2019
DOI: 10.1007/978-3-030-23756-1_123
|View full text |Cite
|
Sign up to set email alerts
|

A Fuzzy Based MCDM Methodology for Risk Evaluation of Cyber Security Technologies

Abstract: Cyber security that also known as information technology security is to protect computers, mobile devices, servers, electronic systems and networks from malicious digital attacks. In recent years, cyber security threats have been a growing problem for any critical digital infrastructure and various cyber-attacks created over the Internet are also becoming a big issue for the society. Therefore, the use of technologies developed to provide cyber security is very important. However, the risks of cyber security t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Fuzzy logic helps to solve the problem of value assignment to some security or property level [31,32]; however, fuzzy cognitive maps can be used to present the interconnectivity of the situation [33]. Meanwhile, multi-criteria decision-making solutions solve the problem of quantitative metrics, composed of multiple criteria [34][35][36]. While most information security risk assessments require security expert's interpretation, the multi-criteria decision making usually is based on weighting some criteria; therefore, together with data gathering solutions, it can be used by non-experts in the security area.…”
Section: Security Risk And/or Security Level Quantitative Estimation Methodsmentioning
confidence: 99%
“…Fuzzy logic helps to solve the problem of value assignment to some security or property level [31,32]; however, fuzzy cognitive maps can be used to present the interconnectivity of the situation [33]. Meanwhile, multi-criteria decision-making solutions solve the problem of quantitative metrics, composed of multiple criteria [34][35][36]. While most information security risk assessments require security expert's interpretation, the multi-criteria decision making usually is based on weighting some criteria; therefore, together with data gathering solutions, it can be used by non-experts in the security area.…”
Section: Security Risk And/or Security Level Quantitative Estimation Methodsmentioning
confidence: 99%
“…In this research, they applied the AHP model and Complex Proportional Assessment (COPRAS) for ranking digital marketing technologies. Erdoğan et al [12] presented a fuzzy MCDM model to determine the best cyber security technology. Via fuzzy MCDM process, the author also discussed risk factors in the selection processes.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The potential of fuzzy decision making in computer system security has been demonstrated. Its ability to deal with uncertainty is particularly useful for risk assessment [2], [20]. Normal operation conditions of a CPS are a vague concept and detection of abnormal conditions and unstable states can be modelled and inferred using fuzzy systems where partial truth is accommodated.…”
Section: Moving Forwardmentioning
confidence: 99%