Assessment of risk of information security by means of the theory of fuzzy sets

被引:0
|
作者
Murathin, R. [1 ]
Satybaldina, D. Z. [2 ]
机构
[1] Karaganda State Univ, Karaganda, Kazakhstan
[2] Eurasian Natl Univ, Astana, Kazakhstan
来源
关键词
D O I
暂无
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Risk of the breach of information security of the modern organization is the multidimensional complex concept which is including set of interconnected variables. Often, the value of risk factors cannot be accurately determined. Therefore, the risk assessment of information security can be defined as a fuzzy problem. This article describes methods of implementation of information security risk assessment in conjunction with the theory of fuzzy measures.
引用
收藏
页码:66 / 74
页数:9
相关论文
共 50 条
  • [1] Using fuzzy logic and entropy theory to risk assessment of the information security
    Zhao, DM
    Wang, JH
    Wu, J
    Ma, JF
    [J]. Proceedings of 2005 International Conference on Machine Learning and Cybernetics, Vols 1-9, 2005, : 2448 - 2453
  • [2] A Software Defined Network information security risk assessment based on Pythagorean fuzzy sets
    Deb, Raktim
    Roy, Sudipta
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2021, 183
  • [3] Method of Information Security Risk Assessment Based on Improved Fuzzy Theory of Evidence
    Huang Xuepeng
    Xu Wei
    [J]. INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (03) : 188 - 196
  • [4] Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees
    Shang, Wenli
    Gong, Tianyu
    Chen, Chunyu
    Hou, Jing
    Zeng, Peng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019,
  • [5] Application of fuzzy sets theory in qualitative and quantitative risk assessment
    Zolotukhin, AB
    Gudmestad, OT
    [J]. INTERNATIONAL JOURNAL OF OFFSHORE AND POLAR ENGINEERING, 2002, 12 (04) : 288 - 296
  • [6] Apply Fuzzy Decision Tree to Information Security Risk Assessment
    Lee, Zne-Jung
    Chang, Li-Yun
    [J]. INTERNATIONAL JOURNAL OF FUZZY SYSTEMS, 2014, 16 (02) : 265 - 269
  • [7] Application of Fuzzy Logic in the Process of Information Security Risk Assessment
    Kokles, Mojmir
    Filanova, Jana
    Korcek, Frantisek
    [J]. INNOVATION MANAGEMENT AND EDUCATION EXCELLENCE VISION 2020: FROM REGIONAL DEVELOPMENT SUSTAINABILITY TO GLOBAL ECONOMIC GROWTH, VOLS I - VI, 2016, : 1078 - 1088
  • [8] A Fuzzy Logic based Information Security Risk Assessment Method
    Yang, Yaling
    Zhou, Yanhui
    [J]. MECHANICAL AND ELECTRONICS ENGINEERING III, PTS 1-5, 2012, 130-134 : 3726 - 3730
  • [9] Information systems security risk assessment on improved fuzzy AHP
    Wu, Xiaoping
    Fu, Yu
    Wang, Jiasheng
    [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 365 - 369
  • [10] Risk Assessment for Information Security Based on Fuzzy Membership Matrix
    Bai, Yan
    Yao, Zhong
    Li, Hong
    Zhang, Yong-Qiang
    [J]. NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 547 - +