Title
A hybrid information security risk assessment procedure considering interdependences between controls
Abstract
Risk assessment is the core process of information security risk management. Organizations use risk assessment to determine the risks within an information system and provide sufficient means to reduce these risks. In this paper, a hybrid procedure for evaluating risk levels of information security under various security controls is proposed. First, this procedure applies the Decision Making Trial and Evaluation Laboratory (DEMATEL) approach to construct interrelations among security control areas. Secondly, likelihood ratings are obtained through the Analytic Network Process (ANP) method; as a result, the proposed procedure can detect the interdependences and feedback between security control families and function in real world situations. Lastly, the Fuzzy Linguistic Quantifiers-guided Maximum Entropy Order-Weighted averaging (FLQ-MEOWA) operator is used to aggregate impact values assessed by experts, applied to diminish the influence of extreme evaluations such as personal views and drastic perspectives. A real world application in a branch office of the health insurance institute in Taiwan was examined to verify the proposed procedure. By analyzing the acquired data, we confirm the proposed procedure certainly detects the influential factors among security control areas. This procedure also evaluates risk levels more accurately by coping with the interdependencies among security control families and determines the information systems safeguards required for better security, therefore enabling organizations to accomplish their missions.
Year
DOI
Venue
2012
10.1016/j.eswa.2011.07.015
Expert Syst. Appl.
Keywords
Field
DocType
hybrid information security risk,assessment procedure,hybrid procedure,security control family,security control area,proposed procedure,better security,risk assessment,information security,various security control,information security risk management,risk level
Information system,Interdependence,Data mining,Security controls,Computer science,Fuzzy logic,Risk assessment,Information security,Branch office,Analytic network process
Journal
Volume
Issue
ISSN
39
1
0957-4174
Citations 
PageRank 
References 
18
0.85
17
Authors
2
Name
Order
Citations
PageRank
Chi-Chun Lo159354.99
Wan-Jia Chen2201.20