scholarly journals Modeling a Midstream Oil Terminal for Cyber Security Risk Evaluation

Author(s):  
Rishabh Das ◽  
Thomas Morris
2017 ◽  
Vol 49 (3) ◽  
pp. 517-524 ◽  
Author(s):  
Jinsoo Shin ◽  
Hanseong Son ◽  
Gyunyoung Heo

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 178605-178617 ◽  
Author(s):  
Boda Li ◽  
Ying Chen ◽  
Shaowei Huang ◽  
Rui Yao ◽  
Yue Xia ◽  
...  

2019 ◽  
Vol 6 (1) ◽  
pp. 37-43
Author(s):  
Azzam Fahmy

The internet utilization is become more growth for every years where the cyber-attack also taking part into risk in the organization. The existing cyber security infrastructure (Web gateway) shall be  replacing to answer adequate of respond to threat, Vulnerabilities or viruses. Therefore company using NIST Framework [1] to improving Infrastructure Cyber Security thru identification of risk. The framework will help Company to identify, asses and managing cyber security risk in regards with replacing the old Web Gateway. And future outcomes of the replacement of Internet web gateway shall address the current and future profile and managed security program base on risk evaluation.


Author(s):  
Jin Han ◽  
Jing Zhan ◽  
Xiaoqing Xia ◽  
Xue Fan

Background: Currently, Cloud Service Provider (CSP) or third party usually proposes principles and methods for cloud security risk evaluation, while cloud users have no choice but accept them. However, since cloud users and cloud service providers have conflicts of interests, cloud users may not trust the results of security evaluation performed by the CSP. Also, different cloud users may have different security risk preferences, which makes it difficult for third party to consider all users' needs during evaluation. In addition, current security evaluation indexes for cloud are too impractical to test (e.g., indexes like interoperability, transparency, portability are not easy to be evaluated). Methods: To solve the above problems, this paper proposes a practical cloud security risk evaluation method of decision-making based on conflicting roles by using the Analytic Hierarchy Process (AHP) with Aggregation of Individual priorities (AIP). Results: Not only can our method bring forward a new index system based on risk source for cloud security and corresponding practical testing methods, but also can obtain the evaluation result with the risk preferences of conflicting roles, namely CSP and cloud users, which can lay a foundation for improving mutual trusts between the CSP and cloud users. The experiments show that the method can effectively assess the security risk of cloud platforms and in the case where the number of clouds increased by 100% and 200%, the evaluation time using our methodology increased by only by 12% and 30%. Conclusion: Our method can achieve consistent decision based on conflicting roles, high scalability and practicability for cloud security risk evaluation.


Sign in / Sign up

Export Citation Format

Share Document