A Quantitative Method for Multicriteria Analysis of the Assets of a Critical System in the Management Process of Information Security

被引:0
|
作者
Firoiu, Marian [1 ]
Bacivarov, Ioan C. [1 ]
机构
[1] Univ Politehn Bucuresti, Bucharest, Romania
来源
QUALITY-ACCESS TO SUCCESS | 2019年 / 20卷 / 173期
关键词
information security; critical system; multicriteria analysis; critical asset; TOPSIS method; normalization; weight;
D O I
暂无
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
The selection of an optimal solution for the identification of the critical assets is a rather complex process, as all the valuable assets of an organization have to be identified, classified and quantified under a common approach, within the risk management process. The paper proposes a quantitative method for the identification of critical assets/services within information security assessment and analysis process which is based on multi-criteria analysis. The aim of this paper is to present a more objective method for the assessment, ranking and quantification of critical assets/services through the analysis of predefined criteria using TOPSIS method. The authors consider that by using this method we can take better decisions in ranking critical assets/services.
引用
收藏
页码:138 / 144
页数:7
相关论文
共 50 条
  • [31] Security for System Wide Information Management Collaborative Information Management
    Wilson, Ian
    Yang, Sherry
    2017 INTEGRATED COMMUNICATIONS, NAVIGATION AND SURVEILLANCE CONFERENCE (ICNS), 2017,
  • [32] Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures
    Gonzalez-Granadillo, Gustavo
    Gonzalez-Zarzosa, Susana
    Diaz, Rodrigo
    SENSORS, 2021, 21 (14)
  • [33] Critical Success Factors Analysis on Effective Information Security Management: A Literature Review
    Tu, Zhiling
    Yuan, Yufei
    AMCIS 2014 PROCEEDINGS, 2014,
  • [34] Strategic value alignment for information security management: a critical success factor analysis
    Tu, Cindy Zhiling
    Yuan, Yufei
    Archer, Norm
    Connelly, Catherine E.
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (02) : 150 - 170
  • [35] Intelligent management process analysis and security performance evaluation of sports equipment based on information security
    Li, Yang
    Wang, Tao
    Measurement: Sensors, 2024, 33
  • [36] Functional quantitative security risk analysis (QSRA) to assist in protecting critical process infrastructure
    van Staalduinen, Mark Adrian
    Khan, Faisal
    Gadag, Veeresh
    Reniers, Genserik
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2017, 157 : 23 - 34
  • [37] Exploring the critical success factors of information security management: a mixed-method approach
    Chen, Hao
    Hai, Yuge
    INFORMATION AND COMPUTER SECURITY, 2024, 32 (05) : 545 - 572
  • [38] EXPERIENCE WITH INFORMATION SECURITY MANAGEMENT SYSTEM
    Drastich, Artin
    KNOWLEDGE FOR MARKET USE 2017: PEOPLE IN ECONOMICS - DECISIONS, BEHAVIOR AND NORMATIVE MODELS, 2017, : 1133 - 1139
  • [39] Familiarity with information security management system
    Nakhaie, Hamid
    Zadeh, Asma Esmail
    EDUCATION AND MANAGEMENT TECHNOLOGY, ICEMT 2011, 2011, 13 : 349 - 351
  • [40] Information security management system standards
    Edward Humphreys
    Datenschutz und Datensicherheit - DuD, 2011, 35 (1) : 7 - 11