Научная статья на тему 'Water Transport Information Security Trainer Concept'

Water Transport Information Security Trainer Concept Текст научной статьи по специальности «Компьютерные и информационные науки»

CC BY
59
18
i Надоели баннеры? Вы всегда можете отключить рекламу.
Ключевые слова
transport / water transport / vessel / ship / training apparatus / the game / education / risk / транспорт / водный транспорт / судно / корабль / тренажер / игра / образование / риск

Аннотация научной статьи по компьютерным и информационным наукам, автор научной работы — M. V. Kardakova, A. P. Nyrkov, Yu. V. Tsymay

The article discusses the possibility of using game simulators in training personnel or students. The relevance of the use of simulators in teaching information security students in water transport is considered. The relevance of such simulators is emphasized by the possibility of their use in distance learning. The use of a recognizable genre, which is familiar and popular among students in the virtual world, allows you to acquire positive emotions, increase interest and motivation for the development of cognitive activity. The game mechanics used in the simulator are described. An example of calculating the risk of an emergency on a ship is considered, options for using the calculations in the sim-ulator are proposed. The concept of the simulator itself is described and the concept of the interface is developed. The use of simulators in teaching allows you to teach students the practical skills of working with something. As a rule, such an approach to teaching requires the student to know the theory of the subject, as well as to actively participate in the work. Thus, the student has the opportunity to demonstrate his knowledge in practice and improve his skills. Of course, no simulator will replace a real device or a real situation, but such an approach in teaching will help to consolidate the material and in the future the student, seeing a real object, will not be lost and will be able to calmly work with it. The use of information security simulators for educational purposes ensures the consolidation of theoretical knowledge and their application in practice. It is very important that the training simulators, on the one hand, be close to real conditions, on the other hand, work on them was interesting and convenient for the student.

i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

Концепция игрового тренажера по защите информации на водном транспорте

В статье рассматривается возможность применения игровых тренажеров при обучении персонала или студентов. Рассмотрена актуальность применения тренажеров при обучении студентов информационной безопасности на водном транспорте. Актуальность таких тренажеров подчеркивается возможностью их использования в дистанционном обучении. Использование узнаваемого жанра, знакомого и популярного среди школьников в виртуальном мире, позволяет получить положительные эмоции, повысить интерес и мотивацию к развитию познавательной деятельности. Описаны игровые механики, применяемые в тренажере. Рассмотрен пример расчета риска возникновения чрезвычайной ситуации на судне, предложены варианты использования расчетов в тренажере. Описана концепция самого тренажера и разработана концепция интерфейса. Использование тренажеров в обучении позволяет научить студентов практическим навыкам работы с чем-либо. Как правило, такой подход к обучению требует от студента знания теории предмета, а также активного участия в работе. Таким образом, у студента есть возможность продемонстрировать свои знания на практике и повысить квалификацию. Конечно, никакой тренажер не заменит реальный прибор или реальную ситуацию, но такой подход в обучении поможет закрепить материал и в будущем ученик, увидев реальный объект, не потеряется и сможет спокойно работать с ним. Использование тренажеров информационной безопасности в образовательных целях обеспечивает закрепление теоретических знаний и их применение на практике. Очень важно, чтобы тренажеры, с одной стороны, были приближены к реальным условиям, а с другой, чтобы работа на них была интересной и удобной для обучающегося.

Текст научной работы на тему «Water Transport Information Security Trainer Concept»

DOI: 10.24412/2413-2527-2022-331-52-60

Water Transport Information Security Trainer Concept

M. V. Kardakova, Grand PhD A. P. Nyrkov, Yu. V. Tsymay Admiral Makarov State University of Maritime and Inland Shipping Saint Petersburg, Russia m.v.kardakova@ya.ru, apnyrkow@mail.ru, m-walua@yandex.ru

Abstract. The article discusses the possibility of using game simulators in training personnel or students. The relevance of the use of simulators in teaching information security students in water transport is considered. The relevance of such simulators is emphasized by the possibility of their use in distance learning. The use of a recognizable genre, which is familiar and popular among students in the virtual world, allows you to acquire positive emotions, increase interest and motivation for the development of cognitive activity. The game mechanics used in the simulator are described. An example of calculating the risk of an emergency on a ship is considered, options for using the calculations in the simulator are proposed. The concept of the simulator itself is described and the concept of the interface is developed. The use of simulators in teaching allows you to teach students the practical skills of working with something. As a rule, such an approach to teaching requires the student to know the theory of the subject, as well as to actively participate in the work. Thus, the student has the opportunity to demonstrate his knowledge in practice and improve his skills. Of course, no simulator will replace a real device or a real situation, but such an approach in teaching will help to consolidate the material and in the future the student, seeing a real object, will not be lost and will be able to calmly work with it. The use of information security simulators for educational purposes ensures the consolidation of theoretical knowledge and their application in practice. It is very important that the training simulators, on the one hand, be close to real conditions, on the other hand, work on them was interesting and convenient for the student.

Keywords: transport, water transport, vessel, ship, training apparatus, the game, education, risk.

Introduction

The use of information security simulators for educational purposes ensures the consolidation of theoretical knowledge and their application in practice. It is very important that the training simulators, on the one hand, be close to real conditions, on the other hand, work on them was interesting and convenient for the student [1].

Simulators created in the form of a game allow students to master new competencies with interest. Such technologies can become an effective tool in the educational process for teaching students new things or consolidating the material already passed [2]. Also, the passage of such a game can be set as homework, for the student's independent work. The relevance of such simulators is also emphasized by the possibility of using them in distance learning [3].

The use of a recognizable genre, which is familiar and popular among students in the virtual world, allows you to acquire positive emotions, increase interest and motivation for the development of cognitive activity [4].

