Uploaded by sifat mamun

A Fusion of Cloud Model and Graph Theory

advertisement
Innovative Risk Assessment in
Information Systems: A Fusion of
Cloud Model and Graph Theory
Muhammad
Abdullah Al Mamun
Puja Roy Rini
MASc. in Computer Engineering
Memorial University of
Newfoundland
muhammad@mun.ca
MASc. in Computer Engineering
Memorial University of
Newfoundland
amamun@mun.ca
MASc. in Computer Engineering
Memorial University of
Newfoundland
prrini@mun.ca
Abstract— The papers emphasize the importance of timely
prevention of information security threats through specialized
software and hardware as an effective foundation for businesses,
reducing reputational and financial risks. Protection must cover all
possible attack areas, and the FSTEC order No31 of March 14,
2014, in Russian legislation can be adopted as a basis for
implementing protection measures at different levels. Graph theory
is suggested to build an optimal enterprise information protection
system, where a ranked descending graph is constructed, and
critical paths are determined based on expert evaluations. The
second paper addresses the challenges of increasing threats and
uncertainty in information system security and proposes an
information security risk assessment approach based on the
multidimensional cloud model and entropy theory to enhance
objectivity and accuracy.
Index Terms—prevention, graph, security, cloud, protection
most appropriate information security tools based on expert
evaluations of preferences and capabilities.
Both papers underscore the significance of information security
in the modern age and highlight the need for comprehensive risk
assessment and protection measures. The first paper introduces a
novel approach using the multidimensional cloud model and
entropy theory to analyze information system risks objectively,
emphasizing targeted risk control measures for secure and stable
information systems. The second paper discusses the foundations
for effective business security, including timely threat prevention
and elimination, and outlines 21 levels of protection based on
Russian legislation. It proposes using graph theory to optimize an
enterprise's information security system, enabling the selection of
appropriate tools based on expert evaluations and available
resources.
II. CHALLENGES
I. INTRODUCTION
"Information system security risk assessment based on
multidimensional cloud model and the entropy theory"
emphasizes the significance of information security risk
assessment in the information age, where technology brings
both convenience and risks. The paper introduces an innovative
approach using a multidimensional cloud model and entropy
theory to comprehensively analyze various risk factors in
information systems. By integrating qualitative and quantitative
data, this method enhances objectivity and accuracy in risk
assessment while minimizing the impact of subjective factors. It
highlights the importance of understanding security status and
implementing targeted risk control measures to maintain
information system security.
"The information security system synthesis using the graphs
theory" discusses effective business foundations, including
timely prevention of information security threats and prompt
elimination of realized threat consequences. It emphasizes the
need for protection in all possible attack areas. Referring to
Russian Federation legislation, FSTEC order №31 of March 14,
2014, serves as the basis for "isolating" protection vectors and
outlines 21 levels or subsystems for information security
protection. The paper proposes applying graph theory to
optimize the construction of an enterprise's information security
system (ISS) based on required security levels and available
resources. By constructing a ranked descending graph and
solving the optimization problem, it enables the selection of the
"Information system security risk assessment based on
multidimensional cloud model and the entropy theory," includes
the complexity and resource intensity of implementing the novel
approach, requiring specialized expertise and significant effort
for integrating qualitative and quantitative data. The method's
effectiveness and applicability might vary across different
information systems, potentially limiting generalizability. "The
information security system synthesis using the graphs theory,"
challenges lie in the practical implementation of the graph
theory-based optimization approach, demanding advanced
technical knowledge and expertise. Accurately evaluating and
comparing information security tools based on expert evaluations
may introduce bias and variability, affecting the selection
process. Both papers may encounter difficulties in gaining realworld applicability and acceptance, necessitating efforts to
convince stakeholders of the benefits, and overcome resistance to
change or unfamiliar methodologies in the field of information
security
III. OBJECTIVES
•
Develop an Integrated Risk Assessment Framework:
The primary objective would be to create a
comprehensive and integrated risk assessment
framework that combines the multidimensional cloud
model, entropy theory, and graph theory. This
framework should be capable of analyzing various risk
factors in information systems and providing a holistic
view of security risks.
•
•
•
•
•
4.1 Information System Security Risk Assessment:
Information system security risk assessment is a critical process
in the context of the information age, where technology presents
both opportunities and risks. The assessment aims to identify,
analyze, and evaluate potential security threats that could impact
the confidentiality, integrity, and availability of information
systems. Traditional risk assessment methods often involve
subjective judgments, leading to potential biases and
inaccuracies. The merged paper introduces an innovative
approach that leverages the multidimensional cloud model and
Optimize Information Security System Construction:
entropy theory to comprehensively assess risk factors in
The objective is to use the graph theory-based
information systems. By integrating qualitative and quantitative
optimization approach to design and construct an
data, this method enhances the objectivity and accuracy of risk
effective information security system (ISS) for
assessment while reducing the influence of traditional subjective
enterprises. The ranked descending graph will help
factors. The objective is to provide a robust foundation for
identify critical paths and prioritize the selection of
appropriate security tools based on expert evaluations. understanding the security status of information systems and
implementing targeted risk control measures to maintain their
security.
