Security Risk Assessment Methodology for the petroleum and petrochemical industries

2013 ◽  
Vol 26 (6) ◽  
pp. 1685-1689 ◽  
Author(s):  
David A. Moore
2013 ◽  
Vol 850-851 ◽  
pp. 454-457
Author(s):  
Shi Chao Ye ◽  
Ke He Wu ◽  
Yu Guang Niu

To address the security risks of information systems to make accurate quantitative assessment of problems in the OWA operator and based on gray theory DHGF algorithm is proposed based on combining advantages of both information security risk assessment methodology. Information security risk assessment based on an a priori sample value index depth of excavation, the use of the basic methods of OWA operator, objective indicators derived property rights, and the use of gray theory for assessing the value of integration. This approach will be applied to information security risk assessment, to ensure the objectivity of the evaluation results, while reducing dependence on the assessed value of integrity, to solve the traditional information security risk assessment methodology for index data have special requirements, it is difficult strictly objective and quantitative problems. Assessment examples show the effectiveness of the method and objectivity.


2012 ◽  
Vol 43 ◽  
pp. 600-609 ◽  
Author(s):  
Chunlin Liu ◽  
Chong-Kuan Tan ◽  
Yea-Saen Fang ◽  
Tat-Seng Lok

Taguchi’s experimental design model is extensively applied by the manufacturing and production industries to systematically simulate different system states through altering controllable and uncontrollable variables to ensure system reliability and robustness. Managing an IT infrastructure complexity in a systematic way to assess the risks is a major challenge. This research paper proposes a novel IT infrastructure security risk assessment methodology inspired by the Taguchi’s experimental design model. The proposed methodology is capable of rating and ranking impact of controllable and uncontrollable infrastructure parameters in the form of threats against the system. The result of the assessment is fed into a mitigation process where the system is hardened by eliminating the highest ranking risks.


Sign in / Sign up

Export Citation Format

Share Document