Information Security Risk Assessment by using Bayesian Learning Technique

被引:0
|
作者
Foroughi, Farhad [1 ]
机构
[1] Univ Sunderland, Sunderland SR2 7EE, Durham, England
关键词
Bayesian belief network; Bayesian learning; information security; intelligent agent; risk assessment;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The organisations need an information security risk management to evaluate asset's values and related risks. The risk management is usually a human activity which includes risk assessment, strategy development and risk mitigation by using managerial resources. The significant part of risk assessment which identifies threats and vulnerabilities, is very relevant to the past incidents, their likelihood and impacts. The problem is the risk identification and evaluation of new assets according to their properties, current security controls and consequences of before incidents. According to this problem, a system that could assist experts or works on behalf of them to assess the risks during the normal working processes is required. The system should be reactive and autonomous because it is needed to respond immediately and independently of events. An intelligent software agent is the best solution for this aim. It learns risk of past experiences regarding to risk factors and asset's properties, and predicts the probability of new risk for a new instance. This article will describe an intelligent system which is based on Bayesian Learning Technique for Information Security Risk Assessment.
引用
下载
收藏
页码:91 / 95
页数:5
相关论文
共 50 条
  • [31] Information security risk assessment, aggregation, and mitigation
    Lenstra, A
    Voss, T
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 391 - 401
  • [32] A Study of Information Security Evaluation and Risk Assessment
    Li, Jingyi
    Chao, Shiwei
    Huo, Minxia
    2015 FIFTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2015, : 1909 - 1912
  • [33] Risk assessment of human error in information security
    Cheng, Xiang-Yun
    Wang, Ying-Mei
    Xu, Zi-Ling
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 3573 - +
  • [34] On the role of the Facilitator in information security risk assessment
    Lizzie Coles-Kemp
    Richard E. Overill
    Journal in Computer Virology, 2007, 3 (2): : 143 - 148
  • [35] A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture
    Govender S.G.
    Kritzinger E.
    Loock M.
    Personal and Ubiquitous Computing, 2021, 25 (05) : 927 - 940
  • [36] Collective information structuremodel for information security risk assessment (ISRA)
    University Tun Hussein Onn Malaysia , Johor, Malaysia
    不详
    不详
    J. Syst. Inf. Technol., 2 (193-219):
  • [37] Overview of Enterprise Information Needs in Information Security Risk Assessment
    Korman, Matus
    Ekstedt, Mathias
    Sommestad, Teodor
    Hallberg, Jonas
    Bengtsson, Johan
    PROCEEDINGS OF THE 2014 IEEE 18TH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE (EDOC 2014), 2014, : 42 - 51
  • [38] Information Security Risk Assessment Using Situational Awareness Frameworks and Application Tools
    Chandra, Nungky Awang
    Ramli, Kalamullah
    Ratna, Anak Agung Putri
    Gunawan, Teddy Surya
    RISKS, 2022, 10 (08)
  • [39] Compliance Risk Assessment Measures of Financial Information Security using System Dynamics
    Kim, Ae Chan
    Lee, Su Mi
    Lee, Dong Hoon
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (04): : 191 - 200
  • [40] Risk Assessment of Power Information Risk Security Based on Risk Matrix
    Wang Xu
    Chen Tao
    Wang Yujie
    Guo Qinrui
    Teng Yangxin
    PROCEEDINGS OF 2018 IEEE 3RD ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC 2018), 2018, : 1494 - 1498