Materials and methods

The use of simulators in teaching allows you to teach students the practical skills of working with something. As a rule, such an approach to teaching requires the student to know the theory of the subject, as well as to actively participate in the work. Thus, the student has the opportunity to demonstrate his knowledge in practice and improve his skills. Of course, no simulator will replace a real device or a real situation, but such an approach in teaching will help to consolidate the material and in the future the student, seeing a real object, will not be lost and will be able to calmly work with it.

For example, «Virtual complex «Protection of an object from leaks of information through technical channels» TZI-VIRT», the simulator is aimed at obtaining primary experience in preparing a room for certification, consolidating in practice knowledge on the physics of the formation of channels of leakage of technical information, familiarization with modern protective devices and methods of their installation, depending on the characteristics of the virtual office. This software package helps in the study of methods of technical protection of information. The program allows you to design premises, simulate threats and arrange protection against them.

Also interesting as an example is the software package «Virtual complex «Detection of embedded devices and hidden video cameras» RAM-VIDEO-VIRT». The simulator is designed to gain knowledge about methods for detecting embedded devices and hidden video cameras, as well as to gain experience with modern security tools designed to detect embedded devices and hidden video cameras.

An interesting option is to use the game as a simulator, when a student memorizes new material while playing and masters new competencies.

The use of game techniques in the lessons allows the student to acquire the following skills [5]:

• make quick decisions and be responsible for them;

• use the experience gained in performing professional tasks, determine the best solutions, evaluate their quality and effectiveness;

• communicate with each other and foster teamwork;

• take responsibility for the work of all team members, for the result of assignments.

To date, many interesting educational games have been created that help to consolidate this or that material, but they are not structured into a single course on information security and are suitable only as an auxiliary environment for studying certain topics.

Using game technologies in pedagogy, it is necessary to go through several main stages, which include drawing up and planning goals, defining tasks and plans, and, finally, complet-

ing the assigned tasks. It is necessary to discuss and analyze with students the whole process of work and the results obtained.

Any activity makes sense when these conditions are as close as possible to real life. The student must have a voice, discretion and responsibility. Only if these requirements are met, a person fully defines himself as a specialist.

The classification of educational gaming technologies is quite large. So gaming educational technologies are usually classified by the field of activity, by the nature of the educational process, by the method of the game, by the subject area, by the game environment, etc. Within the framework of this article, an intellectual, educational, simulation computer game on information security in water transport will be considered.

The classification of computer games is also varied, but we will pay special attention to adventure games, strategy games, puzzles, computer simulations and educational games. All these genres can be used when teaching students and staff any new competencies.

The concept of the simulator

The purpose of the simulator is to create a learning environment where cognitive and training activities will be available in a playful manner that is interesting for the student. The simulator should consist of a plausible small boat model. The student will have to be able to choose protection equipment

and install it on the object. There should also be access to the ship's computer interface for «installation» and operation of the software [6, 7]. You can also add the passage of minigames to the main program for learning, mastering or repeating certain competencies. These mini games can be used individually or as a quest.

For the correct placement of protection equipment and installation of software, the student will need to have knowledge of the legal framework, as well as to calculate the risks [8, 9].

The game will contain the following objects:

• components of the security system;

• ship cabins;

• captain's bridge;

• equipment of the vessel.

This plot has the following attractive features:

• the theme of a real ship is used, but students dream of getting a real experience;

• the variety of ship equipment, work situations and work responsibilities of an information security specialist creates a lot of potential for the development of the plot;

• you can add secret levels for those who want to further study the material on the game.

Table 1 below presents the interpretation of the elements of the mechanics in the context of the game plot and setting.

Element of mechanics

Points for solving problems Points in individual player ratings and points in student ratings on the course. The ratings are divided according to the competencies that are studied at one level or another.

Points for finding items Points in individual ratings and points in student ratings by competency.

Points for the correct use of items Points in individual ratings and points in student ratings by competency.

Ranking among all students Ratings between students and the rating of the player himself.

Levels Divided into competencies, according to complexity

Helping the student to complete the assignment if the assignment takes too long The task can be completed no longer than two hours or lesson, depending on the level. If the player completes the task for a long time and cannot solve the problem, but also does not take hints, the gameplay prompts him to the correct way out of the situation.

Limiting lesson time When the time ends and if the task was not done, then the student receives a «reprimand» card, if the student accumulates a certain number of such cards, then he will need to go through the game again. If the task was done, but with errors, then the student is invited to redo the work. If everything is done correctly, «the manager gives a new task to the employees».

Penultimate level reached It is proposed to pass the last level, which will be a practice-oriented examination task. In this task, the student will need to use all the knowledge gained earlier. This level should correspond to all competences of the discipline.

Reached the last level The student receives a full report on what competencies he has learned and where he made mistakes. It is also possible to view such reports after passing each level.

Performing three tasks at once quickly and without errors and without asking for hints The player receives a bonus item that gives additional opportunities when solving tasks.

Completed the level on your own without asking for hints The player receives a part of the «magic» item, if the player collects the «magic» item, he can exchange it for points in the rating or for additional opportunities.

All levels are completed independently, without prompting for tips and correctly Additional points are awarded in the rating.

The player did not complete the levels at the end of the game time The player is asked to play the game first before completing the additional session. 3 additional levels are also added

The minimum number of points or below the minimum at the time of the end of the game The player is invited to go through three additional levels.

Not a single task was completed correctly The player is invited to go through some levels again, and it is also proposed to go through three additional levels.

All tasks are completed with tips The player is invited to go through three additional levels, without the possibility of using hints.

Table 1

Interpretation of elements of mechanics

Thus, the following game mechanics will be used in the work [2]:

1. Mechanic «Achievement». This mechanic is based on a material or virtual expression of the result of performing an action. The results can be seen on their own or as a reward. Anything can be a reward.

2. Avoidance mechanic. With this mechanic, the player is motivated not by a reward, but by the fact that he can avoid punishment. This usually helps to keep the activity level consistently according to the schedule provided by the developer.

