A Fuzzy Logic based Information Security Risk Assessment Method

被引:2
|
作者
Yang, Yaling [1 ]
Zhou, Yanhui [1 ]
机构
[1] Sothwest Univ, Sch Comp & Informat Sci, Chongqing, Peoples R China
关键词
information security; fuzzy logic; risk assessment; Triangular fuzzy mapping;
D O I
10.4028/www.scientific.net/AMM.130-134.3726
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
Risk assessment for information security is uncertainty. To control these uncertainties is of great significance for effective risk assessment [1]. There are many assessment methods, and the conclusions from them are less clear. This paper presents a fuzzy logic based information security risk assessment method FLISRAM. In this method, the results are from a comprehensive assessment for assets, threats and vulnerabilities of the information system.
引用
收藏
页码:3726 / 3730
页数:5
相关论文
共 50 条
  • [31] A NEW LIGHTWEIGHT METHOD FOR SECURITY RISK ASSESSMENT BASED ON FUZZY COGNITIVE MAPS
    Szwed, Piotr
    Skrzynski, Pawel
    [J]. INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND COMPUTER SCIENCE, 2014, 24 (01) : 213 - 225
  • [32] A New Security Risk Assessment Method of Website Based on Generalized Fuzzy Numbers
    Jiang, Wen
    Fan, Xin
    Duanmu, Dejie
    Deng, Yong
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (01) : 136 - 145
  • [33] Assessment of risk of information security by means of the theory of fuzzy sets
    Murathin, R.
    Satybaldina, D. Z.
    [J]. BULLETIN OF THE KARAGANDA UNIVERSITY-MATHEMATICS, 2015, 79 (03): : 66 - 74
  • [34] Apply Fuzzy Decision Tree to Information Security Risk Assessment
    Lee, Zne-Jung
    Chang, Li-Yun
    [J]. INTERNATIONAL JOURNAL OF FUZZY SYSTEMS, 2014, 16 (02) : 265 - 269
  • [35] Information systems security risk assessment on improved fuzzy AHP
    Wu, Xiaoping
    Fu, Yu
    Wang, Jiasheng
    [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 365 - 369
  • [36] An Information System Security Risk Assessment Model Based on Fuzzy Analytic Hierarchy Process
    Liu Dong-liang
    Yang Shi-song
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 874 - 877
  • [37] A Software Defined Network information security risk assessment based on Pythagorean fuzzy sets
    Deb, Raktim
    Roy, Sudipta
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2021, 183
  • [38] Risk Assessment of Information System Security Based on Fuzzy Multiple Criteria Group AHP
    Sun, Shengchun
    Pu, Huaiyu
    Tian, Shuxin
    [J]. ADVANCES IN FUTURE COMPUTER AND CONTROL SYSTEMS, VOL 1, 2012, 159 : 385 - +
  • [39] The method for assessing security of embedded software based on the fuzzy logic
    Iuganson, Andrei
    Zakoldaev, Danil
    [J]. INTERNATIONAL SCIENTIFIC CONFERENCE ON APPLIED PHYSICS, INFORMATION TECHNOLOGIES AND ENGINEERING (APITECH-2019), 2019, 1399
  • [40] Definition of a model for measuring risk analysis of security information applying fuzzy logic and systems based on knowledge
    Angarita, A. A.
    Tabares, C. A.
    Rios, J. I.
    [J]. ENTRE CIENCIA E INGENIERIA, 2015, (17): : 71 - 80