首页> 外文期刊>Journal of Information Security >Using the Analytical Hierarchy Process Model in the Prioritization of Information Assurance Defense In-Depth Measures?—A Quantitative Study
【24h】

Using the Analytical Hierarchy Process Model in the Prioritization of Information Assurance Defense In-Depth Measures?—A Quantitative Study

机译:使用分析层次流程模型在信息保障防御深度测量的优先级中?-A定量研究

获取原文
           

摘要

Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth information assurance measures such as firewalls, intrusion detection systems, and password procedures across their enterprises to plan strategically and manage IT security risks. This quantitative study explores whether the analytical hierarchy process (AHP) model can be effectively applied to the prioritization of information assurance defense in-depth measures. In response to these threats, the President, legislators, experts, and others have characterized cyber security as a pressing national security issue. The methods used in this study consisted of emailing study participants a survey requesting that they prioritize five defense in-depth information assurance measures, anti-virus, intrusion detection, password, smart-cards, and encryption, with a range of responses from 1 - 5 using a Likert scale to consider standard cost, effectiveness, and perceived ease of use in terms of protection of organizational computing devices. The measures were then weighted, based on ranking. A pair-wise comparison of each of the five measures is then made using AHP to determine whether the Likert scale and the AHP model could be effectively applied to the prioritization of information assurance measures to protect organizational computing devices. The findings of the research reject the H0 null hypothesis that AHP does not affect the relationship between the information technology analysts’ prioritization of five defense in-depth dependent variables and the independent variables of cost, ease of use, and effectiveness in protecting organizational devices against cyber-attacks.
机译:组织计算设备越来越多地成为网络攻击的目标,而组织已取决于计算机网络的安全性和安全性及其组织计算设备。商业和政府经常使用防御深入信息保障措施,例如防火墙,入侵检测系统和密码程序,以战略性地规划和管理IT安全风险。该定量研究探讨了分析层次结构(AHP)模型是否可以有效地应用于信息保障防御深度措施的优先级。为应对这些威胁,总统,立法者,专家和其他人都表征了网络安全作为一个紧迫的国家安全问题。本研究中使用的方法包括电子邮件学习参与者的调查,要求他们优先考虑五种防御深入信息保证措施,防病毒,入侵检测,密码,智能卡和加密,以及1的一系列响应 - 5使用李克特规模考虑在组织计算设备的保护方面考虑标准成本,有效性和感知易用性。然后根据排名加权措施。然后使用AHP进行五项测量中的每一个的一对比较,以确定是否可以有效地应用于保护组织计算设备的信息保障措施的优先级,以确定李克特量表和AHP模型。研究结果拒绝了H0 NULL假设,即AHP不会影响信息技术分析师在五防守深入依赖变量的优先级和成本的独立变量之间的关系,保护组织设备的效果网络攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号