Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory

被引:51
作者
Henriques de Gusmao, Ana Paula [1 ]
Silva, Maisa Mendonca [1 ]
Poleto, Thiago [1 ]
Camara e Silva, Lucio [1 ]
Cabral Seixas Costa, Ana Paula [1 ]
机构
[1] Univ Fed Pernambuco, CDSID, Caixa Postal 5125, BR-52070970 Recife, PE, Brazil
关键词
Cybersecurity; Information security; Risk analysis model; Fuzzy decision theory; Fault tree analysis; INFORMATION SECURITY MANAGEMENT; CYBER-ATTACKS; E-COMMERCE; NETWORK; PRIVACY; VULNERABILITY; INVESTMENT; KNOWLEDGE; SYSTEM;
D O I
10.1016/j.ijinfomgt.2018.08.008
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Cybersecurity, which is defined as information security aimed at averting cyberattacks, which are among the main issues caused by the extensive use of networks in industrial control systems. This paper proposes a model that integrates fault tree analysis, decision theory and fuzzy theory to (i) ascertain the current causes of cyberattack prevention failures and (ii) determine the vulnerability of a given cybersecurity system. The model was applied to evaluate the cybersecurity risks involved in attacking a website, e-commerce and enterprise resource planning (ERP), and to assess the possible consequences of such attacks; we evaluate these consequences, which include data dissemination, data modification, data loss or destruction and service interruption, in terms of criteria related to financial losses and time for restoration. The results of the model application demonstrate its usefulness and illustrate the increased vulnerability of e-commerce to cybersecurity attacks, relative to websites or ERP, due partly to frequent operator access, credit transactions and users' authentication problems characteristic of e-commerce.
引用
收藏
页码:248 / 260
页数:13
相关论文
共 79 条
[51]  
Nunez M, 2012, DATENSCHUTZ DATENSIC, V36, P653
[52]   Quality attributes of Web software applications [J].
Offutt, J .
IEEE SOFTWARE, 2002, 19 (02) :25-+
[53]   Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements [J].
Patel, Sandip C. ;
Graham, James H. ;
Ralston, Patricia A. S. .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2008, 28 (06) :483-491
[54]  
Pedrycz W, 2011, METHODS APPL FUZZY M
[55]   A fuzzy-based reliability approach to evaluate basic events of fault tree analysis for nuclear power plant probabilistic safety assessment [J].
Purba, Julwan Hendry .
ANNALS OF NUCLEAR ENERGY, 2014, 70 :21-29
[56]   Application of fault tree analysis for customer reliability assessment of a distribution power system [J].
Rahman, Fariz Abdul ;
Varuttamaseni, Athi ;
Kintner-Meyer, Michael ;
Lee, John C. .
RELIABILITY ENGINEERING & SYSTEM SAFETY, 2013, 111 :76-85
[57]   De-Identification of Unstructured Textual Data using Artificial Immune System for Privacy Preserving [J].
Rahmani, Amine ;
Amine, Abdelmalek ;
Hamou, Reda Mohamed ;
Boudia, Mohamed Amine ;
Bouarara, Hadj Ahmed .
INTERNATIONAL JOURNAL OF DECISION SUPPORT SYSTEM TECHNOLOGY, 2016, 8 (04) :34-49
[58]  
Raiffa H., 1997, Decision analysis
[59]   Cyber security risk assessment for SCADA and DCS networks [J].
Ralston, P. A. S. ;
Graham, J. H. ;
Hieb, J. L. .
ISA TRANSACTIONS, 2007, 46 (04) :583-594