Information security risk analysis model using fuzzy decision theory

被引:41
作者
Henriques de Gusmao, Ana Paula [1 ]
Camara e Silva, Lucio [1 ]
Silva, Maisa Mendonca [1 ]
Poleto, Thiago [1 ]
Cabral Seixas Costa, Ana Paula [1 ]
机构
[1] Univ Fed Pernambuco, Dept Engn Management, BR-50722970 Recife, PE, Brazil
关键词
Information security; Risk analysis; Fuzzy decision theory; EVENT TREE; REASONABLE PROPERTIES; INSIDER THREAT; RANKING; MANAGEMENT; FRAMEWORK; SYSTEMS; UNCERTAINTIES; OPTIMIZATION; BUSINESS;
D O I
10.1016/j.ijinfomgt.2015.09.003
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
This analysis model for information security assessment, which identifies and evaluates the sequence of events - referred to as alternatives - in a potential accident scenario following the occurrence of an initiating event corresponding to abuses of Information Technology systems. In order to perform this evaluation, this work suggests the use of Event Tree Analysis combined with fuzzy decision theory. The contributions of the present proposal are: the development of a taxonomy of events and scenarios, the ranking of alternatives based on the criticality of the risk, considering financial losses, and finally, the provision of information regarding the causes of information system attacks of highest managerial relevance for organizations. We included an illustrative example regarding a data center aiming to illustrate the applicability of the proposed model. To assess its robustness, we analyzed twelve alternatives considering two different methods of setting probabilities of the occurrence of events. Results showed that deliberate external database services attack represent the most risky alternative. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:25 / 34
页数:10
相关论文
共 68 条
[1]   A new approach for ranking of trapezoidal fuzzy numbers [J].
Abbasbandy, S. ;
Hajjari, T. .
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2009, 57 (03) :413-419
[2]   FUZZY DECISION TREES [J].
ADAMO, JM .
FUZZY SETS AND SYSTEMS, 1980, 4 (03) :207-219
[3]  
Alter S., 2004, COMMUN ASSOC INF SYS, V14, P1, DOI 10.17705/1CAIS.01401
[4]  
Anderson R., 2005, IEEE SECURITY PRIVAC
[5]  
Anderson Ross, 2001, ACSAC 01 P 17 ANN CO, V17, P358, DOI DOI 10.1109/ACSAC.2001.991552
[6]  
Andrews J. D., 2000, IEEE T RELIALABILITY, V49
[7]  
[Anonymous], 1988, Fuzzy MAthematical Models in Engineering and Management Science
[8]  
[Anonymous], 2015, INT SERIES OPERATION
[9]   A risky business or a safe BET? A Fuzzy Set Event Tree for estimating hazard in biotelemetry studies [J].
Bidder, O. R. ;
Arandjelovic, O. ;
Almutairi, F. ;
Shepard, E. L. C. ;
Lambertucci, S. A. ;
Qasem, L. A. ;
Wilson, R. P. .
ANIMAL BEHAVIOUR, 2014, 93 :143-150
[10]   An economic modelling approach to information security risk management [J].
Bojanc, Rok ;
Jerman-Blazic, Borka .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2008, 28 (05) :413-422