Application of fuzzy set theory to evaluate the rate of aggregative risk in information security
Organizations use different types of information system to reach their goals. Decision makers are required to allocate a security budget and treatment strategy based on the risk priority of information systems. Each of the information systems has different components or assets. However, there is dif...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
IEEE
2013
|
Online Access: | http://psasir.upm.edu.my/id/eprint/44940/1/Application%20of%20fuzzy%20set%20theory%20to%20evaluate%20the%20rate%20of%20aggregative%20risk%20in%20information%20security.pdf http://psasir.upm.edu.my/id/eprint/44940/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Organizations use different types of information system to reach their goals. Decision makers are required to allocate a security budget and treatment strategy based on the risk priority of information systems. Each of the information systems has different components or assets. However, there is difficulty in aggregating the risk of each component. In this research a model is created to aggregate the risk of information system components to support decisions. Since there is uncertainty in the information security risk analysis area, we used fuzzy set theory in our model. |
---|