3. The Reward for Effort mechanic. The idea behind the mechanics is that when you play, you feel more joy from work than from rest.

4. Mechanics «Chain of events». In this mechanic, the reward is used as a link in a chain of related events. In many cases, players see these events as separate elements. When a link in a chain is unlocked, the player perceives this as a reward for the actions taken.

5. Mechanics «Countdown». Applying the presented mechanics, it is necessary to create situations when a limited time is allotted for solving problems or overcoming obstacles. Using this method, you can increase the activity of the players and increase its performance compared to the original. However, it is important to understand that activity only increases for a limited period of time.

6. Mechanics «Combined rating of winners». Mechanics are used when there is a need to use a common scoring system for a number of game scenarios, and they can be completely dissimilar and unrelated to each other.

7. Mechanic «Reward for a specific sequence of actions». Players are rewarded not for one, but for several consecutive actions. At first, the technique can reduce the activity of the participants, since the action does not bring a reward, but later it increases, because the time for receiving the reward is approaching.

8. Loyalty mechanic. The mechanic of loyalty is to establish a non-verbal relationship between the participant in the game and the reality of the game. This connection is achieved by introducing a person to his participation in the game world (for example, he may have real estate in the game), and then this is enhanced by visual images that other players can see.

9. Meta-game mechanics. The meaning of this mechanic is that an additional one is built into the main game. During the game, the participant can find an additional game, because the author does not advertise its presence, so as not to create confusion or increase interest in the game. But the developer's advantage is that when players find meta games, they are usually very happy because it creates a pleasant surprise effect.

10. Mechanics «Micro-competition». Used when working with mini-games. It allows you to form mini-scores and is most suitable for games with several game mechanisms, as well as for situations with a large number of minicompetitions. It is easy to increase the loyalty of game participants with the help of a varied system of rewarding winners in mini-games.

11. Mechanic «Modifiers». In the mechanics under consideration, a certain object or artifact is used during the game, the use of which affects the results of tasks. This is called a modifier. Often the player earns it by completing a series of tasks or performing a series of important actions.

12. Mechanic «Pride». Based on positive feelings from the achieved result.

13. User progress mechanic. It is a mechanism that reflects the progress of the player in completing the tasks assigned to him by the game.

14. Instant reward mechanic. The player receives all information about his position in real time. As a result, he instantly reacts emotionally.

15. Real Prize Distribution mechanics. When using this mechanic, the player receives a reward that is of real, tangible value to the player for the results of the game. Each player can receive such a reward if they meet certain requirements or receive exceptional results.

Plot arc: the protagonist is a specialist in an information security services firm. He is tasked with improving the security system on the ship. Passing each level, he must solve information security problems close to real conditions. It is necessary that after passing the game the student masters certain competencies.

It is also interesting that the teacher can change the sequence of levels; the teacher can even remove some levels if he considers them not suitable in his course. To do this, the teacher will need to go to the «level constructor».

Level example

For example, consider the level of definition of the risk of an emergency, which is planned to be implemented in the near future.

At the initial stage of the game, students can be asked to calculate the possibility of an emergency on a given vessel. You can also give students the opportunity to choose a level: «Easy», «Intermediate», «Difficult». The selected level will determine the maximum number of points that a student can score when passing the level.

When choosing any level of difficulty, the student will be asked to take a training test, and if the test is successfully completed, the task will gradually open. When choosing an «easy» level, the student will need to choose from several proposed forms with the correct formulas and substitute parameters there based on the route of the vessel, the cargo being transported, the type of vessel, etc. When choosing a level of «medium» complexity, the student will need to draw up a form with formulas himself, but he will have the opportunity to refer to a short synopsis of theoretical information. And when choosing the «Difficult» level, the student will not have the opportunity to refer to theoretical materials. At the «intermediate» and «difficult» level, it is worth adding a «check» button, when the wrong decisions of the student will be highlighted during pressing, but it is worth limiting the number of clicks on this button.

The risk assessment of emergencies in this example is determined using statistics, route, etc. The model, which will describe the state of the ship's safety using risk assessment, is based on the statistics of emergencies in water transport. Statistics allow you to determine the type of flow of extreme events, as well as the trend equation [10-12].

To solve this problem, let us consider a statistical model of safety in water transport, taking into account the limited time interval t. Based on Poisson's law, consider the probability that k events will occur:

P{X(t, t) = k} =

ake-a

k\

where P is the probability of an event occurring;

X(t, t) is a function of the number of random hazardous

events;

k is the number of random hazardous events during the time t; a is a parameter depending on t and k; a = aT, where 1 is the intensity of the flow of dangerous events.

We can consider the general flow of random hazardous events in water transport as private flows of random events connected together for a number of causal factors. The sum of independent Poisson flows is also a Poisson flow [13, 14].

It was also taken into account that the occurrence of emergency situations in water transport can be defined as a sequence of incompatible events Alj and joint events Bt. Incompatible events Aj may include technogenic threats of the type (j = 1, 2, ..., J) on in the navigation area l (l = 1, 2, ..., L), for example, failure or breakdown of navigation systems, such a threat could be the cause of an emergency such as grounding, collision with another vessel or coastline, deviation from the route, flooding, etc. It should be noted that an emergency on a ship can be the result of only one of the many considered joint events Aj [15, 16]. The type of consequences i can be different, for example, flooding, grounding, fire, crash, collision.

Thus, if we take the average, from the ratio of the number of ships that have suffered corresponding accidents due to the onset of a man-made threat of the j-th type with damage i in the considered navigation area l to the total number of ships, we can determine the probability of a man-made threat of type j causing damage i.

