2019
DOI: 10.15388/informatica.2018.203
|View full text |Cite
|
Sign up to set email alerts
|

Information Security Risk Assessment in Critical Infrastructure: A Hybrid MCDM Approach

Abstract: The risk analysis has always been one of the essential procedures for any areas. The majority of security incidents occur because of ignoring risks or their inaccurate assessment. It is especially dangerous for critical infrastructures. Thus, the article is devoted to the description of the developed model of risk assessment for the essential infrastructures. The goal of the model is to provide a reliable method for multifaceted risk assessment of information infrastructure. The purpose of the article is to pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 62 publications
0
2
0
2
Order By: Relevance
“…Furthermore, MCDM aids decision-makers in meeting compliance obligations, incorporating stakeholder considerations, and promoting transparency in the decision-making process (Vassoney et al, 2021) . The effectiveness of MCDM techniques in information security risk management is supported by various studies and research reports (Gardas et al, 2022;Turskis et al, 2019;Ershadi &, Forouzandeh ,2019). These sources offer empirical evidence and case studies that demonstrate the benefits of employing MCDM in guiding decision-making processes related to information security risk management.…”
Section: Research Motivationmentioning
confidence: 95%
“…Furthermore, MCDM aids decision-makers in meeting compliance obligations, incorporating stakeholder considerations, and promoting transparency in the decision-making process (Vassoney et al, 2021) . The effectiveness of MCDM techniques in information security risk management is supported by various studies and research reports (Gardas et al, 2022;Turskis et al, 2019;Ershadi &, Forouzandeh ,2019). These sources offer empirical evidence and case studies that demonstrate the benefits of employing MCDM in guiding decision-making processes related to information security risk management.…”
Section: Research Motivationmentioning
confidence: 95%
“…Gestão de risco em TI em universidades pode ser utilizada em práticas e estratégias de gestão, consistindo no gerenciamento e monitoramento dos riscos que a instituição pode estar exposta, por meio de um conjunto de procedimentos formalizados [1], [2], [3]. Todavia, o gerenciamento de risco em TI inserido em contextos que abordam múltiplos critérios, requer uma avaliação assertiva dessas informações, para identificar e propor ações corretivas necessárias [4], [5].…”
Section: Introductionunclassified
“…Os sistemas de apoio à decisão (SAD) são amplamente utilizados para avaliação de risco em TI [4], [6], [7], [8], pois tomadas de decisões nesse contexto são fatores que estão associados as consequências positivas e negativas. Logo, a atenção para construção de um modelo de avaliação de desempenho possibilita um gerenciamento eficaz desses riscos, abordando variáveis do processo, na qual propõe realizar um aperfeiçoamento contínuo, incluindo estratégias para os gestores realizarem suas tomadas de decisão [9], [10], [11] atendendo como um modelo de apoio a decisão.…”
Section: Introductionunclassified
“…This approach allows for the customization of metric weights based on specific organizational requirements and risk factors. Early uses of AHP in security metrics (e.g., Moeti and Kalema [41] and Turskis et al [42]) purely rely on human judgements (not using well-established computed metrics). Sun et al [22] design an automatic security analysis tool that integrates security metrics collection, management, and visualization to understand the security of computer systems.…”
Section: Related Workmentioning
confidence: 99%