expert   opinions ;
Y 4 = 1 i = 1 n v i   ( 1 R i ) 2   for   optimistic   expert   opinions .
Step 6. Calculation of incident financial loss for the assets.
The occurrence of security incidents for the airport NIS asset causes it to be inoperable, delayed, or canceled, resulting in financial loss. Asset work has a price for a certain period of time. The cost of rebuilding works depends on the asset. We calculate the financial losses separately for the assets Z = { Z 1 ;   Z 2 ;   ;   Z n } , according to:
S i = S L i t i + c r i ,
Z i = S i R i , i = 1 , n ¯ ,
where S L i is the profit of the NIS (server) for one hour for the ith asset A i , t i is the server recovery time, c r i is the the cost of renewal of NIS operation for the ith asset, S i is the total amount of financial loss in case of failure of airport NIS for the realized threat and the cost of reconstruction work, and Z i is the amount of the provision for financial losses in the implementation of risk.
Next, we perform informational modeling of the fuzzy representation of the amount of the reserve for financial losses using fuzzy sets apparatus. Because profit and loss are linear dependencies, this representation is naturally realizable in the form of a linear membership function:
μ ( Z i ) = { 0 , Z i a i ; Z i a i b i a i , a i < Z i b i ; 1 , Z i > b i . i = 1 ,   n ¯ .
The interval value is defined as the dependence of NIS (server) earnings per hour separately on assets: a i = S i · 0.1 , b i = S i , i = 1 ,   n ¯ .
According to the resulting assessment μ   ( Z ) , we compare the inputs of financial losses in the implementation of risk. If μ   ( Z ) equals 1, the risk has been realized and financial losses have been maximized. The built-in membership function (14) for the presentation of fuzzy knowledge allows considering the uncertain factors in decision-making and the experts uncertainty in their conclusions.
Step 7. Summary of financial incident data losses and their risks for airport assets.
We use a two-dimensional Gaussian function with the interval [0; 1] to aggregate the risks and financial losses of incidents according to [26]:
O i = F   ( R i ;   μ ( Z i ) ) = e ( ( R i 1 ) 2 + ( R i 1 ) ( μ ( Z i ) 1 ) + ( μ ( Z i ) 1 ) 2 ) .   i = 1 ,   n ¯ .
Estimation O take a value of one in the case of high risk and maximum possible financial losses.
Step 8. Calculations of airport NIS security risk assessment considering financial losses.
We perform a calculation similar to Step 5, but we use assessment O instead of R.
Y 1   ( Z ) = 1 1 i = 1 n v i ( 1 O i ) pessimistic   opinions   of   experts ;
Y 2   ( Z ) = 1 i = 1 n   ( 1 O i ) v i careful   expert   opinions ;
Y 3   ( Z ) = 1 i = 1 n v i   ( 1 O i ) average   expert   opinions ;
Y 4   ( Z ) = 1 i = 1 n v i   ( 1 O i ) 2 optimistic   expert   opinions .
Estimates receiving Y and Y ( Z ) are normalized. Using the expertise of security experts, you can offer a linguistic representation as follows:
  • If Y / Y   ( Z ) [0; 0.1]— y 1 = small degree of security risk to the airport’s network and information systems;
  • If Y / Y ( Z ) (0.1; 0.3]— y 2 = low degree of security risk to the airport’s network and information systems;
  • If Y / Y ( Z ) (0.3; 0.5]— y 3 = average degree of security risk to the airport’s network and information systems;
  • If Y / Y ( Z ) (0.5; 0.7]— y 4 = high degree of security risk to the airport’s network and information systems”;
  • If Y / Y ( Z ) (0.7; 1]— y 5 = maximum degree of security risk to the airport’s network and information systems.

