Open Access

Security in Topological, Functional and Semiotic Terms


Cite

The article is devoted to the modeling of object structures in sequences of event processes characteristic of critical infrastructure (CI) objects arising in emergency situations. The identification of risky sequences of events is a key issue carried out in topological, functional and semiotic terms. The topological approach includes flat, hierarchical and hypergraph - it is possible by means of transformations of equivalent models of the event network through its simplification to the form of a hypothesis or towards the desired functionality. The functionality approach covers theorizing and plural problems in the processes of the creation of a priori and aposteriorical errors of multiplication and synthesis on the basis of also incorrect graphical models of functioning. The semiotic approach captures combinatorically related functional and structural errors, which are impossible to identify and remove by means of arithmetic-logical tests. Currently, this is possible only on the basis of the paradigm of the characterization theory, which guarantees a semantic relationship between the correctness of the functioning and the structure of the analyzed versus the synthesized object of research.