Index Reduction for Information Systems Security Risk Assessment Based on Rough Set Theory and Hierarchic Analysis

Author(s):  
Yu Fu ◽  
Xiaoping Wu ◽  
Tingting Zhu
2011 ◽  
Vol 467-469 ◽  
pp. 481-486
Author(s):  
Nan Feng ◽  
Jing Xie ◽  
Ying Xin Wu

In electronic business environment, it is critical for an enterprise to assess information systems security (ISS) risks. In this paper, we propose a hybrid approach for ISS risk assessment. Given there is a great deal of uncertainty in the ISS risk assessment, in the hybrid approach, we combine the evidence theory with fuzzy sets to deal with the uncertain evidence found in the ISS risk assessment. The proposed approach provides a new way to define the basic belief assignment in fuzzy measure. Moreover, the approach also provides a method of testing the evidential consistency, which can reduce the uncertainty derived from the conflicts of evidence. Finally, the approach is further demonstrated and validated via a case study, in which the effectiveness of the proposed approach is evaluated by comparing it with other methods.


2008 ◽  
Vol 178 (8) ◽  
pp. 1968-1985 ◽  
Author(s):  
Zengtai Gong ◽  
Bingzhen Sun ◽  
Degang Chen

Author(s):  
Virginia Franke Kleist ◽  
Bonnie Morris ◽  
James W. Denton

Based on an actual company, this case focuses on Business Continuity Planning issues for a small but growing software company, Municipal Software Solutions, Inc. (MSS). The firm experienced a catastrophic fire which completely eliminated all aspects of the information systems infrastructure, including the software product code repository, the client access infrastructure, the hardware operations center, and the software design facility. Fortunately, no one was harmed, and the firm survived despite the fact that it did not have a formal disaster recovery plan in place. MSS was very lucky. The case can be used in conjunction with coverage of risk assessment concepts in the context of the availability component of systems reliability and trust of services management. Accordingly, it is appropriate for use in courses covering information systems security, accounting information systems, or IT audit.


Sign in / Sign up

Export Citation Format

Share Document