3. Results of Education Fuzzy Expert Model Verification According to Selected Student Training Scenario

In this section, we provide an example and verification of a fuzzy expert model for accident and security risk assessment for a civil airport NIS using the proposed algorithm according to the selected student training scenario. Training scenarios are created by training instructors from four main areas of airport facilities and their 25 subsystems. The number of areas and subsystems creates space for scenario variations. Specific scenarios are created first within one area and its several subsystems. Subsequently, the situation for students’ decision-making is complicated by the creation of a scenario from at least two areas of airport facilities and four of their subsystems, etc. Each training scenario pursues an educational goal so that students acquire knowledge and skills in identifying, analyzing, and assessing risks in selected areas and subsystems of airport facilities, in creating solutions (strategies) and especially in risk management. Training scenarios are aimed at identifying and understanding the causes of failure of the human factor, the technical system, or a combination of these causes (resources).
We assessed the security risk of the airport NIS of the eight personal data security threats for three assets. Within the Simulation Center of the Faculty of Aeronautics of the Technical University in Košice, a group of experts simulated a situation based on which 11 lecturers from aviation practice and airport management, 8 teachers/instructors, and 4 Ph.D. students established the input data separately for asset (Table 3, Table 4 and Table 5).
The calculation of aggregate estimates Y and Y (Z), performed according to the algorithm developed above, is as follows:
Step 1. Fuzzification of the input data.
Calculate the value x i j and incident rate f i j using Formulas (2) and (3), respectively, and the result is shown in Table 6.
Step 2. Aggregation of the incident rate within the asset.
In the second step, we output the aggregated values for the assets A 1 ,   A 2 ,   and   A 3 using Formula (4): α 1 = 1 8   ( 0.0894 + 0.1106 + + 0.6658 ) = 0.2914 ; α 2 = 0.1937 ; α 3 = 0.3644 .
Step 3. Security risk assessment of NIS.
NIS risk depends on the incident rate and the severity of consequences L , which is determined by Formula (3): R 1 = α 1 L 1 = 0.2914 0.9 = 0.2623 ; R 2 = 0.1937 0.6 = 0.1162 ; R 3 = 0.3644 0.8 = 0.2915 .
On the basis of the obtained experts’ assessment, we determined the degree of risk of airport assets.
R 1 (0.1; 0.3]— r 2 is low risk of airport NIS security by asset A 1 (air traffic control and management (ATM), navigational aids and approach);
R 2 [0; 0.1]— r 1 is insignificant risk of airport NIS security by asset A 2 (meteorological information systems);
R 3 (0.1; 0.3]— r 2 is low risk of airport NIS security by asset A 3 (runway monitoring system).
Step 4. Consideration of the importance of an airport asset.
Let the security experts set the weights accordingly for each asset {10; 8; 9}, then we define the normalized weights for Formula (6): v 1 =   0.37; v 2 = 0.3; v 3 = 0.33.
Step 5. Defuzzification of the data.
We derive an aggregate airport NIS risk assessment for the assets under consideration and use a convolution, for example, the average expert considerations, for Formula (9):
Y 3 = 1 ( 0.37 ( 1 0.2623 ) + 0.3   ( 1 0.1162 ) + 0.33   ( 1 0.2915 ) ) = 0.2288 .
Step 6. Calculation of financial loss incident for assets.
Let the security experts have information for the assets provided in Table 7.
Next, we calculated the total amount of financial losses using Formula (11), the amount of the provision for financial losses at risk using Formula (12), and μ   ( Z ) using Formula (14). The result is shown in Table 8.
Step 7. Aggregate the financial loss due to data loss and their risks for the airport assets using Formula (14): O 1 = 0.1619; O 2 = 0.0733; O 3 = 0.1865.
Step 8. Calculate the airport NIS security risk assessment considering financial losses.
This calculation is feasible according to the average expert opinion, using Formula (17):
Y 3   ( Z ) = 1 ( 0.37 ( 1 0.1619 ) + 0.3   ( 1 0.0733 ) + 0.33 ( 1 0.1865 ) ) = 0.1438 .
Therefore, based on the fuzzy expert model, incident assessment, and the security risk of the airport NIS for civil aviation, the following three assets were obtained: Asset A 2 (meteorological information systems) has an insignificant risk with an estimated R 2   of   0.1162 . Assets A 1 (air traffic control and management (ATM), navigational aids and approach) and A 3 (runway monitoring system) received a low risk of airport NIS security with ratings R 1 = 0.2623 and R 3 = 0.2915 , respectively.
An airport NIS risk assessment was aggregated at Y = 0.2288, indicating a low degree of security risk to the airport’s network and information systems.
Aggregated risk assessment of airport NIS, including financial loss data, was calculated as Y   ( Z ) = 0.1438, representing a low degree of security risk to the airport’s network and information systems.
Further management decisions are made by the airport NIS experts based on aggregated estimates within the intelligent decision support systems for the final airport security decision-maker.
As part of the research, we developed innovative software that we have named the Expert Model for Evaluation of the Civil Airport NIS Security based on the constructed model and algorithmic support (Figure 3).
The software was designed for the Simulation Center of the Faculty of Aeronautics at the Technical University in Košice for the training of aviation specialists, which is open to cooperation with other institutions, and the software can be adapted for other users too. The software will extend the digital aviation education tools and the current approach to the training of aviation professionals, while having the potential to strengthen internationalization in aviation education.
All important components upon which the proposed algorithm works were placed in the software settings (Figure 4). After entering all the input data on the assets is a calculation for the proposed algorithm. Step 8 presents an aggregate assessment of the airport’s security risk, taking into account financial losses, on the basis of which further management decisions are made (Figure 5).
The working results of the created software obtained:
  • Setting up of 25 airport NIS assets and eight personal data security threats to assess the airport NIS security risks. The input data are presented in the form of linguistic assessment (term-set of four linguistic variables) of consequences of the realization of security threats of personal data of NIS of the airport and degree of potential threat occurrence;
  • An approach for calculating the number of financial loss reserves for the realization of airport NIS risk is presented and a function for interpreting the dependence of financial loss reserves is created;
  • An education model for obtaining an aggregate airport NIS risk assessment is presented in the form of an eight-step knowledge-based algorithm, using linguistic variables, which reveals the inaccuracy of the input data, for preventing cybercrime and producing the outputs: risk assessment and linguistic interpretation of the airport NIS safety, based on the “incident rate” and the severity of the effects of the incident on the asset; aggregated assessment and linguistic interpretation of the airport NIS risk for assets under consideration concerning their importance; aggregated assessment and linguistic interpretation of airport NIS security risk taking into account financial losses.

