Information security risk assessment using the AHP method

被引:3
|
作者
Zaburko, J. [1 ]
Szulzyk-Cieplak, J. [1 ]
机构
[1] Lublin Univ Technol, Fac Fundamentals Technol, Nadbystrzycka Str 38, PL-20618 Lublin, Poland
关键词
D O I
10.1088/1757-899X/710/1/012036
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper is concerned with the issues of cybersecurity and it presents AHP multi-criteria analysis methodology applied for assessing the level of real threats arising from cyberspace that affect the information security. Based on the results of surveys conducted among employees of a selected state institution, we carried out an analysis of awareness of the dangers of cyberspace and ways employees respond to incidents in systems. Taking into account the research results, an appropriate mechanism for the provision of an adequate level of information security was proposed.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Risk Assessment Method of Information Security Based on AHP
    Ning, Xu
    [J]. PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS I AND II, 2010, : 430 - 433
  • [2] The Research of Information Security Risk Assessment Method Based on AHP
    Xu, Ning
    Zhao, DongMei
    [J]. SPORTS MATERIALS, MODELLING AND SIMULATION, 2011, 187 : 575 - 580
  • [3] Information systems security risk assessment on improved fuzzy AHP
    Wu, Xiaoping
    Fu, Yu
    Wang, Jiasheng
    [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 365 - 369
  • [4] A Method of Information Security Risk Assessment Using Fuzzy Number Operations
    Fu, Yu
    Qin, Yanlin
    Wu, Xiaoping
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12564 - 12567
  • [5] Information Security Risk Assessment: A Method Comparison
    Wangen, Gaute
    [J]. COMPUTER, 2017, 50 (04) : 52 - 61
  • [6] INFORMATION SECURITY RISK ASSESSMENT: BAYESIAN PRIORITIZATION FOR AHP GROUP DECISION MAKING
    Eren-Dogu, Zeynep Filiz
    Celikoglu, Can Cengiz
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (11): : 8019 - 8032
  • [7] An Improved Risk Assessment Method for SCADA Information Security
    Markovic-Petrovic, J. D.
    Stojanovic, M. D.
    [J]. ELEKTRONIKA IR ELEKTROTECHNIKA, 2014, 20 (07) : 69 - 72
  • [8] Assessment Model and Method Research of Information Security Risk
    Lu Zhen
    Xiong Zhen
    Tu Keqin
    [J]. FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE IV, PTS 1-5, 2014, 496-500 : 2170 - +
  • [9] Information asset valuation method for information technology security risk assessment
    Foroughi, Farhad
    [J]. WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II, 2008, : 576 - 581
  • [10] Risk Assessment of Information System Security Based on Fuzzy Multiple Criteria Group AHP
    Sun, Shengchun
    Pu, Huaiyu
    Tian, Shuxin
    [J]. ADVANCES IN FUTURE COMPUTER AND CONTROL SYSTEMS, VOL 1, 2012, 159 : 385 - +