Abstract

Information technology security risk evaluations are necessary in determining measures being taken for risk analysis. Risk analysis is also significant as it predicts the loopholes in the software which can get manipulated during suspicious activities. The article has attempted to analyze the risk issue and further suggests a multi-fuzzy risk evaluation approach for the identification of security threats. This approach analyses hacker risks based on the potential ability for an assailant, their overall probability for an attacks as well as the implications of such attacks. It typically consists of 3 sub fuzzy inference structures. The 1st fuzzy inference structure assesses an assailant's total capacities. The 2nd fuzzy inference structure assesses the general probability of ambush success, whereas the 3rd fuzzy inference structure measures risk thresholds.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call