4. Discussion

The expert model developed in this study, which can be used to assess the security risks of the airport NIS using the expert’s analysis with their knowledge, reveals the inaccuracy of input assessments and increases the validity of further management decisions based on the results obtained. The output of the model is the risk measuring and assessment of airport NIS and its linguistic interpretation, the aggregated risk assessment of airport NIS for the assets under consideration, and aggregated risk assessment of airport NIS, considering the financial losses with the linguistic interpretations. Innovative software was developed for the practical implementation of the model for the air transport environment within aviation education at a simulation center.
The personnel within the air transport ecosystem work in different workplaces, in different work positions. Individual failure due to the human factor, incidents regarding work procedures, or technology failure in one section of airport information systems may jeopardize the integrity and security of the entire air traffic support system. For this reason, students are trained in three stages: general aviation education, training of aviation specialists, and training using virtual training and information, simulation, and communication technologies in the aviation environment. The proposed model enables the division of students, the future employees of airports, into the following basic groups: safety and security, management/airline/airport operations, information technology (IT) and computers in aviation, and passenger management and services (air cargo and air passenger transport).
As part of general aviation education providing the required aviation knowledge and skills of staff, students are prepared for the identification, analysis, assessment, and management of risks with an emphasis on:
(1)
Safety and security: airport security, protection of persons and property, authentification systems, baggage screening systems, smart surveillance systems, customs and immigration services, in-line explosive detection systems (IEDS), perimeter intrusion detection systems (PIDS), and emergency response systems;
(2)
Management/airline/airport operations: air traffic control and management (ATM), navigational aids and approach, meteorological information systems, airport operation planning (AOP), network operation planning (NOP), departure control systems (DCS), ground handling, de-icing systems, airfield lightning control systems, and runway monitoring systems;
(3)
IT and computers in aviation: information systems for managers, local area network systems (LAN), communications systems, radio spectrum management systems, hardware and software at the airport/in the air transport, wide area network (WAN), network security management in the aviation environment, flight information display systems (FIDS), etc.;
(4)
Passenger management and services (air cargo and air passenger transport): air cargo security procedures, passenger check-in and boarding, staff authentication system, etc.
The modular system of the proposed information model respects the mentioned areas of education and provides functionalities for the preparation of students for aviation according to various scenarios and input data from the expert database relevant to these areas in aviation. The proposed modular system forms the basis for the second level of education, the aviation specialists, in which its modules and functionalities are extended; for example, airport security and crisis management, decision support for airport security, and crisis management for the protection of critical infrastructure entities in times of emergency such as COVID-19 for airport companies.
It was not possible to use all possible threat and risk scenarios in the study within the air transport environment for the aviation education of students. The proposed algorithm and created SW of the web application extend the currently available aviation education tools. The algorithm was verified on an example of an evaluation of three selected airport network assets: A1 (air traffic control and management (ATM), navigational aids and approach), A2 (meteorological information systems), and A3 (runway monitoring systems), according to the selected scenarios and input data from 23 experts from aviation practice and aviation education.
An example from selected airport network assets allows students to build the ability to identify, describe, and analyze the threat and risks, as well as numerically express the level of risk. The proposed methodological procedure is applicable to other areas and workplaces in aviation. The model provides another tool for quantifying these phenomena, their complexity, and their causality, helping to increase knowledge in the field, including awareness of the importance of the human factor in all processes relevant to air traffic and air transport. For the next generation of students, the proposed model interestingly describes the issues in aviation that have the potential to cause material and financial damage, and even the loss of human lives.
Sharing research knowledge directly linked to real-world testing with a focus on creating a predictable platform in the field of cybersecurity education will support the current lack of public sector cooperation with the private and academic sectors. This will create an institutional framework for systematic, coordinated, and effective work, particularly at the strategic level.
In addition to the importance of sharing the research findings of international and national research teams and implementing the findings into action plans according to national strategies, the scientific outcomes can significantly impact the quality of cyber/information security education systems for air transport where discrepancies exist at different levels of competency and preparedness for cyber threats. We will not achieve modern and sustainable air transport without individual and institutional capabilities and resilience.

