The method of transforming intervals into triangular fuzzy numbers for systems for assessing information security risks
DOI:
https://doi.org/10.18372/2410-7840.20.12455Keywords:
risk analysis, risk assessment, information security risks, information security, fuzzy variable, converting intervals into fuzzy numbersAbstract
In the performance of an information security risks analy-sis and assessment task in weakly formalized environment mostly necessary to perform data processing in fuzzy conditions. For this process realization are used systems, in which the evaluation is based on the linguistic variables, which are based on parametric triangular fuzzy numbers etalons with a given number of terms. Etalons are deter-mined by expert’s at basic unit’s initialization stage during configuration of such systems. As a basis the expert takes ranges of values, that based on his conclusions, converts into fuzzy numbers. Efficiency of those evaluation systems will increase, if will be stipulated the opportunity of auto-matic intervals transformation without the involvement of appropriate expert’s. In this study proposed appropriate conversion method to solve such problem. It will simplify the etalons formation procedure, by implementing process of intervals transformation in triangular fuzzy numbers and minimizes impact of human factor.References
О. Корченко, С. Казмірчук, Б. Ахметов, Прикладні системи оцінювання ризиків інформаційної безпеки. Моно-графія, Київ, ЦП «Компринт», 2017, 435 с.
Common Vulnerability Scoring System v3.0. [Електронный ресурс]. Режим доступа: https://www.first. org/cvss/specification-document.
С. Казмирчук, "Анализ и оценивания рисков ин-формационных ресурсов в нечетких условиях", Защита информации, Том 15, №2 (59), С. 133-140, 2013.
С. Казмирчук, А. Гололобов, "Интегрированный метод анализа и оценивания рисков информа-ционной безопасности", Защита информации, №3, С. 252-261, 2014.
А. Корченко, С. Казмирчук, Ф. Приставка, Б. Ах-метов, "Аналитические выражения верификации лингвистических переменных для систем оцени-вания рисков информационной безопасности", Защита информации, Том 23, №1, С. 50-55, 2017.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).