Address Timely Prevention and Threat Elimination:
The merged approach should focus on addressing
4.2 Multidimensional Cloud Model and Entropy Theory:
timely prevention of information security threats and
prompt elimination of realized threat consequences. By The multidimensional cloud model is an extension of the oneimplementing protection measures at all possible attack dimensional cloud model that allows the representation of
areas, the ISS can be more resilient to potential threats. multidimensional qualitative concepts. In the context of
information system security risk assessment, the
multidimensional cloud model enables the incorporation of
Validate and Apply the Model: Conduct empirical
multiple dimensions of risk factors, considering their
validation of the merged risk assessment framework
using real-world data and case studies. The objective is interrelationships and uncertainties. This model allows for the
representation of fuzziness and randomness in the data, leading
to demonstrate the effectiveness and applicability of
the model in diverse organizational settings and various to a more comprehensive and realistic analysis. Alongside the
cloud model, the paper utilizes the entropy theory, which serves
industry sectors.
as a measure of uncertainty. By applying entropy theory, the
Promote Adoption and Standardization: The objective method calculates the degree of membership of risk factors in
different states or concepts, enhancing the objectivity of the risk
is to promote the adoption of the integrated risk
assessment framework across different industries and assessment process. The integration of the multidimensional
cloud model and entropy theory facilitates a holistic and accurate
organizations. Standardizing the approach would
evaluation of information system security risks.
ensure consistency in risk assessment practices and
Enhance Objectivity and Accuracy in Risk
Assessment: The merged approach should aim to
improve the objectivity and accuracy of information
security risk assessment by minimizing the influence of
subjective factors. By integrating both qualitative and
quantitative data, the objective evaluation of security
risks can be achieved.
facilitate better collaboration and knowledge sharing
among security professionals.
•
•
IV. LITERATURE REVIEW
4.3 Graph Theory for Information Security System Synthesis:
Graph theory is a powerful tool in the optimization and synthesis
of complex systems, and it finds application in the construction
Consider Legal and Regulatory Requirements: The
of an enterprise's information security system (ISS). The second
merged approach should take into account legal and
regulatory requirements, such as the FSTEC order №31 paper emphasizes the need for protection in all possible attack
of March 14, 2014, in the Russian Federation, to ensure areas and outlines 21 levels or subsystems for information
security protection based on Russian Federation legislation. By
that the information security system aligns with the
applying graph theory, a ranked descending graph is constructed,
applicable laws and guidelines.
where vertices represent expert information security tools at
specific levels (subsystems), and arcs connect these vertices
Enhance Resilience and Adaptability: The merged
based on their priority. The weights assigned to the arcs reflect
approach should aim to create an information security
the integration priority of each security tool into the information
system that is not only effective in the current context
system. Through optimization techniques and critical path
but also adaptable to evolving security threats. The
analysis, the most appropriate information security tools can be
objective is to enhance the resilience of the ISS and
selected based on expert evaluations of preferences and
enable it to respond proactively to emerging risks.
capabilities. The utilization of graph theory allows for an
effective synthesis of the ISS, enabling businesses to timely
prevent security threats and mitigate potential consequences.
V. DATA TABLE OVERVIEW
Methodology
Applies graph theory to construct
a ranked descending graph to
identify critical paths and select
the most appropriate information
security tools based on expert
evaluations.
The use of graph theory allows
for efficient optimization of the
ISS, covering all vulnerable
areas and ensuring effective
protection against security
threats.
Data Table for "Information System Security Risk Assessment
based on Multidimensional Cloud Model and the Entropy
Theory":
Key Findings
Topic/Aspect
Description
Paper Title
Information System Security
Risk Assessment based on
Multidimensional Cloud Model
and the Entropy Theory
To introduce a novel risk
assessment approach using a
multidimensional cloud model
and entropy theory to analyze
various risk factors in
information systems.
Main Objective
Importance
Discusses the criticality of
information security risk
assessment in the information age
to maintain system security and
implement targeted risk control
measures.
Methodology
Utilizes multidimensional cloud
models and entropy theory to
integrate qualitative and
quantitative data for enhanced
objectivity and accuracy in risk
assessment.
Key Findings
The approach reveals objective
objects with fuzziness and
randomness, reducing the
influence of traditional subjective
factors in risk assessment
Data Table for "The Information Security System Synthesis
using Graph Theory":
Topic/Aspect
Description
Paper Title
The Information Security System
Synthesis Using Graph Theory
Main Objective
To optimize the construction of
an enterprise's information
security system (ISS) based on
required security levels and
available resources using graph
theory.
IV.
1.
PROBLEM STATEMENT
"Information system security risk assessment based on
multidimensional cloud model and the entropy theory":
Problem Statement: The paper addresses the need for effective
information system security risk assessment in the information
age, considering the risks introduced by information technology.
