Assessing Information Security Risk Using Markov Chain

被引:0
|
作者
Tse, Daniel [1 ]
Pan, Xiaoting [1 ]
Zong, Yuan [1 ]
Liu, Jiaxi [1 ]
Yang, Qinyan [1 ]
机构
[1] City Univ Hong Kong, Dept Informat Syst, Hong Kong, Peoples R China
关键词
Markov Chain; Security Risk Assessment; Menace Index;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
[1] Information leakage occurs several times in universities in recent years. In this article, we propose a risk assessment method based on Markov chain for universities to evaluate risks using menace index. After identifying the assets and threats in universities, we use a survey data of university risks to find out the probability of the occurrence of each threat. Markov chain is used to indicate the probability of future. The result of a predicted severity sequence of risks can be useful to universities which risks they should pay more attention to. Two methods are used in the Markov part: One is the traditional way to set the initial probability matrix; the other is a statistical probability to present each menace in the initial probability matrix. After comparison, we found that the second method is more precise for risk assessment.
引用
收藏
页码:808 / 813
页数:6
相关论文
共 50 条
  • [21] Markov chain forecasting with information source and information forecasting space
    Guo, SZ
    Meng, Y
    Zhang, C
    He, B
    [J]. PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING (12TH), VOLS 1- 3, 2005, : 415 - 418
  • [22] A MARKOV-CHAIN GAME WITH DYNAMIC INFORMATION
    OLSDER, GJ
    PAPAVASSILOPOULOS, GP
    [J]. JOURNAL OF OPTIMIZATION THEORY AND APPLICATIONS, 1988, 59 (03) : 467 - 486
  • [23] Research on Privacy Security Risk Assessment Method of Mobile Commerce Based on Information Entropy and Markov
    Zhang, Tao
    Zhao, Kun
    Yang, Ming
    Gao, Tilei
    Xie, Wanyu
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [24] Assessing Markov chain approximations: A minimal econometric approach
    Silos, P
    [J]. JOURNAL OF ECONOMIC DYNAMICS & CONTROL, 2006, 30 (06): : 1063 - 1079
  • [25] Assessing Software Supply Chain Risk Using Public Data
    Benthall, Sebastian
    [J]. 2017 IEEE 28TH ANNUAL SOFTWARE TECHNOLOGY CONFERENCE (STC), 2017,
  • [26] Assessing Technology Success and Failure Using Information Value Chain Theory
    Coiera E.
    [J]. Studies in Health Technology and Informatics, 2019, 263 : 35 - 48
  • [27] Assessing information security risk for an evolving smart city based on fuzzy and grey FMEA
    Li, Xiaotong
    Li, Hua
    Sun, Bingzhen
    Wang, Fang
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 34 (04) : 2491 - 2501
  • [28] Markov-based control for information and computer security
    Stubberud, S
    McInerney, J
    Anwar, S
    Hamilton, S
    [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VI, PROCEEDINGS: INDUSTRIAL SYSTEMS AND ENGINEERING I, 2002, : 363 - 369
  • [29] A Visual Analysis of Research on Information Security Risk by Using CiteSpace
    Li, Xiaotong
    Li, Hua
    [J]. IEEE ACCESS, 2018, 6 : 63243 - 63257
  • [30] Information Security Risk Assessment by using Bayesian Learning Technique
    Foroughi, Farhad
    [J]. WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II, 2008, : 91 - 95