Author:
Asfha Amanuel,Vaish Abhishek
Abstract
Information security risk assessment is a crucial component of industrial management techniques that aids in identifying, quantifying, and evaluating risks in comparison to criteria for risk acceptance and organizationally pertinent objectives. Due to its capacity to combine several parameters to determine an overall risk, the traditional fuzzy-rule-based risk assessment technique has been used in numerous industries. The technique has a drawback because it is used in situations where there are several parameters that need to be evaluated, and each parameter is expressed by a different set of linguistic phrases. In this paper, fuzzy set theory and an artificial neural network (ANN) risk prediction model that can solve the issue at hand are provided. Also developed is an algorithm that may change the risk-related factors and the overall risk level from a fuzzy property to a crisp-valued attribute is developed. The system was trained by using twelve samples representing 70%, 15%, and 15% of the dataset for training, testing, and validation, respectively. In addition, a stepwise regression model has also been designed, and its results are compared with the results of ANN. In terms of overall efficiency, the ANN model (R2= 0.99981, RMSE=0.00288, and MSE=0.00001,) performed better, though both models are satisfactory enough. It is concluded that a risk-predicting ANN model can produce accurate results as long as the training data accounts for all conceivable conditions.
Reference23 articles.
1. Verhoef P.C., Broekhuizen T., Bart Y., Bhattacharya A., Dong J.Q., Fabian N., Haenlein M. Digital transformation: A multidisciplinary reflection and research agenda. Journal of business research. 2021. vol. 122. pp. 889–901. DOI: 10.1016/j.jbusres.2019.09.022.
2. Mazhar T., Irfan H.M., Khan S., Haq I., Ullah I., Iqbal M., Hamam H. Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods. Future Internet. 2023. vol. 15(2). no. 83. DOI: 10.3390/fi15020083.
3. Alhassan M.M., Adjei-Quaye A. Information Security in an Organization. International Journal of Computer. 2017. Т. 24. № 1. С. 100–116. [Online]. URL: https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/820.
4. Shaikh F.A., Siponen M. Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity. Comput. Secur. 2023. vol. 124. no. 102974. DOI: 10.1016/j.cose.2022.102974.
5. Cruz S.T. Information security risk assessment. Information Security Management Handbook. 2007. pp. 243–250. DOI: 10.3390/encyclopedia1030050.