The Research of Information Security Risk Assessment Method Based on AHP

Article Preview

Abstract:

Information security risk assessment is one important part of the security engineering in information system. It has been the focus of the research in the world wide information security fields. This paper designs and realizes a new model of information security risk assessment based on AHP method. In this case, In order to estimate the network security risk by AHP method, firstly should identify the most related factors and establish the threaten identification Hierarchical Model and Vulnerability Identification Hierarchical Model for information security risks. Then, compare every two elements to determine the relative importance of each element. Finally, judge the comprehensive weight for each element. The study of the case shows that the method can be easily used to the risk assessment of the network security. The results are in accord with the reality.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

575-580

Citation:

Online since:

February 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] J. H. Green, V. A Dawley, in: proposal for construction project risk assessment using fuzzy logic[J]. Construction Management and Economy ics, Vol. 18: 491-500(2000).

DOI: 10.1080/01446190050024905

Google Scholar

[2] T. L Saaty, L.G. Vargas, in: Project risk assessment using the analytic hierarchy process[J]. IEEE Transactions on Engineering Management, 38(1): 46-52(1991).

DOI: 10.1109/17.65759

Google Scholar

[3] Information on http: /www. altrancontrolsolutions. com.

Google Scholar

[4] R. Ramanathan. Stochastic decision making using multiplicative AHP. European Journal of Operational Research 97, 543-549(1997).

DOI: 10.1016/s0377-2217(96)00285-8

Google Scholar

[5] Malcolm Beynon. An analysis of distribution of priority values from alternative comparison scales within AHP. European Journal of Operational Research1 40, 104-117(2002).

DOI: 10.1016/s0377-2217(01)00221-1

Google Scholar

[6] Information on http: /www. conetrix. com.

Google Scholar