K4) =

ZjZiZiNj

'jil

ZiNi

The weighted estimates of failures can be calculated using the formula:

M

(4) =

ZiN,

'jil

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

ZjZiZiNj

'jil

It should be borne in mind that the causes of an accident taken from statistical data can be subjective, since decisions about the specific cause of the emergency are based on expert judgment. An expert opinion is accepted during an official investigation of an accident in water transport [17, 18]. Therefore, we can consider the «subjective» a priori probabilities of the event P(Alj). Thus, events Alj and events Bt will be considered as hypotheses. Based on Bayes' theorem, it is possible to determine the probability of the «hypotheses» that caused the event Bi [19-21].

P(Alj\Bi) =

P(Alj) x P(Bi\Alj)

ZUlUPW * P(Bi\Alj)'

where P(Alj) are probabilistic hypotheses Alj;

P{Bi\A*j) — conditional probabilities of the event Bt under the

hypothesis P(Aj).

To predict and calculate the intensity of emergency situations due to natural disasters, unpredictable events, unfavorable weather conditions in the time interval T for region l, statistical data are required [22]. Thus, the intensity of emergency situations can be calculated by the formula:

ZjZiZiNj

Ijil

y(Bl\AJl)

If we consider one ship whose route passes through region l:

Y(Bi\Au

ZjZiZiNj

1jn

Ti x ZiS,

IT

where Zi$it is the number of ships passing through region l during time T.

Thus, we will calculate the level of emergency risk:

R(Bi\A^) = 1 - exp (-yBMiTl) ;

J

R(Bi)= * R(Bi\AL>;

1=1 3 J

R(B)= * R(Bi\AL> ■

i=i j=i

The cost of the risk of an emergency Rj can be calculated by determining the amount of possible damage / Wtldl.

R\ = P(Bi\A^) J W/dl.

The assessment of the risks of emergencies in water transport along the given routes can be presented as a sum of risks [23, 24]:

Pm = Pi + + P3 ,

where R1 is the risk of a natural disaster (natural threat); R2 is the risk of realization of man-made threats; R3 is the risk of realization of anthropogenic threats.

All of the above can be used as theoretical information for calculations. You can also consider several ways to calculate risk.

Interface concept

After loading the game, the user must have access to the menu: continue the game, select the game, select the level of the game, select the mini-game, view reports, ratings, settings, view controls, information about the game. Also, the user should be able to exit the game and return to the main menu and exit the main menu.

The game screen should display the time remaining until the completion of the level, place in the rating, level number, location (depending on the task), equipment (depending on the task).

Consider the use cases in the game menu presented in Figure 1.

Game menu

Fig. 1. Diagram of use cases in the game menu

Resume Game: The user can return to a saved game.

Level selection: the user can switch to a map with game levels, then he must select a level and start the game.

Select a mini-game: the user can switch to a map with mini-games, after which he must select a mini-game and start the game.

View reports: the user can view reports on the game, see what mistakes he made, which competencies he mastered better and which ones were worse. It is possible to save the report.

Ratings: User can see their rating in a group or among all students on the course.

Settings: the user can enter the settings menu, mute the sound, or select the volume. Turn off music. Choose a language.

View Control Settings: The user can perform a Control View to move around the playing field and manipulate objects.

View game information: the user can view information about the game, goals and objectives of the game.

Quit Game: The user can log out of the game.

Next, consider the use cases in the game scene, presented in Figure 2.

Pause menu: the player can pause the gameplay (if after 15 minutes the player does not return, the main menu opens). Then he has to resume it or go to the main menu.

Controls: the user can control the behavior of the character by moving to the right, left, selecting an item and moving the item.

Bag selection: the player can look at the items that he has in the inventory. They can be connected and modified, or taken in hand.

Hint: the player can ask the game for a hint.

Fig. 2. Diagram of use cases in a game scene

The player is responsible for moving the character around the playing field and manipulating objects. The character must move on the floor, not bump into obstacles in the form of furniture, take various objects. The level is considered not passed in the following cases:

• playing time ended, and the player was unable to solve the tasks assigned to him;

• the player solved the problems with errors.

Consider the activity diagram (Fig. 3). This diagram shows how the structure of a typical problem in the game will look like, i. e. structural element of the quest. Any task can be completed in at least three ways: the path where the user can make a mistake, the path where the user can complete the quest, and the path, and the path where the user does not have time to complete the quest.

Fig. 3. Diagram of activity of the general case

A non-linear sequence of related tasks defines the plot [25]. The possibility of three endings for all tasks performed is considered. The student's performance of the tasks depends on the available ending options. If the student completes all the quests correctly, then he gets the maximum mark for the game. If a student completes the tasks incorrectly, then the student receives an average grade and two options, either to stay with the grade he earned, or to go through additional quests to increase his grade. And if the student completed all the quests with gross errors, or did not complete them at all, then the student is invited to go through the game again, or be left with an unsatisfactory mark for the game.

The game is located only in one location - the ship, for which it is necessary to choose the means and methods of information security. The player sees the ship only from the inside.

Some quests will be implemented by the mechanics of dialogue, when it will be necessary to write letters to employees in compliance with the rules of business correspondence, where at each stage there is a choice of three options, each of which has its own consequences. If a student makes gross mistakes when solving a problem, then he will have to go through the quest again in order to get points for him.

Conclusion

The use of game mechanics in staff training is a fairly effective way of presenting information, which is aimed at increasing students' interest in their chosen profession. Simulators help students to try their hand at practice. By combining these two educational technologies, you can get a simulator on which the student will be interested in practicing and improving his knowledge.

Acknowledgements

We should also single out Sergey Kolesnichenko for his quality advice when working on an article. we should also thank Alexey Astapkovich for his help in checking the text and creating a working environment.

References

1. Sokolov S. S., Mitrofanova A. V., Glebov N. B., et al. Formation of the Electronic Educational Trajectory for Maritime Students, Quality Management, Transport and Information Security, Information Technologies (IT&QM&IS): Proceedings of 2018 IEEE International Conference, Saint Petersburg, Russia, September 24-28, 2018. Institute of Electrical and Electronics Engineers, 2018, Pp. 150-153.

