We propose a fuzzy approach to deal with risk analysis for information systems. We extend MAGERIT methodology that valuates the asset dependencies to a fuzzy framework adding fuzzy linguistic terms to valuate the different elements (terminal asset values, asset dependencies as well as the probability of threats and the resulting asset degradation) in risk analysis. Computations are based on the trapezoidal fuzzy numbers associated with these linguistic terms and, finally, the results of these operations are translated into a linguistic term by means of a similarity function
We suggested some methods for information security risk factors assessment. These methods are based ...
This paper presents a comprehensive overview of currently known applications of computing with words...
Several studies have proposed the concept of "fuzzy logic technique" to assess risk in information s...
We propose a fuzzy approach to deal with risk analysis for information systems. We extend MAGERIT me...
Several methodologies based on ISO/IEC 27000 international standard have been developed to deal with...
Assets are interrelated in risk analysis methodologies for information systems promoted by internati...
A new approach to analyze the risks a computer system may be subject to. A non-numeric method that a...
In this paper we focus on the selection of safeguards in a fuzzy risk analysis and management method...
Organizations use different types of information system to reach their goals. Decision makers are re...
Analysis of information security risks is an important part in design of information security system...
In the framework of the linguistic truth-valued lattice implication algebra, we present a 10-element...
The most important factors contributing to the risk of failure for any type of organization or syste...
Risk analysis (RA) contains several methodologies that object to ensure the protection and safety of...
This paper introduces a procedural method based on fuzzy logic to analyze systematic the risk of an ...
Concerning the essence of risk, we suggest a new definition of risk: a scene in the future associate...
We suggested some methods for information security risk factors assessment. These methods are based ...
This paper presents a comprehensive overview of currently known applications of computing with words...
Several studies have proposed the concept of "fuzzy logic technique" to assess risk in information s...
We propose a fuzzy approach to deal with risk analysis for information systems. We extend MAGERIT me...
Several methodologies based on ISO/IEC 27000 international standard have been developed to deal with...
Assets are interrelated in risk analysis methodologies for information systems promoted by internati...
A new approach to analyze the risks a computer system may be subject to. A non-numeric method that a...
In this paper we focus on the selection of safeguards in a fuzzy risk analysis and management method...
Organizations use different types of information system to reach their goals. Decision makers are re...
Analysis of information security risks is an important part in design of information security system...
In the framework of the linguistic truth-valued lattice implication algebra, we present a 10-element...
The most important factors contributing to the risk of failure for any type of organization or syste...
Risk analysis (RA) contains several methodologies that object to ensure the protection and safety of...
This paper introduces a procedural method based on fuzzy logic to analyze systematic the risk of an ...
Concerning the essence of risk, we suggest a new definition of risk: a scene in the future associate...
We suggested some methods for information security risk factors assessment. These methods are based ...
This paper presents a comprehensive overview of currently known applications of computing with words...
Several studies have proposed the concept of "fuzzy logic technique" to assess risk in information s...