Grain Security Risk Level Prediction Using ANFIS

Author(s):  
Muhd Khairulzaman Abdul Kadir ◽  
Evor L. Hines ◽  
Saharul Arof ◽  
Daciana Illiescu ◽  
Mark Leeson ◽  
...  
Author(s):  
Baha Abu-Shaqra ◽  
Rocci Luppicini

Ethical hacking is an important information security risk management strategy within higher education applied against the growing threat of hacking attacks. Confusion regarding the meaning and ethics of ethical hacking within broader society and which resonates within organizations undermines information security. Confusion within organizations increases unpredictably (equivocality) in the information environment, which raises risk level. Taking a qualitative exploratory case study approach, this chapter pairs technoethical inquiry theory with Karl Weick's sensemaking model to explore the meanings, ethics, uses and practices, and value of ethical hacking in a Canadian university and applies technoethical inquiry decision-making grid (TEI-DMG) as an ethical decision-making model. Findings point to the need to expand the communicative and sociocultural considerations involved in decision making about ethical hacking organizational practices, and to security awareness training to leverage sensemaking opportunities and reduce equivocality in the information environment.


2020 ◽  
Vol 143 ◽  
pp. 02009
Author(s):  
Tai-hua Yang ◽  
Jing Qin ◽  
Zhi-xiang Li

In recent years, the international situation has become more and more complex, and the regional conflicts have been escalating, and the risks of overseas public security have been increasing. Based on the four types of public security events, a public safety risk assessment index system of "one belt and one road" electric power investment project is established. Combining the Bayesian network model, and using fuzzy set and DS evidence theory, the public security risk level of the “Belt and Road” countries can be this method has been effectively verified and put forward countermeasures by an example.


Electronics ◽  
2020 ◽  
Vol 9 (6) ◽  
pp. 989 ◽  
Author(s):  
Anhao Xiang ◽  
Jun Zheng

Home area networks (HANs) are the most vulnerable part of smart grids since they are not directly controlled by utilities. Device authentication is one of most important mechanisms to protect the security of smart grid-enabled HANs (SG-HANs). In this paper, we propose a situation-aware scheme for efficient device authentication in SG-HANs. The proposed scheme utilizes the security risk information assessed by the smart home system with a situational awareness feature. A suitable authentication protocol with adequate security protection and computational and communication complexity is then selected based on the assessed security risk level. A protocol design of the proposed scheme considering two security risk levels is presented in the paper. The security of the design is verified by using both formal verification and informal security analysis. Our performance analysis demonstrates that the proposed scheme is efficient in terms of computational and communication costs.


2015 ◽  
Vol 79 ◽  
pp. 358-368 ◽  
Author(s):  
Miguel Gastón Cedillo-Campos ◽  
Hermes Orestes Cedillo-Campos
Keyword(s):  

2016 ◽  
Vol 102 ◽  
pp. 547-554 ◽  
Author(s):  
Rahib H. Abiyev ◽  
Kaan Uyar ◽  
Umit Ilhan ◽  
Elbrus Imanov

Author(s):  
Sanjeev Puri

Risk management for software projects is intended to minimize the chances of unexpected events, or more specifically to keep all possible outcomes under tight management control with making judgments about how risk events are to be treated, valued, compared and combined. It is necessary to have some well-founded infrastructure for the identification of software security risks as well as the application of appropriate controls to manage risks. To be truly beneficial, the risk analysis framework must be granular and practical enough to produce a customizable roadmap of which problems exist, and to rank them in order of severity. The paper a risk assessment framework for a precise, unambiguous and efficient risk analysis with qualitative risk analysis methodologies and tree based techniques by exploiting the synthesis of risk analysis methods with object-oriented modeling, semi-formal methods and tools, in order to improve the security risk analysis of software and security policy implementation of security-cri tical systems to reduce risk levels and optimizequality instructions.