DOI: 10.1109/ITMQIS.2018.8524913.

2. Vishtak O. V., Abushaev I. R. Trebovaniya k kon-struktoru veb-kvestov [Requirements Designer Web Quests], Sovremennye web-tekhnologii v tsifrovom obrazovanii: znachenie, vozmozhnosti, realizatsiya: Sbornik statey uchast-nikov V Mezhdunarodnoy nauchno-prakticheskoy konferentsii [Modern Web Technologies in Digital Education: Meaning, Opportunities, Realization: Collection of Research Articles of the V International Scientific and Practical Conference], Arzamas, Russia, May 17-18, 2019. Arzamas, Arzamas Branch of Lobachevsky University, 2019, Pp. 74-77. (In Russian)

3. Kovalnogova N. M., Sokolov S. S., Chernyi S. G., et al. Applying of E-learning and Distance Learning Technologies in Electronic Informational-Educational Environment in Modern University Complex, Proceedings of the XIX International

Conference on Soft Computing and Measurements (SCMS2016), Saint Petersburg, Russia, May 25-27, 2016. Institute of Electrical and Electronics Engineers, 2016, Pp. 446-448. DOI: 10.1109/SCM.2016.7519809.

4. Small G. W., Vorgan G. iBrain: Surviving the Technological Alteration of the Modern Mind. HarperCollins Publishers, 2008, 256 p.

5. Skalozub I. S. Kompyuternye igry kak sredstvo razvitiya kommunikativnykh i lichnostnykh osobennostey podrostkov [Computer Games as a Means of Developing Communicative and Personal Characteristics of Adolescents], Molodoy uchenyy [Young Scientist], 2015, No. 4 (84), Pp. 674-677. (In Russian)

6. Ilchenko L. M., Sokolov S. S., Egorova K. V., et al. Analysis of the Main Types of Automated Information Systems in the Transport Sector, Functioning Mainly in Urban Agglomerations, Proceedings of the 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), Saint Petersburg, Moscow, Russia, January 26-28, 2021. Institute of Electrical and Electronics Engineers, 2021, Pp. 401-406.

DOI: 10.1109/ElConRus51938.2021.9396630.

7. Egorova K. V., Ilchenko L. M., Sokolov S. S., et al. Analysis of Automated Transport Information Systems in the Context of Critical Information Infrastructure of the Russian Federation, Proceedings of the 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), Saint Petersburg, Moscow, Russia, January 26-28, 2021. Institute of Electrical and Electronics Engineers, 2021, Pp. 310-313.

DOI: 10.1109/ElConRus51938.2021.9396083.

8. Kardakova M. V., Shipunov I. S., Nyrkov A. P., Knysh T. P. Cyber Security on Sea Transport. In: Murgul V., Pasetti M. (eds.) Energy Management of Municipal Facilities and Sustainable Energy Technologies (EMMFT 2018): Proceedings of the 20th International Scientific Conference, Voronezh, Samara, Russia, December 10-13, 2018. Volume 1. Cham, Springer Nature, 2019, Pp. 481-490. (Advances in Intelligent Systems and Computing, Vol. 982).

DOI: 10.1007/978-3-030-19756-8_46.

9. Sokolov S. S., Saveleva M. N., Mitrofanova A. V., et al. Implementation of Training Programs Using Digital Distance Education Technologies for Seafarers, Proceedings of the 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), Saint Petersburg, Moscow, Russia, January 27-30, 2020. Institute of Electrical and Electronics Engineers, 2020, Pp. 521-525.

DOI: 10.1109/EIConRus49466.2020.9039034.

10. Shipunov I. S., Voevodskiy K. S., Nyrkov A. P., et al. About the Problems of Ensuring Information Security on Unmanned Ships, Proceedings of the 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), Saint Petersburg, Moscow, Russia, January 28-31, 2019. Institute of Electrical and Electronics Engineers, 2019, Pp. 339-343.

DOI: 10.1109/EIConRus.2019.8657219.

11. Shipunov I. S., Voevodskiy K. S., Nyrkov A. P., et al. Trusted Transport Telemetry by Using Distributed Databases, Proceedings of the 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (El-ConRus), Saint Petersburg, Moscow, Russia, January 28-31,

2019. Institute of Electrical and Electronics Engineers, 2019, Pp. 344-347. DOI: 10.1109/EIConRus.2019.8657215.

12. Sokolov S. S., Alimov O. M., Nekrashevich P. S., et al. Security Issues and IoT Integration for in Russian Industry, Proceedings of the 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), Saint Petersburg, Moscow, Russia, January 27-30, 2020. Institute of Electrical and Electronics Engineers, 2020, Pp. 517-520. DOI: 10.1109/EIConRus49466.2020.9039213.

13. Kotenko I. V., Saenko I. B., Lauta O. S. Analytical Modeling and Assessment of Cyber Resilience on the Base of Stochastic Networks Conversion, Proceedings of the 10th International Workshop on Resilient Networks Design and Modeling (RNDM 2018), Longyearbyen, Norway, August 27-29, 2018. Institute of Electrical and Electronics Engineers, 2018, Pp. 1-8. DOI: 10.1109/RNDM.2018.8489830.

14. Faustova O. G. Metodika otsenki riskov vozniknoveni-ya chrezvychaynykh situatsiy v multimodalnykh perevozkakh [Technique of an Assessment of Risks of Emergency Situations in Multimodal Transportations], Vestnik Astrakhanskogo gosudarstvennogo tekhnicheskogo universiteta. Seriya: Morskaya tekhnika i tekhnologiya [Vestnik of Astrakhan State Technical University. Series: Marine Engineering and Technologies], 2014, No. 1, Pp. 109-116. (In Russian)

15. Veselkov V. V., Vikhrov N. M., Nyrkov A. P., et al. Development of Methods to Identify Risks to Build up the Automated Diagnosis Systems, Proceedings of the 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), Saint Petersburg, Moscow, Russia, February 01-03, 2017. Institute of Electrical and Electronics Engineers, 2017, Pp. 598-601.