5. Conclusions

The World Economic Forum in 2020 [27] identified a list of global risks in many critical sectors. In terms of concerns, technology sector information, infrastructure failures, and cyberattacks are considered to be at the top of the global risks. Critical infrastructure providers, including the airport transport network and information systems, must take risk management measures as well as permanently monitor and report serious incidents, among other things. A cyber/information risk management system will not work without innovative and effective methodologies, models, and concepts, which are the products of research teams. This need for development and implementation into real life is increasing as the complexity of information systems increases and the impact of potential threats is reinforced, having potentially highly negative consequences for society, its protection, and security. Sustainable air transport is therefore linked to security and safety management and preventive measures to ensure an acceptable level of security and safety risks.
In this study, we developed an educational expert model of airport NIS risk and security incidents measuring and assessment in the framework of the aviation sector. The major outcomes, advantages, and limitations of the proposed work are as follows:
The major outcomes include:
  • The creation of an educational expert model based on fuzzy logic (the modular system of the proposed educational information model) for obtaining an aggregate airport NIS risk assessment was presented in the form of an eight-step knowledge-based algorithm using linguistic variables, which reveals the inaccuracy of the input data for preventing cybercrime. The following outputs were produced: risk assessment and linguistic interpretation of the airport NIS safety based on the incident rate and the severity of the effects of the incident on the asset, aggregated assessment and linguistic interpretation of the airport NIS risk for assets under consideration concerning their importance, and aggregated assessment and linguistic interpretation of airport NIS security risk considering financial losses;
  • Based on the developed educational expert model, innovative software was constructed for the Simulation Center of the Faculty of Aeronautics at the Technical University in Košice, constructed for the multi- and interdisciplinary training of aviation specialists. The algorithm of the education information model was presented and verified on an example of airport NIS security risk measurement and assessment on eight personal data security threats and three airport NIS assets.
The advantages of our findings include:
  • Increasing the objectivity of expert assessments using the input linguistic variables of consequences of the occurrence of security threats to personal information in airport NIS and the degree of possibility of such risks. The findings revealed the uncertainties in fuzzy expert judgment through the incident rate function; it performs the risk assessment and linguistic interpretation of NIS security depending on the incident rate and the severity of the incident consequences on the asset, and it builds an aggregate assessment and linguistic interpretation of the airport NIS risk for assets under consideration given their importance. The model allows the calculation of the amount of financial loss reserves in the implementation of risks considering the aggregated assessment and linguistic interpretation of the airport NIS security risks.
  • The education expert model is also a useful tool for the education of future cyber criminologists in the aviation sector, which represents a new area of application of the results, and the designed software will expand upon the available digital aviation education tools, providing a modern approach to the training of aviation professionals.
The limitations to the study include:
  • We created an educational expert model for the training of future aviation personnel in compliance with the principles of the teaching process, which apply to all aspects of teaching, i.e., the teaching activity of the teacher, teaching methods, and material means of teaching. We respected the basic didactic principles such as the principles of clarity, adequacy, durability, and systematics. We created a system in which each didactic principle is in a dialectical relationship with others. The main limiting factor is that the proposed educational model does not replace narrowly specialized software tools for teaching the technical security of information and information systems.
  • The proposed educational expert model is focused on the comprehensive training of students in an area in which the experience of experts from real cases, real aviation practice, and real forensic investigation of technical failures, and especially the human factor in aviation, is significantly used. The proposed educational expert system is not intended to replace systems for technical assurance of reliability and safety of information systems in aviation. We aimed to contribute to the training of personnel, to handle such tasks with the support of modern technology.
In the future, we plan to focus on the creation of a new module entitled “Airport security and crisis management” for the Simulation Center with the support of the WebGIS platform, and functionalities for airport security management, airport crisis management, and airport network and information systems (NIS) security using the software created in this study. We will also focus on the development of the methodology for airport NIS, cybercrime, and cyber criminology experts (ANIS3C experts). We would like to research and support the development of education on cybercrime criminology in the aviation sector using the model of the perpetrator of the incident or cyber-attacks of the airport NIS, and evaluate the hybrid cybercrime prevention model for the airport NIS. We will include expert measurement and evaluation of cybercrime prevention in the context of airport security, expert measurement, and the framework for the prevention of financial losses at the airport and for air transport.
These scientific outputs will form a valuable platform to promote cooperation between research centers, enabling the necessary sharing of research knowledge at the national and international levels in the transport sector and in the aviation sub-sector. This will support the building and strengthening of cyber capabilities and the creation of new mechanisms for ensuring cyberspace management, as well as improving risk management processes at airports and in the aviation sector for the benefit of the safety of all aviation activities with an emphasis on air transport. Lastly, the development of new methodologies and models is essential for the development of concepts of education systems in the field of aviation information security and air transport security and safety in Slovakia. It requires reforms aimed at updating specialized studies and training programs on this agenda. Experiences and results are applicable in other countries as well.