The problem is to develop a comprehensive risk assessment
approach that can understand the security status of information
systems, implement targeted risk control measures, and construct
secure, stable, and upgradable information systems. The
challenge is to overcome traditional subjective factors and
enhance objectivity and accuracy in risk assessment.
Objectives: The main objective of the paper is to propose a novel
information system security risk assessment model using the
multidimensional cloud model and the entropy theory. This
model should comprehensively analyze various risk factors,
combining qualitative and quantitative data through the cloud
model. The aim is to provide an objective approach to risk
assessment, minimizing the influence of traditional subjective
factors and keeping information security risks within acceptable
limits.
2.
"The information security system synthesis using the
graphs theory":
Problem Statement: The paper aims to address the effective
foundations for businesses to deal with information security
threats promptly and protect vulnerable areas. The problem is to
optimize the construction of an enterprise's information security
system (ISS) by applying graph theory. This involves
determining critical paths and selecting appropriate security tools
based on expert evaluations of preferences and capabilities.
V. SYSTEM MODEL
Importance
Focuses on timely prevention of
information security threats and
prompt elimination of realized
threat consequences for effective
security protection.
The model presented in the paper is a comprehensive
"Information System Security Risk Assessment Model" that
integrates graph theory and regulatory approaches for
information security. It involves the development of threat and
intruder models, considering different potential levels for
intruders based on FSS and FSTEC classifications. The model
aids in identifying suitable defines strategies for state and nonstate information systems, neutralizing threats based on intruder
potential levels. Additionally, the model utilizes the
"Multidimensional Cloud Model" and "Entropy Theory" to
assess risks by determining the possibilities of security incidents
and measuring the relative importance of risk components. It
systematically evaluates information system security risks,
ensuring objectivity and accuracy through the consideration of
multiple factors
VI. DATA COLLECTION AND
ANALYSIS
To conduct data collection and analysis for the two papers, you
would typically follow these steps:
Data Collection for "Information System Security Risk
Assessment":
• Identify the information systems and organizations to
be studied for risk assessment.
• Gather relevant data on the information systems,
including their architecture, components, assets, and
vulnerabilities.
• Collect data on historical security incidents and their
impacts on the systems.
• Obtain expert opinions and knowledge from
professionals in the field of information security.
•
Solve the optimization problem to select the most
appropriate information security tools based on the
identified critical paths and expert evaluations.
For both papers, data analysis may involve using statistical
methods, mathematical calculations, and modeling techniques to
assess risk levels, vulnerability severity, and the effectiveness of
security measures. Additionally, expert judgment and qualitative
assessments may be integrated into the analysis to enhance the
accuracy of the findings. The goal is to provide practical and
effective risk assessment and information security system
synthesis solutions.
VII. PROPOSED MODEL
The model presented in the paper “The information security
system synthesis using the graphs theory” outlines a preparatory
stage for synthesizing an Information Security System (ISS)
using graph theory. During the preparatory stage of Information
Security System (ISS) synthesis using graph theory, we focus on
distinguishing the development stages of the threat model and
intruder model [1]. The model involves the development of both
a threat model and an intruder model. Different regulatory
Data Analysis for "Information System Security Risk
approaches for information security, as approved by Russia's
Assessment":
Federal Security Service (FSS) and the Federal Service for
Technical and Export Control (FSTEC) [3], are considered.
• Apply the multidimensional cloud model and entropy
These approaches are integrated based on intruder potential
theory to analyze the collected data.
levels, and the type of intruder is chosen depending on the
• Integrate qualitative and quantitative data using the
information system class [2]. For state information systems,
cloud model to reveal objective risk factors with
threats are neutralized based on the potential level of the intruder.
fuzziness and randomness.
For non-state systems, threats are neutralized based on the type
• Calculate risk scores based on the identified risk of undeclared capabilities in the system software presence
possessed by the intruder, categorized as high, medium, or low
factors and their levels of severity.
• Evaluate the impact and likelihood of potential security potential intruders. The model aids in identifying appropriate
defense strategies for different system classifications and
incidents on the information systems.
potential intruder levels.
Data Collection for "Information Security System Synthesis
Using Graph Theory":
•
•
•
Identify businesses or organizations that require an
information security system synthesis.
Collect information on the existing information
security measures and infrastructure.
Gather data on different protection measures, such as
access control, software restriction, antivirus
protection, and incident response.
VIII. PROPOSED SOLUTION
Proposed solutions of "Information system security risk
assessment based on multidimensional cloud model and the
entropy theory" paper:
1.
Novel Risk Assessment Approach: The paper proposes
a novel approach to information system security risk
assessment by using a multidimensional cloud model
and the entropy theory. This approach allows for a more
comprehensive analysis of various risk factors in
information systems, enhancing the objectivity and
accuracy of risk assessment.
2.
Integration of Qualitative and Quantitative Data: By
integrating qualitative and quantitative data through the
cloud model, the proposed method reveals objective
objects with fuzziness and randomness. This reduces the
influence of traditional subjective factors, making the
risk assessment more reliable and credible.
