Applying Fuzzy Expert System to Information Security Risk Assessment - A Case Study on an Attendance System

被引:0
|
作者
Chang, Li-Yun [1 ]
Lee, Zne-Jung [2 ]
机构
[1] Huafan Univ, Dept Mech Engn, Hfu Taipei, Taiwan
[2] Huafan Univ, Dept Mangement Informat Syst, Taipei, Taiwan
来源
2013 INTERNATIONAL CONFERENCE ON FUZZY THEORY AND ITS APPLICATIONS (IFUZZY 2013) | 2013年
关键词
ISO; 27001; Information Security; Risk Assessment; Fuzzy Expert System;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As computer becomes popular and internet advances rapidly, information application systems are used extensively in organizations. Various information application systems such as attendance systems, accounting systems, and statistical systems have already replaced manual operations. In such a drastic change, the information security issue encountered by organizations becomes increasingly significant. This study adopts an attendance system of a governmental organization to explore the information security issue. The risk assessment of the attendance system mainly focuses on the assessments of confidentiality, integrity and availability. Weak points of the attendance system and threats to the outside are also included in the scope of consideration. This study adopts the ISO/IEC 27001 information security management system standard and ISO/IEC27005:2008 Information technology Security techniques - Information security risk management to explore the risk assessment method of the attendance system and establish a set of fuzzy expert systems to measure the value at risk. In the meantime, a recommended acceptable value at risk is provided for facilitating and assisting decision makers through practical aspects and fuzzy expert systems and used as a reference for selecting an acceptable value at risk.
引用
收藏
页码:346 / 351
页数:6
相关论文
共 50 条
  • [21] Application of Fuzzy Logic in the Process of Information Security Risk Assessment
    Kokles, Mojmir
    Filanova, Jana
    Korcek, Frantisek
    INNOVATION MANAGEMENT AND EDUCATION EXCELLENCE VISION 2020: FROM REGIONAL DEVELOPMENT SUSTAINABILITY TO GLOBAL ECONOMIC GROWTH, VOLS I - VI, 2016, : 1078 - 1088
  • [22] The Information Security Risk Assessment Based on Fuzzy Comprehensive Evaluation
    Li Guohong
    Cai Yongkai
    PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS A-C, 2008, : 2027 - 2031
  • [23] Fuzzy Logic Driven Expert System for the Assessment of Software Projects Risk
    Ibraigheeth, Mohammad Ahmad
    Fadzli, Syed Abdullah
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (02) : 153 - 158
  • [24] Expert System for Assessing the Efficiency of Information Security
    Erulanova, Aizhan
    Soltan, Gulzhan
    Baidildina, Aizhan
    Amangeldina, Marzhan
    Aset, Askhat
    2020 7TH INTERNATIONAL CONFERENCE ON ELECTRICAL AND ELECTRONICS ENGINEERING (ICEEE 2020), 2020, : 355 - 359
  • [25] A Study of Information Security Evaluation and Risk Assessment
    Li, Jingyi
    Chao, Shiwei
    Huo, Minxia
    2015 FIFTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2015, : 1909 - 1912
  • [26] Modifications of the Formal Risk Analysis and Assessment for the Information System Security
    El Fray, Imed
    Wilinski, Artur
    ADVANCES IN SCIENCE AND TECHNOLOGY-RESEARCH JOURNAL, 2024, 18 (02) : 317 - 332
  • [27] A fuzzy risk assessment model for hospital information system implementation
    Yucel, Gulcin
    Cebi, Selcuk
    Hoege, Bo
    Ozok, Ahmet F.
    EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (01) : 1211 - 1218
  • [28] Classified Information System Security Risk Assessment Model of the Research
    Peng, Chong
    Shao, Liping
    2015 INTERNATIONAL CONFERENCE ON LOGISTICS, INFORMATICS AND SERVICE SCIENCES (LISS), 2015,
  • [29] A Method of Information Security Risk Assessment Using Fuzzy Number Operations
    Fu, Yu
    Qin, Yanlin
    Wu, Xiaoping
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12564 - 12567
  • [30] Using fuzzy logic and entropy theory to risk assessment of the information security
    Zhao, DM
    Wang, JH
    Wu, J
    Ma, JF
    Proceedings of 2005 International Conference on Machine Learning and Cybernetics, Vols 1-9, 2005, : 2448 - 2453