Author Contributions

Conceptualization, M.K.; methodology, M.K., V.P., and B.G.; data curation, S.S., R.A., and J.K.; investigation and formal analysis, M.K., V.P., B.G., R.A., S.S., W.Y., J.C., M.G., J.K., P.K., and M.A.; supervision and project administration, M.K.; writing—original draft, M.K., V.P., B.G., and R.A.; funding acquisition, S.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported and the APC was funded by the Slovak Research and Development Agency (the project No. APVV-17-0167—“Application of the Self-regulatory for the Preparation of Flight Crew”).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. ISO 31000: 2018 Risk Management—Guidelines. 2018. Available online: https://www.iso.org/standard/65694.html (accessed on 25 May 2020).
  2. Cyber-Security Application for SESAR OFA 05.01.01-D3, Final Report. 2016. Available online: https://www.sesarju.eu/sites/default/files/documents/news/Addressing_airport_cyber-security_Full_0.pdf (accessed on 26 May 2020).
  3. Schmitt, A.R.; Edinger, C.; Mayer, T.; Niederl, J.; Kiesling, T. Simulation-Supported Aviation Cyber-Security Risk Analysis: A Case Study. CEAS Aeronaut. J. 2019, 10, 517–530. [Google Scholar] [CrossRef]
  4. Russo, P.; Caponi, A.; Leuti, M.; Bianchi, G. A Web Platform for Integrated Vulnerability Assessment and Cyber Risk Management. Information 2019, 10, 242. [Google Scholar] [CrossRef] [Green Version]
  5. Dragos, V.; Ziegler, J.; Villiers, J.P. Application of URREF Criteria to Assess Knowledge Representation in Cyber Threat Models. In Proceedings of the 21st International Conference on Information Fusion (FUSION), Cambridge, UK, 10–13 July 2018; pp. 664–671. [Google Scholar]
  6. Voloshyn, O.F.; Polishchuk, V.V.; Malyar, M.M.; Sharkadi, M.M. Informatsiyne modelyuvannya nechitkykh znan. Radio Electron. Comput. Sci. Control 2018, 4, 84–95. [Google Scholar]
  7. Polishchuk, V.; Kelemen, M.; Kozuba, J. Technology improving safety of crowdfunding platforms functioning in the context of the protection of the start-up investors in the financial and transport sectors. J. Konbin 2019, 49, 313–330. [Google Scholar] [CrossRef] [Green Version]
  8. Zaychenko, Y.U.P. Fuzzy Models and Methods in Intelligent Systems: A Textbook; Slovo: Kiyev, Ukraine, 2008. [Google Scholar]
  9. Zgurovsky, M.; Zaychenko, Y. Big Data: Conceptual Analysis and Applications; Springer: New York, NY, USA, 2020. [Google Scholar]
  10. Cugueró-Escofet, N.; Rosanas, J.M. Practical Wisdom for Sustainable Management and Knowledge Sharing. Sustainability 2020, 12, 4173. [Google Scholar] [CrossRef]
  11. Kumar, K.V. Neural Networks and Fuzzy Logic; S. K. Kataria & Sons: New Delhi, India, 2009. [Google Scholar]
  12. Roldan-Lopez-de-Hierro, A.F. Some new fixed point theorems in fuzzy metric spaces. J. Intell. Fuzzy Syst. 2014, 27, 2257–2264. [Google Scholar] [CrossRef]
  13. Kuts, A.M. Method of presentation of expert information by means of fuzzy logic and obtaining the group assessment of expert opinions. Technol. Audit Prod. Reserves 2015, 2, 17–21. [Google Scholar] [CrossRef] [Green Version]
  14. Skorupski, J.; Uchroński, P. A fuzzy model for evaluating airport security screeners’ work. J. Air Transp. Manag. 2015, 48, 42–51. [Google Scholar] [CrossRef]
  15. Zurich UK. 2017. Available online: https://www.zurich.co.uk/en/about-us/media-centre/general-insurance-news/2017/as-many-as-875000-uk-smes-suffer-cyber-security-breach-in-the-last-12-months (accessed on 26 May 2020).
  16. Ponemon Institute Cost of a Data Breach Study. 2017. Available online: https://securityintelligence.com/media/2017-ponemon-institute-cost-of-a-data-breach-study/ (accessed on 26 May 2020).
  17. Calculating the Cost of a Data Breach in 2018, the Age of AI and the IoT. 2018. Available online: https://securityintelligence.com/ponemon-cost-of-a-data-breach-2018 (accessed on 26 May 2020).
  18. Dr. Larry Ponemon Goes Behind the Scenes of the 2018 Cost of a Data Breach Study. 2018. Available online: https://securityintelligence.com/media/larry-ponemon-goes-behind-the-scenes-of-the-2018-cost-of-a-data-breach-study (accessed on 26 May 2020).
  19. DeBrusk, C.H.; Mee, P. Cyber Risks That Hide in Plain Sight; Oliver Wyman: New York, NY, USA, 2018; Available online: https://www.oliverwyman.com/content/dam/oliver-wyman/v2/publications/2018/june/Cyber-Risks-That-Hide-In-Plain-Sight.pdf (accessed on 26 May 2020).
  20. Bobalo, Y.; Horbatyy, I.; Kiselychnyk, M.; Bondaryev, A.; Voytusik, S.; Horpenyuk, A.; Nyemkova, O.; Zhuravelʹ, I.; Berezyuk, B.; Yakovenko, Y.E.; et al. Information Security; Lvivskoyi politekhniky: Lviv, Ukraine, 2019. [Google Scholar]
