Hierarchical Fuzzy-based Cybersecurity Risk Assessment Model
Copyright (c) 2022 Gózon Fanni Zsuzsanna, Váczi Dániel, Laufer Edit
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Abstract
With the rise of IT systems, cyberattacks are becoming more sophisticated, allowing for more intense and complex attacks. According to the source of the threats, we can distinguish between attacks based on hardware, software, physical and human factors. In this study the human factor is in the focus, because humans are the weakest link; however, other factors affecting company security are also taken into account. The authors propose a risk assessment model that can predict the level of cybersecurity risk in a company. In this hierarchical model, fuzzy-based subsystems are applied, as in the field of cybersecurity, the uncertainties and subjectivity that often arise in the data and evaluation process, must also be addressed.
Keywords:
How to Cite
References
Hadnagy, Christopher: Social Engineering: The Art of Human Hacking. Hoboken, Wiley, 2011.
Jakus Attila – Tick Andrea: IT biztonsági kockázatok és kockázatkezelés. Hadmérnök, 12. (2017), 1. 182–202. Online: http://hadmernok.hu/171_15_jakus.pdf
Pokorádi László: Fuzzy Techniques in the Aircraft Engineering. In Zobory I. (szerk.): Proceedings of the 7th Mini Conference on Vehicle System Dynamics, Identification and Anomalies. Budapest, BME Vasúti Járművek Tanszék, 2001. 443–448.
Salahdine, Fatima – Naima Kaabouch: Social Engineering Attacks: A Survey. Future Internet, 11. (2019), 89. 1–17. Online: https://doi.org/10.3390/fi11040089
Steingartner, William – Darko Galinec: Cyber Threats and Cyber Deception in Hybrid Warfare. Acta Polytechnica Hungarica, 18. (2021), 3. 25–45. Online: https://doi.org/10.12700/APH.18.3.2021.3.2
Szádeczky Tamás: Governmental Regulation of Cybersecurity in the EU and Hungary after 2000. AARMS, 19. (2020), 1. 83–93. Online: https://doi.org/10.32565/aarms.2020.1.7
Vacca, John R.: Computer and Information Security Handbook. Burlington, Morgan Kaufmann, 2009.