Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory

被引:51
作者
Henriques de Gusmao, Ana Paula [1 ]
Silva, Maisa Mendonca [1 ]
Poleto, Thiago [1 ]
Camara e Silva, Lucio [1 ]
Cabral Seixas Costa, Ana Paula [1 ]
机构
[1] Univ Fed Pernambuco, CDSID, Caixa Postal 5125, BR-52070970 Recife, PE, Brazil
关键词
Cybersecurity; Information security; Risk analysis model; Fuzzy decision theory; Fault tree analysis; INFORMATION SECURITY MANAGEMENT; CYBER-ATTACKS; E-COMMERCE; NETWORK; PRIVACY; VULNERABILITY; INVESTMENT; KNOWLEDGE; SYSTEM;
D O I
10.1016/j.ijinfomgt.2018.08.008
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Cybersecurity, which is defined as information security aimed at averting cyberattacks, which are among the main issues caused by the extensive use of networks in industrial control systems. This paper proposes a model that integrates fault tree analysis, decision theory and fuzzy theory to (i) ascertain the current causes of cyberattack prevention failures and (ii) determine the vulnerability of a given cybersecurity system. The model was applied to evaluate the cybersecurity risks involved in attacking a website, e-commerce and enterprise resource planning (ERP), and to assess the possible consequences of such attacks; we evaluate these consequences, which include data dissemination, data modification, data loss or destruction and service interruption, in terms of criteria related to financial losses and time for restoration. The results of the model application demonstrate its usefulness and illustrate the increased vulnerability of e-commerce to cybersecurity attacks, relative to websites or ERP, due partly to frequent operator access, credit transactions and users' authentication problems characteristic of e-commerce.
引用
收藏
页码:248 / 260
页数:13
相关论文
共 79 条
[21]   Effect of network infrastructure factors on information system risk judgments [J].
Cowley, Jennifer A. ;
Greitzer, Frank L. ;
Woods, Bronwyn .
COMPUTERS & SECURITY, 2015, 52 :142-158
[22]   Immuno-inspired autonomic system for cyber defense [J].
Intelligent Security Systems Research Laboratory, The University of Memphis, Memphis, TN 38152, United States .
Inf Secur Tech Rep, 2007, 4 (235-241) :235-241
[23]   Estimation of failure probability of oil and gas transmission pipelines by fuzzy fault tree analysis [J].
Ding, YH ;
Yu, DT .
JOURNAL OF LOSS PREVENTION IN THE PROCESS INDUSTRIES, 2005, 18 (02) :83-88
[24]   Combining task analysis and fault tree analysis for accident and incident analysis: A case study from Bulgaria [J].
Doytchev, Doytchin E. ;
Szwillus, Gerd .
ACCIDENT ANALYSIS AND PREVENTION, 2009, 41 (06) :1172-1179
[25]   Multicriteria analysis in decision making under information uncertainty [J].
Ekel, P. Ya. ;
Martini, J. S. C. ;
Palhares, R. M. .
APPLIED MATHEMATICS AND COMPUTATION, 2008, 200 (02) :501-516
[26]   Methodology for computer aided fuzzy fault tree analysis [J].
Ferdous, Refaul ;
Khan, Faisal ;
Veitch, Brian ;
Amyotte, Paul R. .
PROCESS SAFETY AND ENVIRONMENTAL PROTECTION, 2009, 87 (04) :217-226
[27]   Privacy-preserving multi-channel communication in Edge-of-Things [J].
Gai, Keke ;
Qiu, Meikang ;
Xiong, Zenggang ;
Liu, Meiqin .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 85 :190-200
[28]   Spoofing-Jamming Attack Strategy Using Optimal Power Distributions in Wireless Smart Grid Networks [J].
Gai, Keke ;
Qiu, Meikang ;
Ming, Zhong ;
Zhao, Hui ;
Qiu, Longfei .
IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (05) :2431-2439
[29]   SA-EAST: Security-Aware Efficient Data Transmission for ITS in Mobile Heterogeneous Cloud Computing [J].
Gai, Keke ;
Qiu, Longfei ;
Chen, Min ;
Zhao, Hui ;
Qiu, Meikang .
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (02)
[30]  
Gan B., 1992, NUCL SCI S MED IM C, V2