Algorithm for Conducting Information Security Audit in Organizations Based on a Multilevel Model Based on Graph Theory

Main Article Content

Kholimtayeva Ikbol Ubaydullayevna
Shamshieva Barno Makhmudjanovna
Muminova Sunbula Shakhzodovna

Abstract

This paper presents a multi-level topological model for auditing information security of critical information infrastructure (CII) objects, developed using graph theory. The model accounts for resource costs, technical impacts (ITE), vulnerability levels, potential damage, and object elements. The proposed framework enables the identification of optimal testing scenarios based on an "efficiency/cost" criterion, supporting the formation of comprehensive test sets for thorough audit coverage. An algorithm was developed to implement the model, which includes graph construction across hierarchical layers and application of Dijkstra’s shortest path algorithm to determine the most cost-effective information-technical effects. Additionally, a software tool was created using C# to visualize the graph, manage input data, and dynamically calculate optimal audit paths and damage estimates. A comparative analysis highlights the strengths and limitations of the graph-based model in comparison to traditional audit methods, including compliance audits, risk assessments, penetration tests, and automated monitoring. The graph-based approach stands out for its flexibility, scientific foundation, and ability to prioritise critical vulnerabilities and efficiently audit resources in constrained environments.

Downloads

Download data is not yet available.

Article Details

Section

Articles

Author Biography

Muminova Sunbula Shakhzodovna, Senior Lecturer, Department of Information Security, Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Tashkent, Uzbekistan.



How to Cite

[1]
Kholimtayeva Ikbol Ubaydullayevna, Shamshieva Barno Makhmudjanovna, and Muminova Sunbula Shakhzodovna, “Algorithm for Conducting Information Security Audit in Organizations Based on a Multilevel Model Based on Graph Theory”, IJSCE, vol. 15, no. 4, pp. 1–10, Sep. 2025, doi: 10.35940/ijsce.D3684.15040925.

References

Макаренко С.И.. Аудит безопасности критической инфраструктуры специальными информационными воздействиями. Монография. – СПб.: Наукоемкие технологии, 2018. – 122 с. https://www.researchgate.net/publication/340862431

Астахов А. Введение в аудит информационной безопасности [Доклад] // GlobalTrust Solutions [Электронный ресурс]. 2018. – URL: https://globaltrust.ru/ (дата обращения: 29.01.2018).

Irgasheva Durdona Yakubdjanovna, Nasrullayev Nurbek Bakhtiyarovich, Xolimtayeva Iqbol Ubaydullayevna. Implementation of intercorporate correlation of information security messages and audits.https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=9351470

Макаренко С.И. Информационное противоборство и радиоэлектронная борьба в сетецентрических войнах начала XXI века. Монография. – СПб.: Наукоемкие технологии, 2017. – 546 с. https://www.researchgate.net/publication/340871849_Informacionnoe_protivoborstvo_i_radioelektronnaa_borba_v_setecentriceskih_vojnah_nacala_XXI_veka_Information_warfare_and_electronic_warfare_to_network-centric_wars_of_the_early_XXI_century

Makarenko S.I. Audit of Information Security - the Main Stages, Conceptual Framework, Classification of Types. Systems of Control, Communication and Security. 2018; 1:1-29 (in Russ.). DOI: https://doi.org/10.24411/2410-9916-2018-10101

Makarenko, S.I. Security Audit of Critical Infrastructure with Special Information Impacts. Monograph. Saint Petersburg: Naukoemkie tehnologii Publ.; 2018. 122 p. (in Russ.) https://www.researchgate.net/publication/340862431_Audit_bezopasnosti_kriticeskoj_infrastruktury_specialnymi_informacionnymi_vozdejstviami_Security_audit_of_critical_infrastructure_with_special_information_impacts

Skabtsov N. Security Audit of Information Systems. Saint Petersburg: Piter Publ.; 2018. 272 p. (in Russ.)https://itsecforu.ru/wp-content/uploads/2017/11/%D0%90%D1%83%D0%B4%D0%B8%D1%82_%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D0%B8_%D0%B8.pdf

Makarenko S.I., Smirnov G.E. Analysis of Penetration Testing Standards and Methodologies. Systems of Control, Communication and Security. 2020;4:44‒72. (in Russ.). DOI: https://doi.org/10.24411/2410-9916-2020-10402

Begaev A.N., Begaev S.N., Fedotov V.A. Penetration testing. Saint Petersburg: Saint Petersburg National Research University of Information Technologies, Mechanics and Optics Publ.; 2018. 45 p. (in Russ.) https://www.researchgate.net/profile/Sergey-Makarenko-5/publication/350758773_Model_audita_zasisennosti_obekta_kriticeskoj_informacionnoj_infrastruktury_testovymi_informacionno-tehniceskimi_vozdejstviami_Model_of_Security_Audit_of_a_Critical_Information_Infrastructure_Object_wi/links/63087bff5eed5e4bd11dfbd3/Model-audita-zasisennosti-obekta-kriticeskoj-informacionnoj-infrastruktury-testovymi-informacionno-tehniceskimi-vozdejstviami-Model-of-Security-Audit-of-a-Critical-Information-Infrastructure-Object-wi.pdf

Umnitsyn M.Y. Approach to semi-natural security evaluation of information system. Izvestia VSTU. 2018;218(8): 112‒116 (in Russ.) https://www.researchgate.net/publication/350758773_Model_audita_zasisennosti_obekta_kriticeskoj_informacionnoj_infrastruktury_testovymi_informacionno-tehniceskimi_vozdejstviami_Model_of_Security_Audit_of_a_Critical_Information_Infrastructure_Object_wi

Borodin M.K., Borodina P.Ju. VGATE R2 Information Security Penetration Testing. Regional’naja informatika I informacionnaja bezopasnost [Regional Informatics and information security]. Saint Petersburg, 2017. p.264‒268 (in Russ.) https://cyberleninka.ru/article/n/analiz-standartov-i-metodik-testirovaniya-na-proniknovenie

Poltavtseva M.A., Pechenkin A.I. Data mining methods in penetration tests decision support system. Information Security Problems. Computer Systems. 2017; 3:62 69. (in Russ.).

DOI: https://doi.org/10.3103/S014641161708017X

Kadan A.M., Doronin A.K. Cloud infrastructure solutions for penetration testing. Uchenye zapiski ISGZ. 2016;14(1): 296‒302. (in Russ.) https://cyberleninka.ru/article/n/model-analiza-zaschischennosti-obekta-informatizatsii-zheleznodorozhnogo-transporta-i-metodika-obosnovaniya-nabora-testovyh/pdf

Eremenko N.N., Kokoulin A.N. Research of methods of penetration testing in information systems. Master's Journal. 2016; 2:181‒186 (in Russ.)

IT Security Audit Methodology – A Complete Guide. https://www.getastra.com/blog/security-audit/it-security-audit-methodology/

Information Security Audits: An Overview of Different Types. Johanson Group, LLP Audit Cybersecurity and IT, Oct 17 2024. https://www.johansonllp.com/blog/information-security-audits.

Most read articles by the same author(s)

<< < 1 2 3 4 5 6 7 > >>