Apply Fuzzy Decision Tree to Information Security Risk Assessment
نویسندگان
چکیده
As computer becomes popular and internet advances rapidly, information application systems are used extensively in organizations. Various information application systems such as attendance systems, accounting systems, and statistical systems have already replaced manual operations. In such a drastic change, the information security issue encountered by organizations becomes increasingly significant. Information security risk assessment is the core of information security. It focuses on the assessments of assets with confidentiality, integrity and availability. Moreover, vulnerability of information systems and threats to the outside are also included in the scope of consideration. This study adopts fuzzy decision tree to evaluate the information security risk assessment for decision-makers. There are 155 input-output data with 22 attributes used to measure the value at risk obtained from ISO/IEC 27001 information security management system standard and ISO/IEC27005: 2008 Information technology. Another zoo dataset collected from UCI repository is also used to test the performance for the proposed algorithm. From simulation results, the proposed approach outperforms other existing approaches.
منابع مشابه
Classification of Customer’s Credit Risk Using Ensemble learning (Case study: Sepah Bank)
Banks activities are associated with different kinds of risk such as cresit risk. Considering the limited financial resources of banks to provide facilities, assessment of the ability of repayment of bank customers before granting facilities is one of the most important challenges facing the banking system of the country. Accordingly, in this research, we tried to provide a model for determinin...
متن کاملResearch on the Application of Neural Networks to the Security and Risk Assessment of Information
It has limitations to apply the traditional mathematical model to assess the risk of the information security for it is characterized by its nonlinearity and uncertainty. The RBF Neural Networks Theory, Particle Swarm Optimization (PSO) Analysis and Fuzzy Evaluation are combined to build a particle swarm optimizing model of Information Security Risk Assessment based on RBF Neural Networks, so a...
متن کاملA novel ranking method for intuitionistic fuzzy set based on information fusion and application to threat assessment
A novel ranking method based on multi-time information fusion is proposed for intuitionistic fuzzy sets (IFSs) and applied to the threat assessment problem, a multi-attribute decision making (MADM) one. This method integrates a designed intuitionistic fuzzy entropy (IFE), the closeness degree of technique for order preference by similarity to ideal solution (TOPSIS), the decision maker¡¯s (DM¡¯...
متن کاملAnalysis of Information Security Problem by Probabilistic Risk Assessment
The information security risk assessment is investigated from perspectives of most advanced probabilistic risk assessment (PRA) for nuclear power plants. Accident scenario enumeration by initiating events, mitigation systems and event trees are first described and demonstrated. Assets, confidentiality, integrity, availability, threats, vulnerabilities, impacts, likelihoods, and safeguards are r...
متن کاملrisk assessment by integration approach of FMEA and multi criteria decision-making in the interval valued fuzzy environment: case study hydraulic pump manufacturing industry
Abstract Background and aims: Nowadays with increasing global competition, companies apply several scientific methods to identify, assess and remove potential failures in production process. The main goal of this study was identification and analysis of potential failure modes in a hydraulic pump manufacturing company by using combination of interval valued fuzzy Analytic network process (IVF-...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014