Unknown

Dataset Information

0

Prioritization of Information Security Controls through Fuzzy AHP for Cloud Computing Networks and Wireless Sensor Networks.


ABSTRACT: With the advent of cloud computing and wireless sensor networks, the number of cyberattacks has rapidly increased. Therefore, the proportionate security of networks has become a challenge for organizations. Information security advisors of organizations face difficult and complex decisions in the evaluation and selection of information security controls that permit the defense of their resources and assets. Information security controls must be selected based on an appropriate level of security. However, their selection needs intensive investigation regarding vulnerabilities, risks, and threats prevailing in the organization as well as consideration of the implementation, mitigation, and budgetary constraints of the organization. The goal of this paper was to improve the information security control analysis method by proposing a formalized approach, i.e., fuzzy Analytical Hierarchy Process (AHP). This approach was used to prioritize and select the most relevant set of information security controls to satisfy the information security requirements of an organization. We argue that the prioritization of the information security controls using fuzzy AHP leads to an efficient and cost-effective assessment and evaluation of information security controls for an organization in order to select the most appropriate ones. The proposed formalized approach and prioritization processes are based on International Organization for Standardization and the International Electrotechnical Commission (ISO/IEC) 27001:2013. But in practice, organizations may apply this approach to any information security baseline manual.

SUBMITTER: Tariq MI 

PROVIDER: S-EPMC7085684 | biostudies-literature | 2020 Feb

REPOSITORIES: biostudies-literature

altmetric image

Publications

Prioritization of Information Security Controls through Fuzzy AHP for Cloud Computing Networks and Wireless Sensor Networks.

Tariq Muhammad Imran MI   Ahmed Shakeel S   Memon Nisar Ahmed NA   Tayyaba Shahzadi S   Ashraf Muhammad Waseem MW   Nazir Mohsin M   Hussain Akhtar A   Balas Valentina Emilia VE   Balas Marius M MM  

Sensors (Basel, Switzerland) 20200228 5


With the advent of cloud computing and wireless sensor networks, the number of cyberattacks has rapidly increased. Therefore, the proportionate security of networks has become a challenge for organizations. Information security advisors of organizations face difficult and complex decisions in the evaluation and selection of information security controls that permit the defense of their resources and assets. Information security controls must be selected based on an appropriate level of security.  ...[more]

Similar Datasets

| S-EPMC5539863 | biostudies-other
| S-EPMC7038969 | biostudies-literature
| S-EPMC4138945 | biostudies-other
| S-EPMC10703023 | biostudies-literature
| S-EPMC7230309 | biostudies-literature
| S-EPMC10997138 | biostudies-literature
| S-EPMC4300191 | biostudies-literature
| S-EPMC4891726 | biostudies-other
| S-EPMC9693494 | biostudies-literature
| S-EPMC4493908 | biostudies-literature