DOI: 10.1109/EIConRus.2017.7910625.

16. Saenko I. B., Ageev S. A., Kotenko I. V. Detection of Traffic Anomalies in Multi-Service Networks Based on a Fuzzy Logical Inference. In: Badica C., et al. (eds.) Intelligent Distributed Computing X (IDC'2016): Proceedings of the 10th International Symposium on Intelligent Distributed Computing Paris, France, October 10-12, 2016. Cham, Springer Nature, 2017, Pp. 79-88. (Studies in Computational Intelligence, Vol. 678). DOI: 10.1007/978-3-319-48829-5_8.

17. Sokolov S. S., Alimov O. M., Golubeva M. G. The Automating Process of Information Security Management, Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), Moscow, Saint Petersburg, Russia, January 29-February 01, 2018. Institute of Electrical and Electronics Engineers, 2018, Pp. 124-127. DOI: 10.1109/EIConRus.2018.8317045.

18. Sokolov S. S., Glebov N. B., Novoselov R. O., Chernyi S. G. Database Problems of Maritime Transport Industry on High Load Platform, TransSiberia 2018: Proceedings of the Siberian Transport Forum, Novosibirsk, Russia, May 16-19, 2018. MATEC Web of Conferences, 2018, Vol. 239, Art. No. 03004, 6 p. DOI: 10.1051/matecconf/201823903004.

19. Anardovich S. S., Rush E. A. Metody otsenki riskov i prognozirovanie stsenariev razvitiya chrezvychaynykh situatsiy pri zheleznodorozhnykh perevozkakh [Risk Assessment Methods and Forecasting Emergency Development Scenarios for Railway Transportation], Sovremennye tekhnologii. Sis-temnyy analiz. Modelirovanie [Modern Technologies. System Analysis. Modeling], 2020, Vol. 65, No. 1, Pp. 66-75.

DOI: 10.26731/1813-9108.2020.1(65).66-75. (In Russian)

20. Egorova K. V., Ilchenko L. M., Sokolov S. S., Katorin Yu. F. Analysis of Automated Transport Information Systems in the Context of Critical Information Infrastructure of the Russian Federation, Proceedings of the 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), Saint Petersburg, Moscow, Russia, January 26-28, 2021. Institute of Electrical and Electronics Engineers, 2021, Pp. 310-313.

DOI: 10.1109/ElConRus51938.2021.9396083.

21. Sokolov S. S., Gaskarov V. D., Knysh T. P., Sagitova A. S. IoT Security: Threats, Risks, Attacks. In: Mottaeva A. (ed.) Proceedings of the XIII International Scientific Conference on Architecture and Construction (ISCAC 2020), Novosibirsk, Russia, September 22-24, 2020. Singapore, Springer Nature Singapore, 2020, Pp. 47-56. (Lecture Notes in Civil Engineering, Vol. 130). DOI: 10.1007/978-981-33-6208-6_6.

22. Burlov V. G., Grachev M. I. Management Model in Digital Ecosystems, Germany and Russia: Ecosystems Without Borders: Proceedings of the International Conference Within the Framework of the VIII Annual International Baltic Maritime Forum, Kaliningrad, Russia, 05-10 October 2020. IOP Conference Series: Earth and Environmental Science, 2021, Vol. 689, Art. No. 012010, 7 p.

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

DOI: 10.1088/1755-1315/689/1/012010.

23. Sokolov S. S., Zhilenkov A. A., Chernyi S. G., et al. Hybrid Neural Networks in Cyber Physical System Interface Control Systems, Bulletin of Electrical Engineering and Informatics, 2020, Vol. 9, No. 3, Pp. 1268-1275.

DOI: 10.11591/eei.v9i3.1293.

24. Sokolov S. S., Saenko I. B., Mitrofanov M. A., et al. Analytical Modeling of Computer Attacks on Intelligent Transport Systems Based on the Transformation of Stochastic Networks. In: Kovalev S., et al. (eds.) Intelligent Information Technologies for Industry (IITT21): Proceedings of the Fifth International Scientific Conference Sirius, Russia, September 30-October 04, 2021. Cham, Springer Nature, 2021, Pp. 489-498. (Lecture Notes in Networks and Systems, Vol. 330).

DOI: 10.1007/978-3-030-87178-9_49.

25. Glebov N. B., Zhilenkov A. A., Chernyi S. G., Sokolov S. S. Process of the Positioning Complex Modeling Objects with Elements of Intellectual Analysis, Procedia Computer Science, 2019, Vol. 150, Pp. 609-615.

DOI: 10.1016/j.procs.2019.02.094.

DOI: i0.244i2/24i3-2527-2022-33i-52-60

Концепция игрового тренажера по защите информации на водном транспорте

М. В. Кардакова, д.т.н. А. П. Нырков, Ю. В. Цымай Государственный университет морского и речного флота имени адмирала С. О. Макарова

Санкт-Петербург, Россия m.v.kardakova@ya.ru, apnyrkow@mail.ru, m-walua@yandex.ru

Аннотация. В статье рассматривается возможность применения игровых тренажеров при обучении персонала или студентов. Рассмотрена актуальность применения тренажеров при обучении студентов информационной безопасности на водном транспорте. Актуальность таких тренажеров подчеркивается возможностью их использования в дистанционном обучении. Использование узнаваемого жанра, знакомого и популярного среди школьников в виртуальном мире, позволяет получить положительные эмоции, повысить интерес и мотивацию к развитию познавательной деятельности. Описаны игровые механики, применяемые в тренажере. Рассмотрен пример расчета риска возникновения чрезвычайной ситуации на судне, предложены варианты использования расчетов в тренажере. Описана концепция самого тренажера и разработана концепция интерфейса. Использование тренажеров в обучении позволяет научить студентов практическим навыкам работы с чем-либо. Как правило, такой подход к обучению требует от студента знания теории предмета, а также активного участия в работе. Таким образом, у студента есть возможность продемонстрировать свои знания на практике и повысить квалификацию. Конечно, никакой тренажер не заменит реальный прибор или реальную ситуацию, но такой подход в обучении поможет закрепить материал и в будущем ученик, увидев реальный объект, не потеряется и сможет спокойно работать с ним. Использование тренажеров информационной безопасности в образовательных целях обеспечивает закрепление теоретических знаний и их применение на практике. Очень важно, чтобы тренажеры, с одной стороны, были приближены к реальным условиям, а с другой, чтобы работа на них была интересной и удобной для обучающегося.