Data Analysis for "Information Security System Synthesis
Using Graph Theory":
•
•
•
Apply graph theory to optimize the construction of the
information security system.
Construct a ranked descending graph to determine
critical paths and interconnections between security
measures.
Evaluate the preferences and capabilities of available
security tools and resources.
enterprise information system and assessing the threat realization
probability and danger assessment. The paper outlines the
necessary steps to compile an actual information security threats
list and identifies the factors for selecting optimal software,
hardware, and firmware from the market based on the protection
requirements.
The integration of the FSS and FSTEC approaches involves
categorizing potential intruders based on the FSS classification.
Low potential intruders under FSTEC align with intruders
classified as H1-H3 by FSS, while average potential intruders
align with H4-H5, and high potential intruders align with H6.
Proposed solutions of "The information security system
Depending on the information system's classification, a specific
synthesis using the graphs theory" paper:
intruder type is chosen for defense. For state information
1. Comprehensive Protection: The paper emphasizes the systems, FSTEC Order No. 17 is referenced [4], and threats are
importance of protecting all possible areas vulnerable neutralized based on the intruder's potential level, with high
potential intruders for first-class systems, average potential for
to attacks. By utilizing graph theory to optimize the
second-class, and low potential for third and fourth-class
construction of an enterprise's information security
systems. For non-state systems, Government Decision No. 1119
system (ISS), the proposed solution ensures a
is used [5], with threats neutralized according to the intruder's
comprehensive approach to protection, covering
undeclared capabilities in system software presence, ranging
various aspects such as access control, software
from high potential for the first type, medium potential for the
restriction, antivirus protection, and incident response. second type, and low potential for the third type. The enterprise
information system's initial security level (prior to the ISS
implementation) is also determined, which is necessary to
2. Customized Security System: The application of graph compile an actual information security threats list (Table I).
theory enables the identification of critical paths and
the selection of the most appropriate information
security tools based on expert evaluations. This
customization ensures that the information security
system is tailored to the specific security requirements
and available resources of the organization, enhancing
its efficiency and effectiveness.
3.
Targeted Risk Control Measures: Effectively
evaluating information system risks enables a better
understanding of the security status, facilitating the
implementation of targeted risk control measures. This
helps in keeping information security risks within
acceptable limits and contributes to the construction of
secure, stable, and upgradable information systems.
3.
Compliance with Legislation: Referring to the FSTEC
order №31 [4], the proposed solution provides a basis
for "isolating" protection vectors and outlines 21 levels
or subsystems for information security protection. This
ensures that the constructed information security
system aligns with relevant Russian Federation
legislation, promoting legal compliance and adherence
to regulatory requirements.
IX. RESULTS AND FINDINGS
The model presented in the paper “The information security
system synthesis using the graphs theory” involves the
development of both a threat model and an intruder model as a
preparatory stage for synthesizing an Information Security
System (ISS) using graph theory. The intruder model considers
different regulatory approaches for information security,
specifically those approved by the Russian Federal Security
Service (FSS) and the Federal Service for Technical and Export
Control (FSTEC). These approaches are integrated based on
intruder potential levels, and the type of intruder is chosen
depending on the information system class. For state
information systems, threats are neutralized based on the
potential level of the intruder, and for non-state systems, threats
are neutralized based on the type of undeclared capabilities in
the system software presence possessed by the intruder,
categorized as high, medium, or low potential intruders. The
model also involves determining the initial security level of the
Table I. Initial security level determination
The protection initial degree is a method of assessing the security
level of an information system based on specific characteristics.
An information system is considered to have a high initial
security level if at least 70% of its characteristics correspond to
the "high" security level, with the remaining characteristics at an
"average" security level. If the conditions for high initial security
are not met, and at least 70% of the characteristics are at a level
not lower than "average," the system is categorized as having an
average initial security level; otherwise, it is classified as having
a low initial security level. Each level of initial security is
assigned a numerical coefficient (Y1) – 0 for high, 5 for average,
and 10 for low. The threat realization probability is then assessed
based on expert judgment, with four verbal gradations: unlikely
(Y2 = 0), low probability (Y2 = 2), average probability (Y2 = 5),
and high probability (Y2 = 10). The threat realizability factor (Y)
is calculated by combining the security level evaluation (Y1)
and threat probability (Y2) using the formula Y = (Y1 + Y2)/20
[11]. The final information security threat danger assessment is
determined verbally as low risk, medium danger, or high
danger, based on the calculated threat realization possibility.
Based on the assigning rules for security threats outlined in
Table II, the enterprise's information system can categorize and
identify which threats are actual and relevant to its security. By
comparing the characteristics of the identified threats with the
rules specified in the table, the system can determine whether a
particular threat poses a real risk and requires appropriate
measures to address it or if it is irrelevant and can be
disregarded in the security assessment. This process helps in
prioritizing and focusing on the actual threats that need
immediate attention and mitigation efforts, ensuring a more
effective and targeted approach to information system security.
Figure 1.
