An Information Systems Security Risk Assessment Model Under the Dempster-Shafer Theory of Belief Functions

2006 ◽  
Vol 22 (4) ◽  
pp. 109-142 ◽  
Author(s):  
LILI SUN ◽  
RAJENDRA P. SRIVASTAVA ◽  
THEODORE J. MOCK
2008 ◽  
Vol 5 (1) ◽  
pp. 189-219 ◽  
Author(s):  
Rajendra P. Srivastava ◽  
Chan Li

ABSTRACT: This paper develops comprehensive formulas for assessing the risk and reliability of “Systems Security” under the Dempster-Shafer theory of belief functions, using the Trust Services framework as proposed by the American Institute of Certified Public Accountants (AICPA) and Canadian Institute of Chartered Accountants (CICA). In addition, we discuss how these formulas can be used for planning and evaluation of “Systems Security” risk under the SysTrust services. The analytical formulas are derived for a tree-structured evidential diagram which is constructed by converting the exact network-structured evidential diagram. The use of an analytical formula eliminates the computational complexities of propagating beliefs in a network and allows the assurance provider to use a simple spreadsheet to combine evidence. We provide theoretical justification and perform sensitivity analyses to show that the analytical formula based on a tree-type evidential diagram is a good approximation of the exact network model under realistic situations. However, as shown theoretically and also through the sensitivity analysis, the analytical formula provides significantly different results when input beliefs are significantly negative. It should be noted that the analytical formula based on the tree model provides a more conservative assessment of information systems risk than the exact network model.


Author(s):  
Rajendra P. Srivastava ◽  
Mari W. Buche ◽  
Tom L. Roberts

The purpose of this chapter is to demonstrate the use of the evidential reasoning approach under the Dempster-Shafer (D-S) theory of belief functions to analyze revealed causal maps (RCM). The participants from information technology (IT) organizations provided the concepts to describe the target phenomenon of Job Satisfaction. They also identified the associations between the concepts. This chapter discusses the steps necessary to transform a causal map into an evidential diagram. The evidential diagram can then be analyzed using belief functions technique with survey data, thereby extending the research from a discovery and explanation stage to testing and prediction. An example is provided to demonstrate these steps. This chapter also provides the basics of Dempster-Shafer theory of belief functions and a step-by-step description of the propagation process of beliefs in tree-like evidential diagrams.


2013 ◽  
Vol 380-384 ◽  
pp. 2534-2538
Author(s):  
Zhao Zhang ◽  
Fang Yong

On the basis of threat analysis, the paper proposes a security risk assessment model for government portal website. Using the model, the paper systematically analyzes the security risk of government portal websites and then explains the reason of them. To enhance the security of government portal websites, both technical and administrative strategies were proposed. Those security strategies help improve the image of the government and it plays an important role in constructing service government.


Sign in / Sign up

Export Citation Format

Share Document