Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory

被引:51
作者
Henriques de Gusmao, Ana Paula [1 ]
Silva, Maisa Mendonca [1 ]
Poleto, Thiago [1 ]
Camara e Silva, Lucio [1 ]
Cabral Seixas Costa, Ana Paula [1 ]
机构
[1] Univ Fed Pernambuco, CDSID, Caixa Postal 5125, BR-52070970 Recife, PE, Brazil
关键词
Cybersecurity; Information security; Risk analysis model; Fuzzy decision theory; Fault tree analysis; INFORMATION SECURITY MANAGEMENT; CYBER-ATTACKS; E-COMMERCE; NETWORK; PRIVACY; VULNERABILITY; INVESTMENT; KNOWLEDGE; SYSTEM;
D O I
10.1016/j.ijinfomgt.2018.08.008
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Cybersecurity, which is defined as information security aimed at averting cyberattacks, which are among the main issues caused by the extensive use of networks in industrial control systems. This paper proposes a model that integrates fault tree analysis, decision theory and fuzzy theory to (i) ascertain the current causes of cyberattack prevention failures and (ii) determine the vulnerability of a given cybersecurity system. The model was applied to evaluate the cybersecurity risks involved in attacking a website, e-commerce and enterprise resource planning (ERP), and to assess the possible consequences of such attacks; we evaluate these consequences, which include data dissemination, data modification, data loss or destruction and service interruption, in terms of criteria related to financial losses and time for restoration. The results of the model application demonstrate its usefulness and illustrate the increased vulnerability of e-commerce to cybersecurity attacks, relative to websites or ERP, due partly to frequent operator access, credit transactions and users' authentication problems characteristic of e-commerce.
引用
收藏
页码:248 / 260
页数:13
相关论文
共 79 条
[1]  
Abdo H., 2017, SAFETY SECURITY RISK
[2]   Cloud-based business services innovation: A risk management model [J].
Ali, Ali ;
Warren, Derrick ;
Mathiassen, Lars .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2017, 37 (06) :639-649
[3]  
Anderson CL, 2010, MIS QUART, V34, P613
[4]  
[Anonymous], 2015, MULTICRITERIA MULTIO
[5]   Improving information security management: An analysis of ID-password usage and a new login vulnerability measure [J].
Bang, Youngsok ;
Lee, Dong-Joo ;
Bae, Yoon-Soo ;
Ahn, Jae-Hyeon .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2012, 32 (05) :409-418
[6]   Enforcing privacy in e-commerce by balancing anonymity and trust [J].
Bella, Giampaolo ;
Giustolisi, Rosario ;
Riccobene, Salvatore .
COMPUTERS & SECURITY, 2011, 30 (08) :705-718
[7]  
Bellman R. E., 1971, Decision-making in a fuzzy environment, DOI 10.1287/mnsc.17.4.B141
[8]  
Belyaev L. S., 1977, PRACTICAL APPROACH C, V1
[9]   Effects of cyber security knowledge on attack detection [J].
Ben-Asher, Noam ;
Gonzalez, Cleotilde .
COMPUTERS IN HUMAN BEHAVIOR, 2015, 48 :51-61
[10]   Cyber-Attacks - Trends, Patterns and Security Countermeasures [J].
Bendovschi, Andreea .
7TH INTERNATIONAL CONFERENCE ON FINANCIAL CRIMINOLOGY 2015, 7TH ICFC 2015, 2015, 28 :24-31