{"title":"Information security risks assessment in telecommunication network of the university","authors":"I. Anikin","doi":"10.1109/DYNAMICS.2016.7818967","DOIUrl":null,"url":null,"abstract":"We use the method based on expert judgments and analytic hierarchy process for information security risks assessment in a typical telecommunication network of the university. We evaluate impacts and possibility values for specific threats at the telecommunication network. We also identify some security vulnerabilities and evaluate them. We use such methods and tools as fuzzy logic, questionnaires, analytic hierarchy process, fuzzy prediction rules for risk factors evaluation.","PeriodicalId":293543,"journal":{"name":"2016 Dynamics of Systems, Mechanisms and Machines (Dynamics)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Dynamics of Systems, Mechanisms and Machines (Dynamics)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DYNAMICS.2016.7818967","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
We use the method based on expert judgments and analytic hierarchy process for information security risks assessment in a typical telecommunication network of the university. We evaluate impacts and possibility values for specific threats at the telecommunication network. We also identify some security vulnerabilities and evaluate them. We use such methods and tools as fuzzy logic, questionnaires, analytic hierarchy process, fuzzy prediction rules for risk factors evaluation.