A Fuzzy Logic-based Information Security Control Assessment for Organizations

被引:0
|
作者
Otero, Angel R. [1 ]
Tejay, Gurvirender [1 ]
Otero, Luis Daniel [2 ]
Ruiz-Torres, Alex J. [3 ]
机构
[1] Nova SE Univ, Grad Sch Comp & Informat Sci, Ft Lauderdale, FL 33314 USA
[2] Florida Inst Technol, Coll Engn, Engn Syst, Melbourne, FL USA
[3] Univ Puerto Rico, Grad Sch Business Adm, Rio Piedras, PR USA
关键词
information security; information security controls; fuzzy logic; fuzzy set theory; assessment; evaluation;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
For organizations, security of information is eminent as threats of information security incidents that could impact the information continue to increase. Alarming facts within the literature support the current lack of adequate information security practices and prompt for identifying additional methods to help organizations in protecting their sensitive and critical information. Research efforts shows inadequacies within traditional ISC assessment methodologies that do not promote an effective assessment, prioritization, and, therefore, implementation of ISC in organizations. This research-in-progress relates to the development of a tool that can accurately prioritize ISC in organizations. The tool uses fuzzy set theory to allow for a more accurate assessment of imprecise parameters than traditional methodologies. We argue that evaluating information security controls using fuzzy set theory leads to a more detailed and precise assessment and, therefore, supports an effective selection of information security controls in organizations.
引用
收藏
页码:190 / 195
页数:6
相关论文
共 50 条
  • [1] FOOD SECURITY RISK LEVEL ASSESSMENT: A FUZZY LOGIC-BASED APPROACH
    Kadir, Muhd Khairulzaman Abdul
    Hines, Evor L.
    Qaddoum, Kefaya
    Collier, Rosemary
    Dowler, Elizabeth
    Grant, Wyn
    Leeson, Mark
    Iliescu, Daciana
    Subramanian, Arjunan
    Richards, Keith
    Merali, Yasmin
    Napier, Richard
    [J]. APPLIED ARTIFICIAL INTELLIGENCE, 2013, 27 (01) : 50 - 61
  • [2] A Fuzzy Logic-Based Information Security Management for Software-Defined Networks
    Dotcenko, Sergei
    Vladyko, Andrei
    Letenko, Ivan
    [J]. 2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 167 - 171
  • [3] A Fuzzy Logic based Information Security Risk Assessment Method
    Yang, Yaling
    Zhou, Yanhui
    [J]. MECHANICAL AND ELECTRONICS ENGINEERING III, PTS 1-5, 2012, 130-134 : 3726 - 3730
  • [4] A Logic-based Approach to Network Security Risk Assessment
    Ji, Yi
    Wen, Danyan
    Wang, Haiquan
    Xia, Chunhe
    [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL III, 2009, : 9 - +
  • [5] A fuzzy logic-based approach for groundwater vulnerability assessment
    Vahid Nourani
    Sana Maleki
    Hessam Najafi
    Aida Hosseini Baghanam
    [J]. Environmental Science and Pollution Research, 2024, 31 : 18010 - 18029
  • [6] A fuzzy logic-based approach for groundwater vulnerability assessment
    Nourani, Vahid
    Maleki, Sana
    Najafi, Hessam
    Baghanam, Aida Hosseini
    [J]. ENVIRONMENTAL SCIENCE AND POLLUTION RESEARCH, 2023, 31 (12) : 18010 - 18029
  • [7] Propose of Fuzzy Logic-Based Students' Learning Assessment
    Sripan, Rungaroon
    Suksawat, Bandit
    [J]. INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS (ICCAS 2010), 2010, : 414 - 417
  • [8] A Fuzzy Logic-Based Approach for HVAC Systems Control
    Berouine, A.
    Akssas, E.
    Naitmalek, Y.
    Lachhab, F.
    Bakhouya, M.
    Ouladsine, R.
    Essaaidi, M.
    [J]. 2019 6TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT 2019), 2019, : 1510 - 1515
  • [9] Fuzzy logic-based voltage control of a synchronous generator
    Arnalte, S
    [J]. INTERNATIONAL JOURNAL OF ELECTRICAL ENGINEERING EDUCATION, 2000, 37 (04) : 333 - 343
  • [10] Fuzzy logic-based supervisory control of household appliances
    Badami, VV
    Stephanou, H
    [J]. PROCEEDINGS OF THE SIXTH IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS I - III, 1997, : 213 - 218