The theory of risk analysis
The model introduces the Multidimensional Cloud Model
(MDCM) and Entropy Theory for risk assessment. MDCM
extends the one-dimensional cloud model to accommodate
qualitative concepts in an m-dimensional field U, where X
represents an element in the field with a membership degree μ in
the qualitative concept T [13]. The m-dimensional normal cloud
model is characterized by 3m numerical features: expectations
(Ex1, Ex2,..., Exm), entropies (En1, En2,..., Enm), and hyper
entropies (He1, He2,..., Hem). The Mathematical Expected
Hyper Surface (MEHS) equation of the dimensional cloud model
is expressed as MEHS (x1, x2,..., xm) =
exp[−(1/2)∑i=1m(x−EXi)^2/En2i].
Table II. Rules for determining the threat urgency
The Multidimensional Cloud Generator Algorithm includes a
forward cloud generator and a backward cloud generator. The
Once the information system category and class have been
determined, along with the threat and intruder models, and the forward cloud generator generates K numbers of m-dimensional
normal random numbers (xj) based on expectations and
levels (subsystems) that require protection from potential
variances, and K values for m-dimensional normal random
attackers have been identified, the next step is to conduct a
numbers (yi) based on other expectations and variances. The
comprehensive market analysis of software, hardware, and
degree of membership (μi) is calculated as μi =
firmware options. The goal is to select the most suitable
solutions that align with the specific needs and requirements of exp[−(1/2)∑j=1m(xji−Exj)^2/y2ji]. The cloud generator
the system in terms of price, quality, and functionality. This step generates cloud droplets based on these parameters [12].
involves evaluating a wide range of available options to find the
optimal combination that best meets the organization's
information security needs.
Whereas the other one paper model utilizes the
Multidimensional Cloud Model and Entropy Theory for risk
assessment [13]. It considers security incidents from threats
exploiting vulnerabilities, incorporates cloud models to reflect
qualitative concepts, and assigns weights based on relative
importance to calculate "Value at Risk," providing a systematic
approach for accurate information system security risk
assessment. Information system security risk assessment
involves evaluating the potential security incidents resulting
from threats exploiting vulnerabilities through appropriate
methods and tools. It includes assessing the losses caused by
these incidents based on the asset values and vulnerability
severity. The influence on the information system is then
calculated considering the probabilities of security incidents and
their associated losses. The value at risk (Y) is computed using
the formula Y = R (A, T, V) = R(L(T, V), F(Ia, Va)), where R is
the information security risk calculation function [11], A
represents the assets of the information system, T denotes the
threats to the system, and V represents the vulnerabilities of the
system. Ia stands for the asset value of the security incident, and
Va represents the severity of the vulnerability. L refers to the
possibility of exploiting the vulnerability by a threat, and F
represents the loss caused by security incidents. The theory of
risk analysis is illustrated in Figure 1.
Figure 2.
Forward cloud generator
The application of Entropy Weight Theory and the Multiplicative
Method. Entropy is a measure of uncertainty in information
theory [9], and it is represented by the formula H(p1, p2, ..., pn)
= -∑i=1 to n (pi * ln(pi)), where pi is the probability of the
system being in state Si. The Multiplicative Method is used to
determine an element (θ) based on two or more elements (α and
β) and is represented by the formula θ = α⊗β, which ⊗ denotes
taking the square root after multiplying α and β [6]. These
mathematical techniques are employed to assess and calculate the
uncertainty and relationships between various elements in the
context of information security risk assessment.
The model involves three main steps:
1.
Determining the Evaluation Index Set: This step
includes structuring risk sets for assets, threats, and
vulnerabilities. Each factor is assigned a level of risk
based on appropriate evaluation sets, represented by
numerical characteristics (Ex, En, He).
2.
Determining the Degree of Membership of Risk: This information system security. Table of risk grade is shown as
follows.
step involves generating cloud models for the
possibility of security incidents based on threats and
vulnerabilities, and cloud models for the loss of
security incidents based on assets and vulnerabilities.
The membership matrix of security incidents and the
membership matrix of the loss of security incidents are
Table I. Risk grade table
calculated using these cloud models [6].
These mathematical techniques are used to assess and quantify
the risks associated with different factors in information
security, enhancing the objectivity and accuracy of the risk
assessment process [7]. As well as calculating the membership
matrix of the loss of security incidents based on the cloud model
of the losses of security incidents. They are described as
follows.
The underlying premise is that security incidents can lead to five
types of losses, each associated with five specific threats and
corresponding vulnerabilities. The risk level assignment table of
factors is shown as follows.
Table II. Risk level assignment table
Step 3: Calculate the membership matrix of security incidents
and the membership matrix of the loss of security incidents
based on the generated cloud models [8].
The risk grades for asset factors, threat factors, and vulnerability
factors in the system are provided as follows:
Asset factors (A'): 4.5, 3.69, 2.6, 2.99, 3.8
Threat factors (T'): 4.3, 2.8, 2.5, 1.8, 1.7
Vulnerability factors (V'): 4.0, 2.3, 2.8, 3.0, 2.9
Next, the process involves calculating the expectations,
entropies, and hyper entropies of assets, threats, and
vulnerabilities for different risk levels based on historical data.
