首页> 外文期刊>Journal of intelligent & fuzzy systems: Applications in Engineering and Technology >Combination of AHP and TOPSIS methods for the ranking of information security controls to overcome its obstructions under fuzzy environment
【24h】

Combination of AHP and TOPSIS methods for the ranking of information security controls to overcome its obstructions under fuzzy environment

机译:AHP和TopSIS方法的组合在于信息安全控制的排名,以克服模糊环境下的障碍物

获取原文
获取原文并翻译 | 示例
           

摘要

The organizations utilizing the cloud computing services are required to select suitable Information Security Controls (ISCs) to maintain data security and privacy. Many organizations bought popular products or traditional tools to select ISCs. However, selecting the wrong information security control without keeping in view severity of the risk, budgetary constraints, measures cost, and implementation and mitigation time may lead to leakage of data and resultantly, organizations may lose their user's information, face financial implications, even reputation of the organization may be damaged. Therefore, the organizations should evaluate each control based on certain criteria like implementation time, mitigation time, exploitation time, risk, budgetary constraints, and previous effectiveness of the control under review. In this article, the authors utilized the methodologies of the Multi Criteria Decision Making (MCDM), Analytic Hierarchy Process (AHP) and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) to help the cloud organizations in the prioritization and selection of the best information security control. Furthermore, a numerical example is also given, depicting the step by step utilization of the method in cloud organizations for the prioritization of the information security controls.
机译:需要使用云计算服务的组织来选择合适的信息安全控制(ISCS)来维护数据安全性和隐私。许多组织购买了流行的产品或传统工具,以选择ISC。但是,选择错误的信息安全控制而不保持风险的严重性,预算限制,措施成本和实施和缓解时间可能导致数据泄漏,而且结果可能会失去用户的信息,面临财务影响,甚至声誉组织可能会损坏。因此,组织应根据实施时间,缓解时间,开发时间,风险,预算限制以及审查的控制的先前有效性来评估每个控制。在本文中,作者利用了多标准决策(MCDM),分析层次处理(AHP)和技术的方法,以便通过相似性与理想解决方案(TOPSIS)的偏好顺序,以帮助云组织在优先级排序和选择中最佳信息安全控制。此外,还给出了一个数值示例,描述了云组织中的方法的步骤利用,以便优先考虑信息安全控制。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号