Ключевые слова: транспорт, водный транспорт, судно, корабль, тренажер, игра, образование, риск.

Литература

1. Formation of the Electronic Educational Trajectory for Maritime Students / S. S. Sokolov, A. V. Mitrofanova, N. B. Gle-bov, [et al.] // Quality Management, Transport and Information Security, Information Technologies (IT&QM&IS): Proceedings of 2018 IEEE International Conference (Saint Petersburg, Russia, 24-28 September 2018). — Institute of Electrical and Electronics Engineers, 2018. — Pp. 150-153.

DOI: 10.1109/ITMQIS.2018.8524913.

2. Виштак, О. В. Требования к конструктору веб-квестов / О. В. Виштак, И. Р. Абушаев // Современные web-технологии в цифровом образовании: значение, возможности, реализация: Сборник статей участников V Международной научно-практической конференции (Арзамас, Россия, 17-18 мая 2019 г.). — Арзамас: Арзамасский филиал ННГУ им. Лобачевского, 2019. — С. 74-77.

3. Applying of E-learning and Distance Learning Technologies in Electronic Informational-Educational Environment in

Modern University Complex / N. M. Kovalnogova, S. S. So-kolov, S. G. Chernyi, [et al.] // Proceedings of the XIX International Conference on Soft Computing and Measurements (SCM'2016), (Saint Petersburg, Russia, 25-27 May 2016). — Institute of Electrical and Electronics Engineers, 20i6. — Pp. 446-44S. DOI: 10.ii09/SCM.20i6.75i9S09.

4. Small, G. W. iBrain: Surviving the Technological Alteration of the Modern Mind / G. W. Small, G. Vorgan. — HarperCollins Publishers, 200S. — 256 p.

5. Скалозуб, И. С. Компьютерные игры как средство развития коммуникативных и личностных особенностей подростков II Молодой ученый. 2015. № 4 (84). С. 674-677.

6. Analysis of the Main Types of Automated Information Systems in the Transport Sector, Functioning Mainly in Urban Agglomerations / L. M. Ilchenko, S. S. Sokolov, K. V. Egorova, [et al.] // Proceedings of the 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), (Saint Petersburg, Moscow, Russia, 26-2S January 2021). — Institute of Electrical and Electronics Engineers, 2021. — Pp. 401-406.

DOI: 10.1109/ElConRus5193S.2021.9396630.

7. Analysis of Automated Transport Information Systems in the Context of Critical Information Infrastructure of the Russian Federation / K. V. Egorova, L. M. Ilchenko, S. S. Sokolov, [et al.] // Proceedings of the 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), (Saint Petersburg, Moscow, Russia, 26-2S January 2021). — Institute of Electrical and Electronics Engineers, 2021. — Pp. 310-313.

DOI: 10.1109/ElConRus5193S.2021.93960S3.

S. Cyber Security on Sea Transport / M. V. Kardakova, I. S. Shipunov, A. P. Nyrkov, T. P. Knysh // Energy Management of Municipal Facilities and Sustainable Energy Technologies (EMMFT 201S): Proceedings of the 20th International Scientific Conference (Voronezh, Samara, Russia, 10-13 December 201S). Volume 1 / V. Murgul, M. Pasetti (eds.). — Cham: Springer Nature, 2019. — Pp. 4S1-490. — (Advances in Intelligent Systems and Computing. Vol. 9S2). DOI: 10.1007/97S-3-030-19756-S_46.

9. Implementation of Training Programs Using Digital Distance Education Technologies for Seafarers / S. S. Soko-lov, M. N. Saveleva, A. V. Mitrofanova, [et al.] // Proceedings of the 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), (Saint Petersburg, Moscow, Russia, 27-30 January 2020). — Institute of Electrical and Electronics Engineers, 2020. — Pp. 521-525. DOI: 10.1109/EIConRus49466.2020.9039034.

10. About the Problems of Ensuring Information Security on Unmanned Ships / I. S. Shipunov, K. S. Voevodskiy,

A. P. Nyrkov, [et al.] II Proceedings of the 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), (Saint Petersburg, Moscow, Russia, 2S-31 January 2019). — Institute of Electrical and Electronics Engineers, 2019. — Pp. 339-343. DOI: 10.1109/EIConRus.2019.8657219.

11. Trusted Transport Telemetry by Using Distributed Databases I I. S. Shipunov, K. S. Voevodskiy, A. P. Nyrkov, [et al.] II Proceedings of the 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), (Saint Petersburg, Moscow, Russia, 2S-31 January 2019). — Institute of Electrical and Electronics Engineers, 2019. — Pp. 344-347. DOI: 10.1109/EIConRus.2019.8657215.

12. Security Issues and IoT Integration for in Russian Industry I S. S. Sokolov, O. M. Alimov, P. S. Nekrashevich, [et al.] II Proceedings of the 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), (Saint Petersburg, Moscow, Russia, 27-30 January 2020). — Institute of Electrical and Electronics Engineers, 2020. — Pp. 517-520. DOI: 10.1109/EIConRus49466.2020.9039213.

