Application of fuzzy set theory to evaluate the rate of aggregative risk in information security

Organizations use different types of information system to reach their goals. Decision makers are required to allocate a security budget and treatment strategy based on the risk priority of information systems. Each of the information systems has different components or assets. However, there is dif...

Full description

Saved in:
Bibliographic Details
Published in2013 International Conference on Research and Innovation in Information Systems (ICRIIS) pp. 410 - 415
Main Authors Tamjidyamcholo, Alireza, Yamchello, Hamed Tamjid, Bin, Mohd Sapiyan, Gholipour, Rahmatollah
Format Conference Proceeding Journal Article
LanguageEnglish
Published IEEE 01.11.2013
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Organizations use different types of information system to reach their goals. Decision makers are required to allocate a security budget and treatment strategy based on the risk priority of information systems. Each of the information systems has different components or assets. However, there is difficulty in aggregating the risk of each component. In this research a model is created to aggregate the risk of information system components to support decisions. Since there is uncertainty in the information security risk analysis area, we used fuzzy set theory in our model.
Bibliography:ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Conference-1
ObjectType-Feature-3
content type line 23
SourceType-Conference Papers & Proceedings-2
ISSN:2324-8149
2324-8157
DOI:10.1109/ICRIIS.2013.6716745