  21. Polishchuk, V. Fuzzy Method for Evaluating Commercial Projects of Different Origin. J. Autom. Inf. Sci. 2018, 50, 60–73. [Google Scholar] [CrossRef]
  22. Polishchuk, V.V.; Malyar, M.M.; Sharkadi, M.M. Model of risk assessment of financial projects. Informatsiynoyi tekhnolohiyi otsinyuvannya ryzyku finansuvannya proektiv. Radio Electron. Comput. Sci. Control 2017, 2, 44–52. [Google Scholar]
  23. Polishchuk, V.V.; Malyar, M.M. Fuzzy Models and Methods for Assessing the Creditworthiness of Enterprises and Investment Projects; RA SHARK: Uzhhorod, Ukraine, 2018. [Google Scholar]
  24. Voloshyn, O.; Malyar, M.; Polishchuk, V.; Sharkadi, M. Fuzzy mathematical modeling financial risks. In Proceedings of the Second International Conference on Data Stream Mining & Processing (DSMP), Lviv, Ukraine, 21–25 August 2018. [Google Scholar]
  25. Polishchuk, V.; Kelemen, M.; Gavurová, B.; Varotsos, C.; Andoga, R.; Gera, M.; Christodoulakis, J.; Soušek, R.; Kozuba, J.; Blišťan, P.; et al. A Fuzzy Model of Risk Assessment for Environmental Start-Up Projects in the Air Transport Sector. Int. J. Environ. Res. Public Health 2019, 16, 3573. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  26. Kelemen, M.; Polishchuk, V.; Gavurová, B.; Szabo, S.; Rozenberg, R.; Gera, M.; Kozuba, J.; Andoga, R.; Divoková, A.; Blišt’an, P. Fuzzy Model for Quantitative Assessment of Environmental Start-up Projects in Air Transport. Int. J. Environ. Res. Public Health 2019, 16, 3585. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  27. The Global Risk Report 2020; World Economic Forum: Geneva, Switzerland, 2020; Available online: https://www.weforum.org/reports/the-global-risks-report-2020 (accessed on 26 May 2020).
Figure 1. Structural diagram of the airport assets risk assessment expert model. A 1 ;   A 2 ;   ;   A n —information assets of civil aviation security; security threat for an asset; ( T i j ;   μ i j ) —the input data; α —the aggregate value for the asset; R 1 ;   R 2 ;   ;   R n —risk assessment; Z 1 ;   Z 2 ;   ;   Z n —estimation of losses; Y —aggregated risk assessment; Y ( Z ) —aggregated risk assessment considering financial losses.
Figure 1. Structural diagram of the airport assets risk assessment expert model. A 1 ;   A 2 ;   ;   A n —information assets of civil aviation security; security threat for an asset; ( T i j ;   μ i j ) —the input data; α —the aggregate value for the asset; R 1 ;   R 2 ;   ;   R n —risk assessment; Z 1 ;   Z 2 ;   ;   Z n —estimation of losses; Y —aggregated risk assessment; Y ( Z ) —aggregated risk assessment considering financial losses.
Sustainability 12 06352 g001
Figure 2. Fuzzification of the experts ‘ input data for the selected scenario of airport assets assessment. M is the minimum consequence of the threat, which is an interval value on the percentage scale [0; 20]; A is the average consequence of the threat, which is an interval value on the percentage scale [20; 50]; H is the high consequence of the threat, which is an interval value on the percentage scale [50; 80]; and C is the critical consequence of the threat, which is an interval value on the percentage scale [80; 100].
Figure 2. Fuzzification of the experts ‘ input data for the selected scenario of airport assets assessment. M is the minimum consequence of the threat, which is an interval value on the percentage scale [0; 20]; A is the average consequence of the threat, which is an interval value on the percentage scale [20; 50]; H is the high consequence of the threat, which is an interval value on the percentage scale [50; 80]; and C is the critical consequence of the threat, which is an interval value on the percentage scale [80; 100].
Sustainability 12 06352 g002
Figure 3. Software window for the modular system of the selected airport assets’ assessment according to the students training scenario (A1, Air Traffic Control and Management).
Figure 3. Software window for the modular system of the selected airport assets’ assessment according to the students training scenario (A1, Air Traffic Control and Management).
Sustainability 12 06352 g003
Figure 4. Software settings for consequences, linguistics, and numerical security risk level for airport network information system assessment according to the student training scenario.
Figure 4. Software settings for consequences, linguistics, and numerical security risk level for airport network information system assessment according to the student training scenario.
Sustainability 12 06352 g004
Figure 5. Screenshot of the final assessment of selected airport assets NIS risk for support of decision-makers (students).
