Information Security Risk Analysis Methods : AHP and Fuzzy Comprehensive Method

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evaluation of Strategic Information Security with Fuzzy AHP Method

Successful e-government adoption in society depends mostly on trust among citizens who use it. It is vital to ensuring security of e-government applications and infrastructures as a guarantee of security and privacy of stakeholders in storing, processing and exchanging information over the online systems offered by the government. As threats on e-government information security are dynamic and ...

متن کامل

Risk Assessment on Storage Security of Hazardous Chemicals Based on AHP-fuzzy Comprehensive Evaluation Approach

To solve the uncertainty and complexity problems in hazardous chemical storage risk assessment, this paper constructs the evaluation index system and proposed the risk assessment model based on AHP-fuzzy comprehensive evaluation approach, which organically integrate the quantitative and the objectively of the analytic hierarchy process (AHP) and the inclusive advantage of fuzzy comprehensive ev...

متن کامل

ISRAM: information security risk analysis method

Continuously changing nature of technological environment has been enforcing to revise the process of information security risk analysis accordingly. A number of quantitative and qualitative risk analysis methods have been proposed by researchers and vendors. The purpose of these methods is to analyze today's information security risks properly. Some of these methods are supported by a software...

متن کامل

A Qualitative Comprehensive Assessment Method of System Safety Based on Fuzzy AHP and Fuzzy Transform

To overcome the difficulty in understanding quantitative evaluation on actually safety assessment, This research proposed a qualitative comprehensive assessment method of fuzzy state based on fuzzy Analytic Hierarchy Process (AHP) and Fuzzy Transform. First of all, the fuzzy comment of multiple assessments by experts should focus on the quantitative evaluation of corresponding triangular fuzzy ...

متن کامل

Graphical Password Security Evaluation by Fuzzy AHP

In today's day and age, one of the important topics in information security is authentication. There are several alternatives to text-based authentication of which includes Graphical Password (GP) or Graphical User Authentication (GUA). These methods stems from the fact that humans recognized and remembers images better than alphanumerical text characters. This paper will focus on the security ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Asia-pacific Journal of Convergent Research Interchange

سال: 2015

ISSN: 2508-9080

DOI: 10.21742/apjcri.2015.06.03