A Fuzzy Approach to Risk Analysis in Information Systems
Eloy Vicente, Antonio Jim´enez and Alfonso Mateos
Departamento de Inteligencia Artificial, Facultad de Inform´atica, Universidad Polit´ecnica de Madrid,
Campus de Montegancedo S/N, 28660, Boadilla del Monte, Madrid, Spain
Keywords:
Risk Analysis, Information Systems, Trapezoidal Fuzzy Numbers.
Abstract:
Assets are interrelated in risk analysis methodologies for information systems promoted by international stan-
dards. This means that an attack on one asset can be propagated through the network and threaten an organi-
zation’s most valuable assets. It is necessary to valuate all assets, the direct and indirect asset dependencies,
as well as the probability of threats and the resulting asset degradation. These methodologies do not, however,
consider uncertain valuations and use precise values on different scales, usually percentages. Linguistic terms
are used by the experts to represent assets values, dependencies and frequency and asset degradation associ-
ated with possible threats. Computations are based on the trapezoidal fuzzy numbers associated with these
linguistic terms.
1 INTRODUCTION
Information Systems (IS) are composed of a set of
data management elements designed to provide ser-
vices and benefits in areas as far a part as public ad-
ministration, industrial control, the banking or geo-
graphical and weather information.
Technological developments and the universal in-
ternet access has led to an increase in system vulner-
abilities. Therefore, ISs have to be analysed with a
view to risk minimization by means of well-planned
actions to protect information, processes and services
from possible threats. Threats range from act of ter-
rorism, industrial espionage, etc., or even a simple un-
intentional human error by an operator.
Standards promoted by the International Organi-
zation for Standardization [ISO/IEC](2005, 2011) on
IS security suggest three-stage risk analysis and man-
agement methodologies.
The planning stage establishes the necessary
points for starting up the project, defines objectives,
and identifies participants and competencies. The
analysis stage identifies the IS assets, as well as their
relations (dependencies), the threats to which they are
exposed and their frequency and asset degradation
levels. Finally, the risk management stage determines
the safeguards and strategies that reduce impact and
risk.
In this paper, we focus on the second stage, anal-
ysis. Assets are the IS or related resources, necessary
for an organization’s correct operation and for achiev-
ing the goals set by its manager. Assets can be data,
applications, software, facilities, hardware, services...
The asset dependencies are usually represented in
terms of percentages, signalling how likely the failure
of an asset is to affect another.
Often only a few elements (terminal assets), usu-
ally data or services, account for the total value of
an organization’s assets. The value of these assets is
transferred to other assets through the established de-
pendency relations. Thus, non-terminal assets have
no intrinsic values; they accumulate their value from
terminal assets.
However, the methodologies based on interna-
tional standards, such us (L´opez Crespo, Amutio-
G´omez, Candau and Ma˜nas, 2006a, 2006b, 2006c),
MEHARI [CSIF](2010), CRAMM [CCTA](2003),
OCTAVE-S (Alberts and Dorofee, 2005) or NIST
800-30 (Stoneburner and Gougen, 2002), obviate the
difficulty of correctly assigning asset dependencies,
as well as terminal asset values or the impact on the
entire system caused by the materialization of a threat
to an asset. Moreover, these methodologies do not
consider uncertainty concerning these assessments.
In this paper we propose a fuzzy risk analysis in
IS as a solution to these deficiencies.
Section 2 reviews some operations on trapezoidal
fuzzy numbers and introduces a fuzzy evaluation of
asset dependencies. Section 3 provides a fuzzy five-
component valuation of assets on the basis of five
328
Vicente E., Jiménez A. and Mateos A..
A Fuzzy Approach to Risk Analysis in Information Systems.
DOI: 10.5220/0004212001300133
In Proceedings of the 2nd International Conference on Operations Research and Enterprise Systems (ICORES-2013), pages 130-133
ISBN: 978-989-8565-40-2
Copyright
c
2013 SCITEPRESS (Science and Technology Publications, Lda.)