Abstract
A method based on improved fuzzy theory of evidence was presented to solve the problem that there exist all kinds of uncertainty in the process of information security risk assessment. The hierarchy model for the information systems risk assessment was established firstly, and then fuzzy sets were introduced into theory of evidence. The basic probability assignments were constructed using the membership function of fuzzy sets, and the basic probability assignments were determined. Moreover, weight coefficients were calculated using entropy weight and empirical factor, which combined the objective weights with the subjective ones, and improved the validity and reliability. An illustration example indicates that the method is feasible and effective, and provides reasonable data for constituting the risk control strategy of the information systems security.
Highlights
With the rapid development of computer networks and their applications, the Internet has gradually become the inevitable part of people’s work and life
In the aspect of current study, researchers home and abroad have adopted fuzzy mathematics, neural networks, support vector machines (SVMs) and other methods [2,3,4,5] to establish security risk assessment models, and achieved many useful results. These results improved the theory of security risk assessment for information systems
The information security risk assessment problem was solved by using an evidence theory based method
Summary
With the rapid development of computer networks and their applications, the Internet has gradually become the inevitable part of people’s work and life. Study on feasible security risk assessment methods for information systems has important theoretical and practical significance for exploiting the advantages of all kinds of information systems and ensuring the reliable and stable operation of modern society. In the aspect of current study, researchers home and abroad have adopted fuzzy mathematics, neural networks, support vector machines (SVMs) and other methods [2,3,4,5] to establish security risk assessment models, and achieved many useful results. These results improved the theory of security risk assessment for information systems. The objective weights derived by the decision matrix were combined with the subjective expert weights, improving the scientificalness and effectiveness of weight determination
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Online and Biomedical Engineering (iJOE)
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.