Applying Fuzzy Expert System to Information Security Risk Assessment - A Case Study on an Attendance System

被引:0
|
作者
Chang, Li-Yun [1 ]
Lee, Zne-Jung [2 ]
机构
[1] Huafan Univ, Dept Mech Engn, Hfu Taipei, Taiwan
[2] Huafan Univ, Dept Mangement Informat Syst, Taipei, Taiwan
关键词
ISO; 27001; Information Security; Risk Assessment; Fuzzy Expert System;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As computer becomes popular and internet advances rapidly, information application systems are used extensively in organizations. Various information application systems such as attendance systems, accounting systems, and statistical systems have already replaced manual operations. In such a drastic change, the information security issue encountered by organizations becomes increasingly significant. This study adopts an attendance system of a governmental organization to explore the information security issue. The risk assessment of the attendance system mainly focuses on the assessments of confidentiality, integrity and availability. Weak points of the attendance system and threats to the outside are also included in the scope of consideration. This study adopts the ISO/IEC 27001 information security management system standard and ISO/IEC27005:2008 Information technology Security techniques - Information security risk management to explore the risk assessment method of the attendance system and establish a set of fuzzy expert systems to measure the value at risk. In the meantime, a recommended acceptable value at risk is provided for facilitating and assisting decision makers through practical aspects and fuzzy expert systems and used as a reference for selecting an acceptable value at risk.
引用
收藏
页码:346 / 351
页数:6
相关论文
共 50 条
  • [41] A New Fuzzy Expert System for Supplier Assessment
    Fasanghari, Mehdi
    Chaharsooghi, S. Kamal
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 651 - 656
  • [42] Risk assessment of digital library information security: a case study
    Han, Zhengbiao
    Huang, Shuiqing
    Li, Huan
    Ren, Ni
    ELECTRONIC LIBRARY, 2016, 34 (03): : 471 - 487
  • [43] HCD Case Study for the Information Security Training System
    Kondo, Akira
    Yoshii, Makoto
    HUMAN CENTERED DESIGN, PROCEEDINGS, 2009, 5619 : 979 - +
  • [44] The case study of information security system for international airports
    Chang, Hangbae
    Kim, Moonoh
    Kwon, Hyuk-jun
    Han, Byungwan
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4809 : 22 - +
  • [45] Credit Risk Assessment of Bank Customers using DEMATEL and Fuzzy Expert System
    Nosratabadi, Hamid Eslami
    Pourdarab, Sanaz
    Nadali, Ahmad
    ECONOMICS AND FINANCE RESEARCH, 2011, 4 : 255 - +
  • [46] Applying Fuzzy AHP to Study the KSFs of Information Security Management
    Wang, Jen-Sheng
    Liu, Che-Hung
    Shyu, Joseph Z.
    Huang, Hsiao-Wen
    IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ 2011), 2011, : 2026 - 2032
  • [47] Expert and fuzzy systems application for information security risks assessment of information and telecommunication systems
    Kushch, S. M.
    Shutovskyi, V. O.
    VISNYK NTUU KPI SERIIA-RADIOTEKHNIKA RADIOAPARATOBUDUVANNIA, 2012, (50): : 114 - 120
  • [48] Fuzzy risk assessment of information security threat scenario
    Ge, Hai-Hui
    Zheng, Shi-Hui
    Chen, Tian-Ping
    Yang, Yi-Xian
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2013, 36 (06): : 89 - 92
  • [49] Information Security Assessment On Court Tracking Information System: A Case Study from Mataram District Court
    Auliani, Aishananda S.
    Candiwan
    2021 IEEE 12TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2021, : 226 - 230
  • [50] Methodology and Ontology of Expert System for Information Security Audit
    Atymtayeva, Lyazzat B.
    Bortsova, Gerda K.
    Inoue, Atsushi
    Kozhakhmet, Kanat T.
    6TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND INTELLIGENT SYSTEMS, AND THE 13TH INTERNATIONAL SYMPOSIUM ON ADVANCED INTELLIGENT SYSTEMS, 2012, : 238 - 243