2020 ◽  
pp. 157-169
Author(s):  
Iryna Reshetnikova ◽  
Henefa Shvydanenko ◽  
Kateryna Boichenko

This article generalizes the arguments and counterarguments within the scientific discourse concerning the problems of integrated development of enterprises in the modern market economy. The main purpose of the research conducted is to create a methodological approach to the assessment and improvement of the integrated development efficiency of the Ukrainian light industry enterprises on the grounds of key determinants identification. For ensuring an extensive and systematic approach in this study, a three-step methodological base has been adopted. The interpretation and synthesis of high-quality data through sifting and sorting materials on key issues and subject matter of enterprise development in the context of integration have been conducted. The tendencies of development of the Ukrainian light industry enterprises have been analyzed to identify the key determinants. An assessment of their impact on the performance of integrated enterprise development has been made. The conducted research used the dialectical, structural and analytical as well as structural and functional analysis as a methodological tool. Methods for multicriteria analysis were used to determine the impact of the identified determinants, in particular, the calculation of the multivariate utility function and the normalization of determining factors. The article shows the results of the analysis of the light industry enterprises development with the help of such key determinants as providing of their own raw materials, availability of specialized mechanical engineering, repair base, properly qualified personnel, operating enterprises development. The integrated development of fifteen light industry enterprises has been diagnosed with the help of such main determinants as financial and resource support, intellectual and innovative potential, economic security, risk level, self-integration, the synergistic effect of integrated business processes. A group of enterprises has been identified, which the development level in the context of its integration is lower than estimated by the methods of classical performance diagnostics at the present stage. The group of enterprises has been identified, where integration processes are effective and have prospects for development. It is established that the integrated development implementation, due account being taken of the full complex of its determinants will promote greater usefulness and efficiency of the studied light industry enterprises functioning. The results of the conducted study can be useful for the efficiency improvement of domestic enterprises based on the integration Keywords efficiency, integrated development, utility, model, factor.


2020 ◽  
Vol 20 (2) ◽  
pp. 169-181
Author(s):  
Tamás Horváth

The best practices and knowledge of different guidelines would be absolutely useful for professionals in the field of security technology. It is essential for the design and implementation of the data centres which are not really common facilities due to security reasons. Their location, proper activities, even the circumstances of their operation, all this should not be public knowledge. The design and implementation of the data centres depend on their security risk level. This may be fairly known for professionals, but a summary of the essential requirements would be useful for all people involved. In my practice, our company has got a chance to make a complex security plan for a Data Centre, so I would like to present the architectural and security aspects which may be important in the given case. Since a certain level of security is required in a given case, and different levels belong to different physical protection systems (PPS), I have created a facility security matrix to serve as a guideline and to help to decide what kind of PPS should be installed in different cases.


2013 ◽  
Vol 24 (1) ◽  
pp. 36-57 ◽  
Author(s):  
June Wei ◽  
Binshan Lin ◽  
Meiga Loho-Noya

This paper developed a method to assess information security risks in e-healthcare. Specifically, it first developed a static E-Healthcare Information Security Risk (EHISR) model to present thirty-three security risk factors by identifying information security threats and their sources in e-healthcare. Second, a dynamic E-Healthcare Information Flow (EHIF) model was developed to logically link these information risk factors in the EHISR model. Pattern analysis showed that information security risks could be classified into two levels, and versatility analysis showed that the overall security risks for eight information flows were close with a range from 55% to 86%. Third, one quantifiable approach based on a relative-weighted assessment model was developed to demonstrate how to assess the information security risks in e-healthcare. This quantitative security risk measurement establishes a reference point for assessing e-healthcare security risks and assists managers in selecting a reliable information flow infrastructure with a lower security risk level.


2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Chunguang Chang ◽  
Xi Wu ◽  
Xin Yan

The analysis of the overall risk level of the system and the reduction of risk control costs are the key links to avoid the safety risks of prefabricated construction. In this paper, a dual-objective optimization model is constructed with the objective of minimizing system security risk loss and control cost to minimize the level of construction safety risks for prefabricated building while minimizing cost consumption. This paper introduces risk correlation into the optimization model based on the 2-additive fuzzy measure and solves it with discrete multiobjective particle swarm optimization (discrete-MOPSO). The example shows that considering the correlation of risks in different situations can better reflect the interaction relationship between the risk factors of building construction safety and improve the rationality of the optimization model.


Sign in / Sign up

Export Citation Format

Share Document