Assessing Information Security Risk Using Markov Chain

被引:0
|
作者
Tse, Daniel [1 ]
Pan, Xiaoting [1 ]
Zong, Yuan [1 ]
Liu, Jiaxi [1 ]
Yang, Qinyan [1 ]
机构
[1] City Univ Hong Kong, Dept Informat Syst, Hong Kong, Peoples R China
关键词
Markov Chain; Security Risk Assessment; Menace Index;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
[1] Information leakage occurs several times in universities in recent years. In this article, we propose a risk assessment method based on Markov chain for universities to evaluate risks using menace index. After identifying the assets and threats in universities, we use a survey data of university risks to find out the probability of the occurrence of each threat. Markov chain is used to indicate the probability of future. The result of a predicted severity sequence of risks can be useful to universities which risks they should pay more attention to. Two methods are used in the Markov part: One is the traditional way to set the initial probability matrix; the other is a statistical probability to present each menace in the initial probability matrix. After comparison, we found that the second method is more precise for risk assessment.
引用
收藏
页码:808 / 813
页数:6
相关论文
共 50 条
  • [41] Information security: Risk and reward
    Gauci, Donald
    [J]. JPT, Journal of Petroleum Technology, 2007, 59 (05): : 38 - 39
  • [42] Research on technology for IT system security assessment based on Markov chain
    Li Hetian
    Liu Yun
    He Dequan
    [J]. 2006 8TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-4, 2006, : 2563 - +
  • [43] Prediction of Cyberspace Security Data Based on the Markov Chain Model
    Zhang, Xinmiao
    [J]. Applied Mathematics and Nonlinear Sciences, 2023, 8 (02) : 2539 - 2548
  • [44] Assessing the status of library information systems security
    Ismail, Roesnita
    Zainab, Awang Ngah
    [J]. JOURNAL OF LIBRARIANSHIP AND INFORMATION SCIENCE, 2013, 45 (03) : 232 - 247
  • [45] Assessing and Comparing Information Security in Swiss Hospitals
    Landolt, Sarah
    Hirschel, Jurg
    Schlienger, Thomas
    Businger, Walter
    Zbinden, Alex M.
    [J]. INTERACTIVE JOURNAL OF MEDICAL RESEARCH, 2012, 1 (02): : 4 - 14
  • [46] Expert System for Assessing the Efficiency of Information Security
    Erulanova, Aizhan
    Soltan, Gulzhan
    Baidildina, Aizhan
    Amangeldina, Marzhan
    Aset, Askhat
    [J]. 2020 7TH INTERNATIONAL CONFERENCE ON ELECTRICAL AND ELECTRONICS ENGINEERING (ICEEE 2020), 2020, : 355 - 359
  • [47] Research on the Risk Model Based on Markov Chain
    Cai Shuqin
    Wang Ge
    Liu Yan
    [J]. 2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 3, PROCEEDINGS, 2008, : 368 - +
  • [48] Markov chain order estimation with conditional mutual information
    Papapetrou, M.
    Kugiumtzis, D.
    [J]. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2013, 392 (07) : 1593 - 1601
  • [49] An Information-Theoretic Framework to Aggregate a Markov Chain
    Deng, Kun
    Sun, Yu
    Mehta, Prashant G.
    Meyn, Sean P.
    [J]. 2009 AMERICAN CONTROL CONFERENCE, VOLS 1-9, 2009, : 731 - 736
  • [50] Discrete time Markov chain model for age of information
    Alfa, Attahiru Sule
    [J]. OPERATIONS RESEARCH LETTERS, 2020, 48 (05) : 552 - 557