Optimizing Cloud Computing Networks in Information Security Controls using COPRAS Method

Author:

Abstract

The emergence of cloud computing networks has led to a sharp rise in the frequency of cyberattacks. As a result, networks' appropriate security has become an issue for organisations. Organisations' information security advisors must make difficult and complex choices when evaluating and choosing information security measures that allow for the protection of their assets and resources. Controls for information security must be chosen depending on the proper level of security. However, choosing them requires a thorough examination into the organization's vulnerabilities, risks, and threats as well as taking into account the organization's budgetary and implementation limits. By suggesting a formalised method, the Complex Proportional Assessment (COPRAS) Method, this research aimed to enhance the information security control analysis process. This method was used to rank and choose the most pertinent collection of information security controls to meet an organization's information security needs. In order to determine which information security measures are most suited for an organisation, we contend that the prioritisation of those controls using the (COPRAS) Method results in an effective and economical assessment and evaluation of those controls. In order to implement security and privacy successfully, an organisation with a network connected with the cloud needs to evaluate and prioritise the information security measures. The organisation intends to exert as much effort as possible to analyse ISCs, which are crucial for risk management, in this situation with few resources. For organisations, choosing the right information security policies is a serious and crucial issue. This section's goal is to select the top ISCs from a list of available options. The organisation wants to include all necessary factors that might be used in the selection of security controls. Implementation time (C1), effectiveness (C2), risk (C3), budgetary restrictions (C4), exploitation time (C5), maintenance cost (C6), and mitigation time (C7) are the seven key factors used by the decision makers' team to select and evaluate ISCs. By using the COPRAS METHOD, the Information Security Control 2 received the top ranking and the Information Security Control 5 received the bottom ranking. Implementation time (C1), Effectiveness (C2), Risk (C3), Budgetary Constraints (C4), Exploitation time (C5), Maintenance cost (C6), and Mitigation time (C7) are the evaluation factors.

Publisher

REST Publisher

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3