Figure 5. Screenshot of the final assessment of selected airport assets NIS risk for support of decision-makers (students).
Sustainability 12 06352 g005
Table 1. Airport network and information systems (NIS) assets. The severity of the effects of the asset incident.
Table 1. Airport network and information systems (NIS) assets. The severity of the effects of the asset incident.
AssetsThe Name of the AssetThe Severity Consequences L
Safety and Security A 1 Access control systemsV (Vital)
A 2 Authentication systemsV
A 3 Baggage screening systemsV
A 4 Smart surveillance systems, e.g., smart CCTV, camera, and videoV
A 5 Customs and immigrationV
A 6 In-line explosive detection systems (IEDS)V
A 7 Perimeter intrusion detection systems (PIDS)V
A 8 Emergency response systemV
Management, Airline/Airside Operations A 9 Air traffic control and management (ATM), navigational aids and approachV
A 10 Meteorological information systemsC (Critical)
A 11 Airport operation plan (AOP)V
A 12 Network operation plan (NOP)C
A 13 Departure control systems (DCS)C
A 14 De-icing SystemsC
A 15 Airfield lighting control systemsV
A 16 Runway monitoring systemV
A 17 Communication, navigation, and surveillance (CNS)V
IT and Computers A 18 Local area network systems (LAN)V
A 19 Communications systems, e.g., radio spectrum management systemsV
A 20 Equipment hardware and softwareC
A 21 Wide area network (WAN)C
A 22 Network security managementC
Passenger Management A 23 Flight information display system (FIDS)C
A 24 Passenger check-in and boardingC
A 25 Staff authentication system, e.g., biometric identification systemC
Table 2. Experts’ input data for airport assets threats assessment.
Table 2. Experts’ input data for airport assets threats assessment.
AssetsThreatsConsequences of the ThreatDegree of Possibility of Occurrence of ThreatThe Severity Consequences
A 1 K 11 T 11 μ 11 L 1
K 12 T 12 μ 12
K 1 m T 1 m μ 1 m
A n K n 1 T n 1 μ n 1 L n
K n 2 T n 2 μ n 2
K n m T n m μ n m
Table 3. Input data expert assessment for the selected scenario of airport asset A 1
Table 3. Input data expert assessment for the selected scenario of airport asset A 1
AssetsThreatsConsequences of the ThreatDegree of Possibility of Threat Occurrence The Severity Consequences
A 1 (air traffic control and management (ATM), navigational aids and approach) K 11 M (is the minimal consequences of the threat)0.40.9
K 12 M0.6
K 13 A (is the average consequences of the threat)0.4
K 14 H (is the maximum consequences of the threat)0.8
K 15 A0
K 16 M0.8
K 17 M0.4
K 18 H0.6
Table 4. Input data expert assessment for the selected scenario of airport asset A 2
Table 4. Input data expert assessment for the selected scenario of airport asset A 2
AssetThreatsConsequences of the ThreatDegree of Possibility of Threat Occurrence The Severity Consequences
A 2 (meteorological information systems) K 21 A0.40.6
K 22 M0.4
K 23 A0.4
K 24 M0.8
K 25 A0
K 26 A0.6
K 27 M0.4
K 28 M0
Table 5. Input data expert assessment for the selected scenario of airport asset A 3
Table 5. Input data expert assessment for the selected scenario of airport asset A 3
AssetThreatsConsequences of the ThreatDegree of Possibility of Threat Occurrence The Severity Consequences
A 3 (runway monitoring system) K 31 H0.80.8
K 32 M0.4
K 33 M0.8
K 34 M0.6
K 35 A0.4
K 36 A0.8
K 37 H0.4
K 38 H0
Table 6. Fuzzification of the experts’ input data for the selected scenario of airport assets assessment.
Table 6. Fuzzification of the experts’ input data for the selected scenario of airport assets assessment.
ThreatsValues x Normalized Values fThreatsValues xNormalized Values fThreatsValues xNormalized Values f
K 11 8.940.0894 K 21 33.420.3342 K 31 70.510.7051
K 12 11.060.1106 K 22 8.940.0894 K 32 8.940.0894
K 13 33.420.3342 K 23 33.420.3342 K 33 13.680.1368
K 14 70.510.7051 K 24 13.680.1368 K 34 11.060.1106
K 15 200.2 K 25 200.2 K 35 33.420.3342
K 16 13.680.1368 K 26 36.580.3658 K 36 40.510.4051
K 17 8.940.0894 K 27 8.940.0894 K 37 63.420.6342
K 18 66.580.6658 K 28 00 K 38 500.5
Table 7. Input data for the calculation of financial losses.
Table 7. Input data for the calculation of financial losses.
Assets S L Profit   of   NIS   ( Server )   Per   Hour   ( USD ) t—Recovery Time Server Operation (h) c r Cos t   of   Recovery   Work   of   NIS   ( USD )
A 1 25,00035000
A 2 15,00022000
A 3 20,00058000
Table 8. Calculation of incident financial loss for the selected scenario of airport assets assessment.
Table 8. Calculation of incident financial loss for the selected scenario of airport assets assessment.
Assets S Z μ ( Z )
A 1 80,00020,981.70.180301
A 2 32,0003719.520.018039
A 3 108,00031,486.320.212822

