A Hybrid Model for Evaluation Computer Network Security Risk in Commercial Bank

2011 ◽  
Vol 393-395 ◽  
pp. 531-534
Author(s):  
Li Xiang Shen ◽  
Guo Cao ◽  
Su Zhen Cao

Given there is a great deal of correlation among indicators in the process of computer network security risk assessment, the handling of correlation is of great significance for the effectiveness of risk assessment. In this paper, we propose a hybrid computer network security risk model based on the analytic hierarchical process and gray relational analysis theory. At fist, the weight of each indicator will be elicited by means of analytic hierarchical process. Further, gray relational analysis theory will be used for the final evaluation, which avoids subjective estimation of experts or managers of banking. Finally, the model is further demonstrated and validated via a case study, and the result implies that the assets and vulnerability may be the most important factor for network security management.

2014 ◽  
Vol 543-547 ◽  
pp. 3195-3198
Author(s):  
Yi Ping Chen

The idea and method of multi hiberarchy design for security is proposed in this paper with the basic theory of security for modern network. A detailed analysis on hiberarchy is done to figure out the potential security risk under various internal levels of an enterprise by deeply study on a dummy enterprise network. According to the principle of integrity, balance, combination of technology and management, a network security target which is fit for the requirement of enterprise is issued. And based on it, a total network security solution is proposed. This article focuses on the setup of firewall, design and setup of inbreak detection system, implementation of VPN and application of access control program. It also discusses the selection, setup and management system of the network hardware. This solution has a lot of advantages, such as high practicability, strong security, good performance-to-price ratio, easily exercisable, advanced setup and well extensibility.


2000 ◽  
Author(s):  
James D. Johannes ◽  
Andrew Fanning ◽  
Kyle Hoover ◽  
Tim Lewis ◽  
Marsha Robinson

2020 ◽  
Vol 39 (3) ◽  
pp. 4427-4441
Author(s):  
Bin Xu

The concept of fuzzy number intuitionistic fuzzy sets (FNIFSs) is designed to effectively depict uncertain information in decision making problems which fundamental characteristic of the FNIFS is that the values of its membership function and non-membership function are depicted with triangular fuzzy numbers (TFNs). The dual Hamy mean (DHM) operator gets good performance in the process of information aggregation due to its ability to capturing the interrelationships among aggregated values. In this paper, we used the dual Hamy mean (DHM) operator and dual weighted Hamy mean (WDHM) operator with fuzzy number intuitionistic fuzzy numbers (FNIFNs) to propose the fuzzy number intuitionistic fuzzy dual Hamy mean (FNIFDHM) operator and fuzzy number intuitionistic fuzzy weighted dual Hamy mean (FNIFWDHM) operator. Then the MADM methods are proposed along with these operators. In the end, we utilize an applicable example for computer network security evaluation to prove the proposed methods.


Sign in / Sign up

Export Citation Format

Share Document