13. Kotenko, I. V. Analytical Modeling and Assessment of Cyber Resilience on the Base of Stochastic Networks Conversion I I. V. Kotenko, I. B. Saenko, O. S. Lauta II Proceedings of the 10th International Workshop on Resilient Networks Design and Modeling (RNDM 201S), (Longyearbyen, Norway, 27-29 August 201S). — Institute of Electrical and Electronics Engineers, 201S. — Pp. 1-S.

DOI: 10.1109/RNDM.201S.S4S9S30.

14. Фаустова, О. Г. Методика оценки рисков возникновения чрезвычайных ситуаций в мультимодальных перевозках II Вестник Астраханского государственного технического университета. Серия: Морская техника и технология. 2014. № 1. С. 109-116.

15. Development of Methods to Identify Risks to Build Up the Automated Diagnosis Systems I V. V. Veselkov, N. M. Vi-khrov, A. P. Nyrkov, [et al.] II Proceedings of the 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), (Saint Petersburg, Moscow, Russia, 01-03 February 2017). — Institute of Electrical and Electronics Engineers, 2017. — Pp. 59S-601.

DOI: 10. ll09/EIConRus.20l7.79l0625.

16. Saenko, I. B. Detection of Traffic Anomalies in Multi-Service Networks Based on a Fuzzy Logical Inference I I. B. Saenko, S. A. Ageev, I. V. Kotenko II Intelligent Distributed Computing X (IDC 2016): Proceedings of the 10th International Symposium on Intelligent Distributed Computing (Paris, France, 10-12 October 2016) I C. Badica, [et al.] (eds.). — Cham: Springer Nature, 2017. — Pp. 79-SS. — (Studies in Computational Intelligence. Vol. 67S).

DOI: 10.1007I97S-3-3 l9-4SS29-5_S.

17. The Automating Process of Information Security Management I S. S. Sokolov, O. M. Alimov, M. G. Golubeva II Proceedings of the 201S IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), (Moscow, Saint Petersburg, Russia, 29 January-01 February 201S). — Institute of Electrical and Electronics Engineers, 201S. — Pp. 124-127.

DOI: 10. ll09/EIConRus.20lS.S3l7045.

1S. Database Problems of Maritime Transport Industry on High Load Platform I S. S. Sokolov, N. B. Glebov, R. O. No-voselov, S. G. Chernyi II TransSiberia 201S: Proceedings of the Siberian Transport Forum (Novosibirsk, Russia, 16-19 May 201S). MATEC Web of Conferences. 201S. Vol. 239. Art. No. 03004. 6 p. DOI: l0.l05lImatecconfI20lS23903004.

19. Анардович, С. С. Методы оценки рисков и прогнозирование сценариев развития чрезвычайных ситуаций при железнодорожных перевозках I С. С. Анардович, Е. А. Руш II Современные технологии. Системный анализ. Моделирование. 2020. T. 65, № 1. C. 66-75.

DOI: l0.2673lIlSl3-9l0S.2020.l(65).66-75.

20. Analysis of Automated Transport Information Systems in the Context of Critical Information Infrastructure of the Russian Federation I K. V. Egorova, L. M. Ilchenko, S. S. So-kolov, Yu. F. Katorin II Proceedings of the 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), (Saint Petersburg, Moscow, Russia, 26-2S January 2021). — Institute of Electrical and Electronics Engineers, 2021. — Pp. 310-313.

DOI: l0.ll09/ElConRus5l93S.202l.93960S3.

21. IoT Security: Threats, Risks, Attacks I S. S. Sokolov, V. D. Gaskarov, T. P. Knysh, A. S. Sagitova II Proceedings of the XIII International Scientific Conference on Architecture and Construction (ISCAC 2020), (Novosibirsk, Russia, 22-24 September 2020) I A. Mottaeva (ed.). — Singapore: Springer Nature Singapore, 2020. — Pp. 47-5б. — (Lecture Notes in Civil Engineering. Vol. 130). DOI: l0.l007I97S-9Sl-33-620S-6_6.

22. Burlov, V. G. Management Model in Digital Ecosystems I V. G. Burlov, M. I. Grachev II Germany and Russia: Ecosystems Without Borders: Proceedings of the International Conference Within the Framework of the VIII Annual International Baltic Maritime Forum (Kaliningrad, Russia, 05-10 October 2020). IOP Conference Series: Earth and Environmental Science. 2021. Vol. 6S9. Art. No. 012010. 7 p.

DOI: 10.10SSI1755-1315I6S9I1I012010.

23. Hybrid Neural Networks in Cyber Physical System Interface Control Systems I S. S. Sokolov, A. A. Zhilenkov, S. G. Chernyi, [et al.] II Bulletin of Electrical Engineering and Informatics. 2020. Vol. 9, No. 3. Pp. 126S-1275.

DOI: l0.ll59lIeei.v9i3.l293.

24. Analytical Modeling of Computer Attacks on Intelligent Transport Systems Based on the Transformation of Stochastic Networks I S. S. Sokolov, I. B. Saenko, M. A. Mitro-fanov, [et al.] II Intelligent Information Technologies for Industry (IITI 21): Proceedings of the Fifth International Scientific Conference (Sirius, Russia, 30 September-04 October 2021) I S. Kovalev, [et al.] (eds.). — Cham: Springer Nature, 2021. — Pp. 4S9-49S. — (Lecture Notes in Networks and Systems. Vol. 330). DOI: l0.l007I97S-3-030-S7l7S-9_49.

25. Process of the Positioning Complex Modeling Objects with Elements of Intellectual Analysis I N. B. Glebov, A. A. Zhi-lenkov, S. G. Chernyi, S. S. Sokolov II Procedia Computer Science. 2019. Vol. 150. Pp. 609-615.

DOI: l0.l0l6Ij.procs.20l9.02.094.

i Надоели баннеры? Вы всегда можете отключить рекламу.