Security Risk Assessment of Information Systems in an Indeterminate Environment

Author(s):  
Basundhara Basumatary ◽  
Chandan Kumar ◽  
Dilip Kumar Yadav
Author(s):  
Panayiotis Kotzanikolaou ◽  
Marianthi Theoharidou ◽  
Dimitris Gritzalis

Assessing risk in information and communication infrastructures is a challenging topic due to the complexity of critical infrastructures (CIs) and of the various dependencies between such infrastructures. This chapter discusses the basic concepts of risk assessment for CIs. Moreover, it describes a recently proposed methodology for criticality assessment. The main goal of this methodology is to assess the risk of an infrastructure (or a sector of critical infrastructures), taking into account the dependencies between CIs and/or sectors. The methodology is compatible with current information systems practices. The basic characteristic of the presented methodology is that it attempts to capture both organization-oriented and society-oriented consequences of possible security events, a feature which is not always embedded in mainstream information security risk assessment methodologies.


Author(s):  
Светлана Владимировна Казмирчук ◽  
Андрей Юрьевич Гололобов ◽  
Марина Сергеевна Мовчан ◽  
Людмила Павловна Рыбалка

Author(s):  
Филипп Александрович Приставка ◽  
Петр Николаевич Павленко ◽  
Светлана Владимировна Казмирчук ◽  
Марина Вячеславовна Коломиец

2013 ◽  
Vol 765-767 ◽  
pp. 1481-1485
Author(s):  
Chang Lun Zhang ◽  
Chao Li

Risk assessment is the key and core technologies ensuring IT system security. Based on the comprehensive analysis to complex information systems, this paper first summarizes the typical characters of complex information systems and then gives new risk factors that complex system need to face. Furthermore, a new risk assessment method is proposed to evaluate the complex information systems. The method takes full account of the effect of complexity of complex information systems in each process of risk assessment, and utilizes multi-level risk views to carry out in-depth analysis to the risk of complex system.


2018 ◽  
Vol 14 (03) ◽  
pp. 188 ◽  
Author(s):  
Xuepeng Huang ◽  
Wei Xu

<p>A method based on improved fuzzy theory of evidence was presented to solve the problem that there exist all kinds of uncertainty in the process of information security risk assessment. The hierarchy model for the information systems risk assessment was established firstly, and then fuzzy sets were introduced into theory of evidence. The basic probability assignments were constructed using the membership function of fuzzy sets, and the basic probability assignments were determined. Moreover, weight coefficients were calculated using entropy weight and empirical factor, which combined the objective weights with the subjective ones, and improved the validity and reliability. An illustration example indicates that the method is feasible and effective, and provides reasonable data for constituting the risk control strategy of the information systems security.</p>


2014 ◽  
Vol 687-691 ◽  
pp. 2015-2018
Author(s):  
Liang Hu ◽  
Yun Gen Hu

The development of information technology is increasingly widespread application of information systems and social dependence on information systems is constantly increasing. Therefore, information security has become an important aspect of the development of information technology has an important impact on economic development and social security. Effective information security risk assessment is an important measure to improve information technology.


Sign in / Sign up

Export Citation Format

Share Document