Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory

被引:51
作者
Henriques de Gusmao, Ana Paula [1 ]
Silva, Maisa Mendonca [1 ]
Poleto, Thiago [1 ]
Camara e Silva, Lucio [1 ]
Cabral Seixas Costa, Ana Paula [1 ]
机构
[1] Univ Fed Pernambuco, CDSID, Caixa Postal 5125, BR-52070970 Recife, PE, Brazil
关键词
Cybersecurity; Information security; Risk analysis model; Fuzzy decision theory; Fault tree analysis; INFORMATION SECURITY MANAGEMENT; CYBER-ATTACKS; E-COMMERCE; NETWORK; PRIVACY; VULNERABILITY; INVESTMENT; KNOWLEDGE; SYSTEM;
D O I
10.1016/j.ijinfomgt.2018.08.008
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Cybersecurity, which is defined as information security aimed at averting cyberattacks, which are among the main issues caused by the extensive use of networks in industrial control systems. This paper proposes a model that integrates fault tree analysis, decision theory and fuzzy theory to (i) ascertain the current causes of cyberattack prevention failures and (ii) determine the vulnerability of a given cybersecurity system. The model was applied to evaluate the cybersecurity risks involved in attacking a website, e-commerce and enterprise resource planning (ERP), and to assess the possible consequences of such attacks; we evaluate these consequences, which include data dissemination, data modification, data loss or destruction and service interruption, in terms of criteria related to financial losses and time for restoration. The results of the model application demonstrate its usefulness and illustrate the increased vulnerability of e-commerce to cybersecurity attacks, relative to websites or ERP, due partly to frequent operator access, credit transactions and users' authentication problems characteristic of e-commerce.
引用
收藏
页码:248 / 260
页数:13
相关论文
共 79 条
[31]  
Ganesan Ramachandran., 2010, IJ Network Security, V11, P121
[32]  
Gartner Group, 2018, CYB SEC MARK SEGM TY
[33]  
Goel S., 2012, INT J COMPUTER APPL, V53, P19
[34]   Developing expertise for network intrusion detection [J].
Goodall, John R. ;
Lutters, Wayne G. ;
Komlodi, Anita .
INFORMATION TECHNOLOGY & PEOPLE, 2009, 22 (02) :92-108
[35]   'Risky business': Perceptions of e-business risk by UK small and medium sized enterprises (SMEs) [J].
Grant, Kevin ;
Edgar, David ;
Sukumar, Arun ;
Meyer, Martin .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2014, 34 (02) :99-122
[36]   Semi-quantitative fault tree analysis for process plant safety using frequency and probability ranges [J].
Hauptmanns, U .
JOURNAL OF LOSS PREVENTION IN THE PROCESS INDUSTRIES, 2004, 17 (05) :339-345
[37]   Analytical propagation of uncertainties through fault trees [J].
Hauptmanns, U .
RELIABILITY ENGINEERING & SYSTEM SAFETY, 2002, 76 (03) :327-329
[38]   Information security risk analysis model using fuzzy decision theory [J].
Henriques de Gusmao, Ana Paula ;
Camara e Silva, Lucio ;
Silva, Maisa Mendonca ;
Poleto, Thiago ;
Cabral Seixas Costa, Ana Paula .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2016, 36 (01) :25-34
[39]   Understanding the physical and economic consequences of attacks on control systems [J].
Huang, Yu-Lun ;
Cardenas, Alvaro A. ;
Amin, Saurabh ;
Lin, Zong-Syun ;
Tsai, Hsin-Yi ;
Sastry, Shankar .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2009, 2 (03) :73-83
[40]   Software measure in cyber-attacks on production control system [J].
Kawanaka, Takaaki ;
Matsumaru, Masanobu ;
Rokugawa, Shuichi .
COMPUTERS & INDUSTRIAL ENGINEERING, 2014, 76 :378-386