structure of expert systems [20]. It is shown in figure 2.
The algorithm is software implemented by authors. The example of the
information security risk assessment of the organization according to international
standards requirements and preferences of the information assets owner is considered.
5 Conclusions and Future Work
This paper presented an ontology-based approach that addresses the problem of
information security risk assessment. The considered algorithm provides the problem
decision of alternative's estimation which has network-like estimation criteria
structure. Quantitative criteria correspond to alternative's characteristics which are
measured in quantitative scale. Qualitative criteria correspond to alternative's
characteristics which are measured in qualitative discrete scales.
The algorithm estimates alternative in several criterion contexts. Use of contexts
provides the description of network-like criteria structure. Connections in criteria
structure are formalized by means of fuzzy measures Sugeno.
The information security risk assessment focused on risk identification, analysis,
and prioritization. Less attention was given to the risk management planning,
resolution, and monitoring. Further research should be conducted into such risk
management planning. In addition, risk monitoring should be conducted regularly to
track the status of the identified risks. With such insight and improvement, the
proposed approach could be further enhanced to handle the functionality of risk
management.
References
1. Mazur, S., Blasch, E., Chen, Y. and Skormin, V.: Mitigating Cloud Computing Security
Risks usinga Self-Monitoring Defensive Scheme. Distribution Statement A: Approved for
Public Release, (2011) 88ABW-2011-3983.
2. Wu, S. X. and Banzhaf, W.: The use of computational intelligence in intrusion detection
systems: A review. Applied Soft Computing, Vol. 10, (2010) 1–35.
3. Straub, D. and Welke, R.: Coping with systems risk: Security planning models for
management decision making. MIS Quarterly, Vol. 22(4), (1998) 441-469.
4. Smith, S. and Spaord, E.: Grand challenges in information security: Process and output.
IEEE Security & Privacy, Vol. 2(1), (2004) 69-71.
5. Hecker, A., Dillon, T., and Elizabeth, C.: Privacy Ontology Support for E-Commerce,
Internet Computing, Issue No. 2, (2008) 54 – 61.
6. Fenz, S. and Ekelhart, A.: Formalizing information security knowledge. ASIACCS ‘09:
Proceedings of the 2009 ACM symposium on Information, computer and communications
security, ACM, (2009) 183-194.
7. Kim, A, Luo, J. and Myong, K.: Security Ontology for Annotating Resources. Naval
Research Lab, NRL Memorandum Report, NRL/MR/5540-05-641: Washington, D.C.,
(2005).
8. Yeong Min Kima and Chee Kyeong Kimb.: Fuzzy based state assessment for reinforced
concrete building structures. Engineering Structures, Vol. 28. 9 (2006) 1286-1297.
83