After this, two-dimensional cloud models of the possibilities of
security incidents and two-dimensional cloud models of losses of
security incidents are generated [9].
These mathematical techniques allow for a systematic and
objective assessment of information security risks, considering
various factors and enhancing the accuracy of risk evaluation.
The process of determining weights in the Information System
Security Risk Assessment Model using Entropy Weight Theory
can be summarized as follows:
Determining the Weights:
Table III. Expectation value
Measure the relative importance of security risk component Zi
using the entropy value ei, calculated with the formula: ei = 1/ln(r) ∑(zij*ln(zij)), where zij (j=1,2,...,r) represents the risk
components [9].
Normalize the entropy values to obtain the weight of each
security risk component Zij. The normalized weight φi is given
by: φi = 1/(q - E)(1 - ei), where E = ∑(ei), and q is the number
of risk components.
Establish the weights k1, k2, ..., kr for evaluating factors b1, b2,
..., br based on the risk classification, where ∑(ki) = 1.
Table IV. Entropy value
The Calculation of Value at Risk:
Using the membership matrix of risk component values, the
weights of risk component values (φ1, φ2, ..., φq), and the
weights of the risk level in the evaluation set (k1, k2, ..., kr),
compute the risk value R' with the formula: R' = (φ1, φ2, ..., φq)
∙ Z ∙ (k1, k2, ..., kr).
These steps allow for the quantification and assessment of risk
factors, providing valuable insights for decision-making in
Table V. Hyper entropy value
Two-dimensional cloud models of possibilities of security
incidents are shown as follows.
Figure 6.
The cloud model of security incidents
Figure 3.
The cloud model of security incidents
Figure 7.
The cloud model of security incidents
Figure 4.
The cloud model of security incidents
Figure 8.
The cloud model of security incidentally losses
Figure 5.
The cloud model of security incidents
Two-dimensional cloud models of losses of security incident are
shown as follows.
The clouds of possibilities of security incidents form very high
risk to very low risk are figure 3, figure 4, figure 5, figure
6, figure 7.
Figure 9.
The cloud model of security incident losses
Figure 12.
The cloud model of security incident losses
The clouds of losses of security incidents form very high risk to
very low risk is figure 8, figure 9, figure 10, figure 11, figure 12.
The given data involves several steps in risk assessment:
Step 1: A matrix P represents the risk grades of asset factors,
threat factors, and vulnerability factors in the system .
Step 2: Calculate the membership matrix L of possibilities of
security incidents and membership matrix L of losses of security
incidents [10].
Step 3: Calculate the membership matrix Z of risk components
using the multiplicative method.
Figure 10.
The cloud model of security incident losses
Step 4: The risk level of the system is determined to be middle
according to the risk grade table, and appropriate measures can
be taken to make the system safer.
Step 5: Calculate the weights φ of risk components and weights
K of risk grades.
Step 6: Calculating the value R' at risk.
Overall, the steps involve analyzing risk grades, possibilities of
security incidents, losses of security incidents, and risk
components to assess the risk level of the system and determine
appropriate risk control measures.
Figure 11.
The cloud model of security incident losses
On the other hand, the process of software and hardware
selection for each ISS subsystem involves implementing
information protection at 21 levels, prioritized based on the
attacker's potential violation order. Each level requires specific
security tools, and experts choose these tools based on their
functions and the enterprise's capabilities. The selection process
results in a ranked descending graph, where vertices represent
security tools, and arcs represent transitions between subsystems
with assigned weights indicating priority levels. The weights can
vary based on integration priority and service functions. The
paper has constructed a ranked top-down graph in which the
vertices are expert information security tools located at a specific
level (subsystem), which in turn are systematized in the attacker's
protection alleged violation order, and the vertices are connected
by arcs, the weight of each is determined by priority in the
transition to this vertex (Fig. 13).
tools based on expert evaluations of their preferences
and capabilities, ensuring an efficient and effective
security system.
3.
Compliance with Legislation: Referring to the FSTEC
order №31, the paper provides a basis for "isolating"
protection vectors and outlines 21 levels or subsystems
for information security protection. This ensures that the
constructed information security system aligns with
relevant Russian Federation legislation, enhancing legal
compliance.
Figure. 13.
Cons common to both papers:
The ranked descending graph level corresponding to the security
events registration subsystem
1. Complexity: Both papers propose sophisticated
methodologies that might be challenging to implement
X. PROS AND CONS
and require specialized expertise, potentially limiting
their practical adoption by organizations without the
Pros of "Information system security risk assessment based on
necessary resources or technical knowledge.
multidimensional cloud model and the entropy theory" paper:
2. Context-Specificity: The effectiveness and applicability
1. Comprehensive Risk Assessment: The paper introduces
of the proposed approaches in real-world scenarios may
a novel approach that uses the multidimensional cloud
vary depending on the specific information systems,
model and entropy theory to comprehensively analyze
industry sectors, or regulatory environments, limiting
various risk factors in information systems. This
their generalizability.
enables a more thorough and holistic assessment of
information security risks.
