Information Security Risk Assessment by using Bayesian Learning Technique

被引:0
作者
Foroughi, Farhad [1 ]
机构
[1] Univ Sunderland, Sunderland SR2 7EE, Durham, England
来源
WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II | 2008年
关键词
Bayesian belief network; Bayesian learning; information security; intelligent agent; risk assessment;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The organisations need an information security risk management to evaluate asset's values and related risks. The risk management is usually a human activity which includes risk assessment, strategy development and risk mitigation by using managerial resources. The significant part of risk assessment which identifies threats and vulnerabilities, is very relevant to the past incidents, their likelihood and impacts. The problem is the risk identification and evaluation of new assets according to their properties, current security controls and consequences of before incidents. According to this problem, a system that could assist experts or works on behalf of them to assess the risks during the normal working processes is required. The system should be reactive and autonomous because it is needed to respond immediately and independently of events. An intelligent software agent is the best solution for this aim. It learns risk of past experiences regarding to risk factors and asset's properties, and predicts the probability of new risk for a new instance. This article will describe an intelligent system which is based on Bayesian Learning Technique for Information Security Risk Assessment.
引用
收藏
页码:91 / 95
页数:5
相关论文
共 7 条
[1]  
BERGER B, 2003, DATA CENTRIC QUANTIT
[2]   Assessing knowledge assets: a review of the models used to measure intellectual capital [J].
Bontis, N .
INTERNATIONAL JOURNAL OF MANAGEMENT REVIEWS, 2001, 3 (01) :41-60
[3]  
*BSI, 2002, PD 3002 2002 GUID BS
[4]  
*CSI FBI, 2007, 12 ANN COMP CRIM SEC
[5]  
Hui AKT, 2004, P A REL MAI, P297
[6]  
Mukhopadhyay A., 2006, P 39 ANN HAW INT C S, P126, DOI [10.1109/HICSS.2006, DOI 10.1109/HICSS.2006]
[7]  
Wang XF, 2000, FOURTH INTERNATIONAL CONFERENCE ON MULTIAGENT SYSTEMS, PROCEEDINGS, P459, DOI 10.1109/ICMAS.2000.858524