A new lightweight method for security risk assessment based on fuzzy cognitive maps

نویسندگان

  • Piotr Szwed
  • Pawel Skrzynski
چکیده

For contemporary software systems, security is considered to be a key quality factor and the analysis of IT security risk becomes an indispensable stage during software deployment. However, performing risk assessment according to methodologies and standards issued for the public sector or large institutions can be too costly and time consuming. Current business practice tends to circumvent risk assessment by defining sets of standard safeguards and applying them to all developed systems. This leads to a substantial gap: threats are not re-evaluated for particular systems and the selection of security functions is not based on risk models. This paper discusses a new lightweight risk assessment method aimed at filling this gap. In this proposal, Fuzzy Cognitive Maps (FCMs) are used to capture dependencies between assets, and FCM-based reasoning is performed to calculate risks. An application of the method is studied using an example of an e-health system providing remote telemonitoring, data storage and teleconsultation services. Lessons learned indicate that the proposed method is an efficient and low-cost approach, giving instantaneous feedback and enabling reasoning on the effectiveness of the security system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A new control strategy for energy management in Plug-in Hybrid Electric Vehicles based on Fuzzy Cognitive Maps

In this paper, a new control strategy for energy management in Plug-in Hybrid Electric Vehicles (PHEVs) using Fuzzy Cognitive Map (FCM) is presented. In this strategy, FCM is used as a supervisory control such that the State of Charge (SoC) of the battery is kept in the acceptable range and fuel consumption per kilometer is reduced, in addition to providing the request power. Since this method ...

متن کامل

Using Fuzzy Cognitive Maps for Prediction of Knowledge Worker Productivity Based on Real Coded Genetic Algorithm

  Improving knowledge worker productivity has been one of the most important tasks of the century. However, we have few measures or management interventions to make such improvement possible, and it is difficult to identify patterns that should be followed by knowledge workers because systems and processes in an organization are often regarded as a death blow to creativity. In this paper, we se...

متن کامل

A New Security Risk Assessment Method of Website Based on Generalized Fuzzy Numbers

In this paper, we present a new security risk assessment method of website based on generalized fuzzy numbers. First, we present a new similarity measure between generalized fuzzy numbers. We also prove some properties of the proposed similarity measure and make an experiment to use 18 sets of generalized fuzzy numbers to compare the experimental results of the proposed method with the existing...

متن کامل

A Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks

Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...

متن کامل

An Assessment Method for Project Cash Flow under Interval-Valued Fuzzy Environment

Effective project management requires reliable knowledge of cash required in different stages of project life cycle. Getting this knowledge is highly dependent on sophisticated consideration of project environment. Nature of projects and their environments are associated with uncertain conditions. In this paper, a new project cash flow assessment method based on project scheduling is proposed t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Applied Mathematics and Computer Science

دوره 24  شماره 

صفحات  -

تاریخ انتشار 2014