3. Practical Adoption: Convincing stakeholders and
2. Objective and Accurate Assessment: By integrating
organizations to adopt these novel approaches might be
qualitative and quantitative data through the cloud
challenging, as they may require significant changes in
model, the method reveals objective objects with
existing risk assessment or security practices, leading to
fuzziness and randomness, reducing the influence of
potential resistance or reluctance to embrace unfamiliar
traditional subjective factors. This enhances the
methodologies.
objectivity and accuracy of information security risk
assessment.
XI. MATHEMATICAL TERM
3. Improved Risk Control: Effectively evaluating
information system risks allows for a better
The mathematical terms used in these two papers are not
understanding of the security status and targeted
explicitly provided in the given summaries. However, based on
implementation of risk control measures. This helps in the context, we can identify some potential mathematical terms
keeping information security risks within acceptable
and concepts that might be discussed in the papers:
limits and ensuring the construction of secure, stable,
and upgradable information systems.
"Information system security risk assessment based on
multidimensional cloud model and the entropy theory":
Pros of "The information security system synthesis using the
graphs theory" paper:
1.
Tailored Protection Measures: The paper emphasizes
the need for protection measures covering all possible
areas vulnerable to attacks. By utilizing graph theory to
optimize the construction of an enterprise's information
security system (ISS), the approach allows for tailored
and customized protection strategies based on required
security levels and available resources.
•
•
•
•
2.
Optimal Tool Selection: The application of graph
theory to construct a ranked descending graph and
solve the optimization problem facilitates the
identification of critical paths. This enables the
selection of the most appropriate information security
Multidimensional Cloud Model: A mathematical model
that extends the one-dimensional cloud model to
represent multidimensional qualitative concepts and
uncertainty.
Entropy Theory: A concept from information theory
used to measure uncertainty and randomness in a
system.
Risk Assessment: The process of quantifying and
evaluating the potential risks to an information system
using mathematical methods.
Fuzziness and Randomness: Terms related to
uncertainty and vagueness in data, often represented
using fuzzy logic or probability theory.
"The information security system synthesis using the graphs
theory":
• Graph Theory: A mathematical theory that deals with
the study of graphs, which are structures consisting of
nodes (vertices) and edges (arcs) that represent
relationships between them [5].
• Optimization Problem: A mathematical problem that
involves finding the best solution (maximum or
minimum) among a set of possible solutions based on
specified criteria.
• Critical Paths: In the context of graph theory, critical
paths refer to the longest or shortest paths between
nodes in a graph, which are important for optimizing
the information security system construction.
XII. FUTURE WORKS
The future work, after merging these two papers, could involve
the following:
Integration of Risk Assessment Models: Explore the possibility
of integrating the multidimensional cloud model and entropy
theory from the first paper with the graph theory approach from
the second paper. This integration could lead to a more
comprehensive and robust risk assessment model that considers
both qualitative and quantitative factors while optimizing the
construction of an enterprise's information security system.
threats and vulnerabilities.
XIII. CONCLUSION
The papers propose two different approaches to address
information security challenges. The first approach focuses on
the labor-intensive and expert-driven synthesis of an enterprise's
information security system, aiming to minimize material waste
and financial losses in the face of potential threats. The second
approach introduces a model for information security risk
assessment, utilizing the multidimensional normal cloud model
and entropy weight theory to enhance the objectivity and
accuracy of risk assessment. Both methods aim to improve
information security measures and mitigate potential risks for
businesses.
15.1 Summary of Findings:
We have explored two essential aspects of information security:
risk assessment and system synthesis using innovative
methodologies. The first part of the paper focuses on information
system security risk assessment, where we introduced a novel
approach based on the multidimensional cloud model and
entropy theory. Through the integration of qualitative and
quantitative data, this approach enhances the objectivity and
accuracy of risk assessment, effectively addressing the
challenges posed by the information age. The findings reveal the
significance of understanding security status and implementing
targeted risk control measures to ensure the maintenance of
information system security.
Empirical Validation: Conduct empirical studies and real-world
case studies to validate the effectiveness of the merged risk
assessment model. Gather data from various organizations and
assess the accuracy and objectivity of the model in predicting
The second part of the paper delves into the information security
and mitigating information security risks.
system synthesis using graph theory. We emphasized the need
for effective business foundations, highlighting the timely
Automation and Machine Learning: Investigate the potential of prevention of security threats and prompt elimination of realized
automating the risk assessment process using machine learning threat consequences. The application of graph theory allows us to
algorithms. Develop automated tools that can efficiently analyze optimize the construction of an enterprise's information security
large datasets and identify potential security threats, thus
system based on required security levels and available resources.
reducing the manual effort required for risk assessment.
The findings showcase the power of constructing ranked
descending graphs and solving optimization problems to
Continuous Monitoring and Adaptation: Implement a system for facilitate the selection of the most appropriate information
continuous monitoring of the information security landscape
security tools based on expert evaluations of preferences and
and adapt the risk assessment model accordingly. Information
capabilities.
security threats are constantly evolving, and the model should
be dynamic enough to accommodate new risks and
15.2 Contributions and Practical Implications:
vulnerabilities.
