A Method For Information Security Risk Aassessment Based On Fuzzy Operator

被引:0
|
作者
Ye, ShiChao [1 ]
Wu, KeHe [2 ]
Niu, YuGuang
机构
[1] North China Elect Power Univ, Dept Control, Beijing 102206, Peoples R China
[2] North China Elect Power Univ, Beijing Engn Res Ctr Elect Informat Technol, Beijing 102206, Peoples R China
关键词
information security; risk assessment; fuzzy operator; OWA OPERATOR; WEIGHTS;
D O I
10.4028/www.scientific.net/AMR.850-851.454
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
To address the security risks of information systems to make accurate quantitative assessment of problems in the OWA operator and based on gray theory DHGF algorithm is proposed based on combining advantages of both information security risk assessment methodology. Information security risk assessment based on an a priori sample value index depth of excavation, the use of the basic methods of OWA operator, objective indicators derived property rights, and the use of gray theory for assessing the value of integration. This approach will be applied to information security risk assessment, to ensure the objectivity of the evaluation results, while reducing dependence on the assessed value of integrity, to solve the traditional information security risk assessment methodology for index data have special requirements, it is difficult strictly objective and quantitative problems. Assessment examples show the effectiveness of the method and objectivity.
引用
收藏
页码:454 / +
页数:2
相关论文
共 50 条
  • [31] Research on the University Network Information Security Risk Management Model Based on the Fuzzy Sets
    Huo, Cai-qiao
    Meng, Li-zhuang
    Chen, Kai
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING, 2015, 124 : 89 - 93
  • [32] Assessing information security risk for an evolving smart city based on fuzzy and grey FMEA
    Li, Xiaotong
    Li, Hua
    Sun, Bingzhen
    Wang, Fang
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 34 (04) : 2491 - 2501
  • [33] An Information System Security Risk Assessment Model Based on Fuzzy Analytic Hierarchy Process
    Liu Dong-liang
    Yang Shi-song
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 874 - 877
  • [34] A Software Defined Network information security risk assessment based on Pythagorean fuzzy sets
    Deb, Raktim
    Roy, Sudipta
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2021, 183
  • [35] Risk Assessment of Information System Security Based on Fuzzy Multiple Criteria Group AHP
    Sun, Shengchun
    Pu, Huaiyu
    Tian, Shuxin
    [J]. ADVANCES IN FUTURE COMPUTER AND CONTROL SYSTEMS, VOL 1, 2012, 159 : 385 - +
  • [36] A NEW LIGHTWEIGHT METHOD FOR SECURITY RISK ASSESSMENT BASED ON FUZZY COGNITIVE MAPS
    Szwed, Piotr
    Skrzynski, Pawel
    [J]. INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND COMPUTER SCIENCE, 2014, 24 (01) : 213 - 225
  • [37] A New Security Risk Assessment Method of Website Based on Generalized Fuzzy Numbers
    Jiang, Wen
    Fan, Xin
    Duanmu, Dejie
    Deng, Yong
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (01) : 136 - 145
  • [38] Access control method of network security authentication information based on fuzzy reasoning algorithm
    Zhang, Ruihong
    Hu, Zhihua
    [J]. MEASUREMENT, 2021, 185
  • [39] Information Security Risk Assessment: A Method Comparison
    Wangen, Gaute
    [J]. COMPUTER, 2017, 50 (04) : 52 - 61
  • [40] ISRAM: information security risk analysis method
    Karabacak, B
    Sogukpinar, I
    [J]. COMPUTERS & SECURITY, 2005, 24 (02) : 147 - 159