Abstract
Threat to security has been increasing along with proliferation of service through the Web. Multi-attribute risk assessment serves as a useful tool to assess risk quantitatively by prioritizing sets of threats and security requirements. The case study presents decision-making methods as to the selection of information security technology and solution through the process of identifying risk and quantifying threat index. Since the intrusion types and analysis data was analyzed based on the statistics of multiple enterprises, it is advisable to classify the types into more detailed types suitable to the target company, and to reasonably reflect the characteristics of the organization through accumulation and utilization of the company’s own data.
Similar content being viewed by others
References
Ojanperä, T., & Mononen, R. (2002). Security and authentication in the mobile world. Wireless Personal Communications, 22(2), 229–235.
Saravanan, K., & Senthilkumar, A. (2015). Security enhancement in distributed networks using link-based mapping scheme for network intrusion detection with enhanced bloom filter. Wireless Personal Communications, 64(2), 821–839.
Prasad, A., & Kempf, J. (2003). Wireless personal communications special issue on security for next generation communications. Wireless Personal Communications, 26(2–3), 283–284.
Feledi, D., Fenz, S., & Lechner, L. (2013). Toward web-based information security knowledge sharing. Information Security Technical Report, 17, 199–209.
Kumar, R., & Singh, H. (2012). Analysis of information systems security issues and security techniques. International Journal of Advanced Computer Research, 2(6), 65–68.
Prasad, A. R., & Kempf, J. (2004). Security for next generation communications. Wireless Personal Communications, 29(3–4), 157–208.
Feng, N., Wang, H., & Li, M. (2013). A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis. Information Sciences, 256, 57–73.
Bang, Y., Lee, D., Bae, Y., & Ahn, J. (2012). Improving information security management: An analysis of ID–password usage and a new login vulnerability measure. International Journal of Information Management, 32(5), 409–418.
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38, 196–207.
Veiga, A., & Eloff, J. (2010). A framework and assessment instrument for information security culture. Computers & Security, 29, 196–207.
Kim, K., & Na, K. (2004). Threat index evaluation of information system using multi-attribute risk assessment method. Journal of Korea Risk Management Society, 15(2), 103–126.
Lee, K., Kim, K., & Na, K. (2008). Multi-attribute threat index for information security. Journal of Korea Society of IT Services, 7(1), 118–122.
Butler, S. (2000). Security attribute evaluation method: A cost benefit approach. In 24th International conference on software engineering proceedings (pp. 22–240).
Butler, S., & Fischbeck, P. (2001). Multi-attribute risk assessment, Technical Report CMU-CS-01-169.
Fuchs, L., Pernul, G., & Sandhu, R. (2011). Roles in information security—A survey and classification of the research area. Computers & Security, 30(8), 748–769.
Penta Security Systems Inc. (2013). Web application threat report: Trends for the second half of 2012.
Saaty, T. (1980). The analytic hierarchy process. New York: McGraw-Hill.
Korea Internet and Security Agency. (2012). Information security survey 2012 (enterprise edition).
Saleh, M. (2011). Information security maturity model. International Journal of Computer Science and Security, 5(3), 316–337.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Je, YM., You, YY. & Na, KS. Information Security Evaluation Using Multi-Attribute Threat Index. Wireless Pers Commun 89, 913–925 (2016). https://doi.org/10.1007/s11277-015-3140-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-015-3140-5