The papers offer significant contributions to the field of
Standardization and Adoption: Work towards standardizing the information security. Firstly, the introduction of the
merged risk assessment model and promoting its adoption
multidimensional cloud model and entropy theory for risk
across different industries and organizations. This would
assessment provides a comprehensive and objective analysis of
facilitate a consistent and systematic approach to information
various risk factors in information systems. By considering both
security risk assessment.
qualitative and quantitative data, this approach enhances the
accuracy of risk assessment and reduces the influence of
Collaboration with Industry Experts: Collaborate with
subjective factors. This contributes to more informed decisioninformation security experts from different domains to gather
making in risk management, allowing organizations to
insights and feedback on the merged model. Engage in
implement targeted risk control measures effectively.
discussions and workshops to refine the model and make it more
practical and applicable in real-world scenarios.
Secondly, the application of graph theory in information security
system synthesis offers practical implications for businesses and
By pursuing these future works, the merged paper can
enterprises. By utilizing a ranked descending graph and
contribute significantly to the field of information security risk optimization techniques, organizations can construct robust and
assessment, providing a valuable tool for organizations to
tailored information security systems based on their specific
proactively safeguard their information systems from potential security needs and available resources. This ensures a cost-
effective and efficient allocation of security measures, reducing
the likelihood of security breaches and mitigating potential risks
effectively.
In practical terms, the findings from these papers can serve as
valuable guidelines for information security professionals and
decision-makers. Organizations can adopt the multidimensional
cloud model and entropy theory to assess their information
system security risks comprehensively and objectively.
Additionally, the use of graph theory can aid in the optimal
design and implementation of information security systems,
aligning security measures with business goals and regulatory
requirements.
Overall, these papers reinforce the importance of risk
assessment and system synthesis in information security,
providing innovative methodologies that can be applied to
enhance the resilience and protection of information systems in
the ever-evolving information age. By embracing these
approaches, organizations can proactively safeguard their
valuable assets and sensitive information, thus fostering a secure
and trustworthy digital environment.
XIV. REFERENCES
The threats basic model to the personal data security
when processing them in personal data information
systems (extract): officer.text, Moscow:FSTEC of
Russia, pp. 69, 2008.
[2] "Methodological recommendations for the regulatory
legal acts development that determine threats to the
personal data relevant security to the personal data
processing in personal data information systems
operated in the relevant activities conduct" in Center
Russia FSS management, Moscow, no. 149/7/2/6-432,
pp. 22, March 2015.
[1]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
Identifying threats methodology to information security
in information systems (Project), Moscow:Russia
FSTEC, pp. 43, 2015.
The Russia FSTEC order dated February 11, 2013. №
17 “On the requirements approval for the information
security that is not a state secret contained in
government information systems, 04 2017, [online]
Available: http://fstec.ru.
On approving the requirements for the personal data
protection when processing them in personal data
information systems, 04 2017, [online].
Wang Zhenxue, Zhou Anmin and Fang Yong,
"Information System Security Risk Estimation and
Control Theory[M]" in , Science Press, vol. 20, no. 11,
pp. 13-90.
Wang Guoying, Li Deyi, Yao Yiyu, Liang Jiye, Miao
Duoqian, Zhang Yanping, et al., "Cloud model and
granular computing[M]" in , Science Press, vol. 20, no.
12, pp. 2-22.
Gang Zhao and Huan Liu, "Practical risk assessment
based on multiple fuzzy comprehensive evaluations
and entropy weighting[J]", J Tsinghua Uni(Sci&Tech),
vol. 52, no. 10, pp. 1382-1387, 2012.
Yu Fu, Xiao-ping Wu, Qing Ye and Xi Peng, "An
Approach for Information System Security Risk
Assessment on Fuzzy Set and EntropyWeight[J]", ACTA ELECTRONICA SINICA, vol. 38,
no. 7, pp. 1490-1493, 2010.
[10] Guo-ying Zhang, Yun Sha, Xu-hong Liu and Yu-shu
Liu, "High Dimensional Cloud Model and Its
Applicationin in Multiple Attribute
Evaluation[J]", Transactions of Beijing Institute of
Technology, vol. 24, no. 12, pp. 1064-1069, 2004.
Hong-hui Niu and Ling-xia Liu, "Research on Risk
Assessment of Information Security Based on Improved
Neural Network", Computer Simulation[J], vol. 28, no.
6, pp. 117-118, 2011.
[12] Zhao-Hui Yang and De-Yi Li, "Planar Model and Its
Application in Prediction[J]", Chinese Journal
[13] Rong-xiao Guo, Jing-bo Xia, Shu-fu Dong and Men.
LONG, "Multiple Attribute Evaluation Method Based
on Mutidimensinal Cloud Model[J]", Computer
Science, vol. 37, no. 11, pp. 75-77, 2010.
[11]
Download