Share and Cite

MDPI and ACS Style

Kelemen, M.; Polishchuk, V.; Gavurová, B.; Andoga, R.; Szabo, S.; Yang, W.; Christodoulakis, J.; Gera, M.; Kozuba, J.; Kaľavský, P.; et al. Educational Model for Evaluation of Airport NIS Security for Safe and Sustainable Air Transport. Sustainability 2020, 12, 6352. https://doi.org/10.3390/su12166352

AMA Style

Kelemen M, Polishchuk V, Gavurová B, Andoga R, Szabo S, Yang W, Christodoulakis J, Gera M, Kozuba J, Kaľavský P, et al. Educational Model for Evaluation of Airport NIS Security for Safe and Sustainable Air Transport. Sustainability. 2020; 12(16):6352. https://doi.org/10.3390/su12166352

Chicago/Turabian Style

Kelemen, Miroslav, Volodymyr Polishchuk, Beáta Gavurová, Rudolf Andoga, Stanislav Szabo, Wenjiang Yang, John Christodoulakis, Martin Gera, Jaroslaw Kozuba, Peter Kaľavský, and et al. 2020. "Educational Model for Evaluation of Airport NIS Security for Safe and Sustainable Air Transport" Sustainability 12, no. 16: 6352. https://doi.org/10.3390/su12166352

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop