Applying Fuzzy Expert System to Information Security Risk Assessment - A Case Study on an Attendance System

被引:0
|
作者
Chang, Li-Yun [1 ]
Lee, Zne-Jung [2 ]
机构
[1] Huafan Univ, Dept Mech Engn, Hfu Taipei, Taiwan
[2] Huafan Univ, Dept Mangement Informat Syst, Taipei, Taiwan
关键词
ISO; 27001; Information Security; Risk Assessment; Fuzzy Expert System;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As computer becomes popular and internet advances rapidly, information application systems are used extensively in organizations. Various information application systems such as attendance systems, accounting systems, and statistical systems have already replaced manual operations. In such a drastic change, the information security issue encountered by organizations becomes increasingly significant. This study adopts an attendance system of a governmental organization to explore the information security issue. The risk assessment of the attendance system mainly focuses on the assessments of confidentiality, integrity and availability. Weak points of the attendance system and threats to the outside are also included in the scope of consideration. This study adopts the ISO/IEC 27001 information security management system standard and ISO/IEC27005:2008 Information technology Security techniques - Information security risk management to explore the risk assessment method of the attendance system and establish a set of fuzzy expert systems to measure the value at risk. In the meantime, a recommended acceptable value at risk is provided for facilitating and assisting decision makers through practical aspects and fuzzy expert systems and used as a reference for selecting an acceptable value at risk.
引用
收藏
页码:346 / 351
页数:6
相关论文
共 50 条
  • [1] Modelling of Fuzzy Expert System for an Assessment of Security Information Management System UIS (University Information System)
    Sikman, Ljilja
    Latinovic, Tihomir
    Sarajlic, Nermin
    [J]. TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2022, 29 (01): : 60 - 65
  • [2] Fuzzy Expert System of Information Security Risk Assessment on the Example of Analysis Learning Management Systems
    Abdymanapov, S. A.
    Muratbekov, M.
    Altynbek, S.
    Barlybayev, A.
    [J]. IEEE ACCESS, 2021, 9 : 156556 - 156565
  • [3] An Expert System for Risk Assessment of Information System Security Based on ISO 27002
    Sihwi, Sari Widya
    Andriyanto, Ferry
    Anggrainingsih, Rini
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON KNOWLEDGE ENGINEERING AND APPLICATIONS (ICKEA 2016), 2016, : 56 - 61
  • [4] Fuzzy Application With Expert System for Conducting Information Security Risk Analysis
    Bartos, Jiri
    Walek, Bogdan
    Klimes, Cyril
    Farana, Radim
    [J]. PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2014), 2014, : 33 - 41
  • [5] Risk Assessment of Information Technology Projects Using Fuzzy Expert System
    Pourdarab, Sanaz
    Nosratabadi, Hamid Eslami
    Nadali, Ahmad
    [J]. DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND ITS APPLICATIONS, PT I, 2011, 166 : 563 - 576
  • [6] A fuzzy expert system for aviation risk assessment
    Hadjimichael, Michael
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (03) : 6512 - 6519
  • [7] The Study on Risk Assessment System of Information Security in Financial Transaction
    Lu, Dan
    [J]. INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 2191 - 2194
  • [8] Model of fuzzy risk assessment of the information system
    Zhao, Dong-Mei
    Ma, Jian-Feng
    Wang, Yue-Sheng
    [J]. Tongxin Xuebao/Journal on Communications, 2007, 28 (04): : 51 - 56
  • [9] Fuzzy expert system shell development with computer security assessment application
    Remik, Leon
    Jacques, Robert St.
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1-4, 2007, : 253 - 258
  • [10] An Information System Security Risk Assessment Model Based on Fuzzy Analytic Hierarchy Process
    Liu Dong-liang
    Yang Shi-song
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 874 - 877