Using cluster analysis techniques to optimize the qualitative assessment of information security risk
The study is devoted to the accuracy of information security risk assessment. The paper substantiates the relevance of risk assessment, based on the consequences of their implementation for business and the probability of their occurrence. The method of qualitative assessment of information security...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2021-04-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/1345 |
_version_ | 1797724209694113792 |
---|---|
author | Vladimir L. Evseev Anton S. Burakov Vitaliy G. Ivanenko |
author_facet | Vladimir L. Evseev Anton S. Burakov Vitaliy G. Ivanenko |
author_sort | Vladimir L. Evseev |
collection | DOAJ |
description | The study is devoted to the accuracy of information security risk assessment. The paper substantiates the relevance of risk assessment, based on the consequences of their implementation for business and the probability of their occurrence. The method of qualitative assessment of information security risks (the method of expert assessment) is analysed on a specific example. The application of cluster analysis methods is justified. In detail, the examples show the use of cluster analysis methods: the nearest neighbor method; the remote neighbor method; the k-means method. The principal disadvantages of the first two methods are: the appearance of large clusters that do not have similarities; the lack of the ability of experts to set the desired number of clusters in advance. The application of the k-means method is justified - the ability of experts to set the desired number of clusters in advance by setting the initial centers. The results obtained with the usual qualitative assessment are compared with the results obtained by the methods of cluster analysis. The expediency of using cluster analysis methods to improve the accuracy of information security risk assessment is justified. |
first_indexed | 2024-03-12T10:13:09Z |
format | Article |
id | doaj.art-c7715f838faa4a3ca44044eadd4a2883 |
institution | Directory Open Access Journal |
issn | 2074-7128 2074-7136 |
language | English |
last_indexed | 2024-03-12T10:13:09Z |
publishDate | 2021-04-01 |
publisher | Joint Stock Company "Experimental Scientific and Production Association SPELS |
record_format | Article |
series | Безопасность информационных технологий |
spelling | doaj.art-c7715f838faa4a3ca44044eadd4a28832023-09-02T10:43:20ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362021-04-01282708210.26583/bit.2021.2.071227Using cluster analysis techniques to optimize the qualitative assessment of information security riskVladimir L. Evseev0Anton S. Burakov1Vitaliy G. Ivanenko2Financial University under the Government of the Russian Federation (Financial University)Financial University under the Government of the Russian Federation (Financial University)National Research Nuclear University MEPhI (Moscow Engineering Physics Institute)The study is devoted to the accuracy of information security risk assessment. The paper substantiates the relevance of risk assessment, based on the consequences of their implementation for business and the probability of their occurrence. The method of qualitative assessment of information security risks (the method of expert assessment) is analysed on a specific example. The application of cluster analysis methods is justified. In detail, the examples show the use of cluster analysis methods: the nearest neighbor method; the remote neighbor method; the k-means method. The principal disadvantages of the first two methods are: the appearance of large clusters that do not have similarities; the lack of the ability of experts to set the desired number of clusters in advance. The application of the k-means method is justified - the ability of experts to set the desired number of clusters in advance by setting the initial centers. The results obtained with the usual qualitative assessment are compared with the results obtained by the methods of cluster analysis. The expediency of using cluster analysis methods to improve the accuracy of information security risk assessment is justified.https://bit.mephi.ru/index.php/bit/article/view/1345risk assessment, cluster analysis methods, nearest neighbor method, remote neighbor method, k-means method, degree of threat realization, degree of threat impact on the asset, euclidean distance, determining distance, average intra-cluster distance. |
spellingShingle | Vladimir L. Evseev Anton S. Burakov Vitaliy G. Ivanenko Using cluster analysis techniques to optimize the qualitative assessment of information security risk Безопасность информационных технологий risk assessment, cluster analysis methods, nearest neighbor method, remote neighbor method, k-means method, degree of threat realization, degree of threat impact on the asset, euclidean distance, determining distance, average intra-cluster distance. |
title | Using cluster analysis techniques to optimize the qualitative assessment of information security risk |
title_full | Using cluster analysis techniques to optimize the qualitative assessment of information security risk |
title_fullStr | Using cluster analysis techniques to optimize the qualitative assessment of information security risk |
title_full_unstemmed | Using cluster analysis techniques to optimize the qualitative assessment of information security risk |
title_short | Using cluster analysis techniques to optimize the qualitative assessment of information security risk |
title_sort | using cluster analysis techniques to optimize the qualitative assessment of information security risk |
topic | risk assessment, cluster analysis methods, nearest neighbor method, remote neighbor method, k-means method, degree of threat realization, degree of threat impact on the asset, euclidean distance, determining distance, average intra-cluster distance. |
url | https://bit.mephi.ru/index.php/bit/article/view/1345 |
work_keys_str_mv | AT vladimirlevseev usingclusteranalysistechniquestooptimizethequalitativeassessmentofinformationsecurityrisk AT antonsburakov usingclusteranalysistechniquestooptimizethequalitativeassessmentofinformationsecurityrisk AT vitaliygivanenko usingclusteranalysistechniquestooptimizethequalitativeassessmentofinformationsecurityrisk |