Application of fuzzy set theory to evaluate the rate of aggregative risk in information security

Organizations use different types of information system to reach their goals. Decision makers are required to allocate a security budget and treatment strategy based on the risk priority of information systems. Each of the information systems has different components or assets. However, there is dif...

Full description

Saved in:
Bibliographic Details
Main Authors: Tamjidyamcholo, Alireza, Yamchello, Hamed Tamjid, Baba, Mohd Sapiyan, Gholipour, Rahmatollah
Format: Conference or Workshop Item
Language:English
Published: IEEE 2013
Online Access:http://psasir.upm.edu.my/id/eprint/44940/1/Application%20of%20fuzzy%20set%20theory%20to%20evaluate%20the%20rate%20of%20aggregative%20risk%20in%20information%20security.pdf
http://psasir.upm.edu.my/id/eprint/44940/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Organizations use different types of information system to reach their goals. Decision makers are required to allocate a security budget and treatment strategy based on the risk priority of information systems. Each of the information systems has different components or assets. However, there is difficulty in aggregating the risk of each component. In this research a model is created to aggregate the risk of information system components to support decisions. Since there is uncertainty in the information security risk analysis area, we used fuzzy set theory in our model.