Using cluster analysis techniques to optimize the qualitative assessment of information security risk

The study is devoted to the accuracy of information security risk assessment. The paper substantiates the relevance of risk assessment, based on the consequences of their implementation for business and the probability of their occurrence. The method of qualitative assessment of information security...

Full description

Bibliographic Details
Main Authors: Vladimir L. Evseev, Anton S. Burakov, Vitaliy G. Ivanenko
Format: Article
Language:English
Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 2021-04-01
Series:Безопасность информационных технологий
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/1345
_version_ 1797724209694113792
author Vladimir L. Evseev
Anton S. Burakov
Vitaliy G. Ivanenko
author_facet Vladimir L. Evseev
Anton S. Burakov
Vitaliy G. Ivanenko
author_sort Vladimir L. Evseev
collection DOAJ
description The study is devoted to the accuracy of information security risk assessment. The paper substantiates the relevance of risk assessment, based on the consequences of their implementation for business and the probability of their occurrence. The method of qualitative assessment of information security risks (the method of expert assessment) is analysed on a specific example. The application of cluster analysis methods is justified. In detail, the examples show the use of cluster analysis methods: the nearest neighbor method; the remote neighbor method; the k-means method. The principal disadvantages of the first two methods are: the appearance of large clusters that do not have similarities; the lack of the ability of experts to set the desired number of clusters in advance. The application of the k-means method is justified - the ability of experts to set the desired number of clusters in advance by setting the initial centers. The results obtained with the usual qualitative assessment are compared with the results obtained by the methods of cluster analysis. The expediency of using cluster analysis methods to improve the accuracy of information security risk assessment is justified.
first_indexed 2024-03-12T10:13:09Z
format Article
id doaj.art-c7715f838faa4a3ca44044eadd4a2883
institution Directory Open Access Journal
issn 2074-7128
2074-7136
language English
last_indexed 2024-03-12T10:13:09Z
publishDate 2021-04-01
publisher Joint Stock Company "Experimental Scientific and Production Association SPELS
record_format Article
series Безопасность информационных технологий
spelling doaj.art-c7715f838faa4a3ca44044eadd4a28832023-09-02T10:43:20ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362021-04-01282708210.26583/bit.2021.2.071227Using cluster analysis techniques to optimize the qualitative assessment of information security riskVladimir L. Evseev0Anton S. Burakov1Vitaliy G. Ivanenko2Financial University under the Government of the Russian Federation (Financial University)Financial University under the Government of the Russian Federation (Financial University)National Research Nuclear University MEPhI (Moscow Engineering Physics Institute)The study is devoted to the accuracy of information security risk assessment. The paper substantiates the relevance of risk assessment, based on the consequences of their implementation for business and the probability of their occurrence. The method of qualitative assessment of information security risks (the method of expert assessment) is analysed on a specific example. The application of cluster analysis methods is justified. In detail, the examples show the use of cluster analysis methods: the nearest neighbor method; the remote neighbor method; the k-means method. The principal disadvantages of the first two methods are: the appearance of large clusters that do not have similarities; the lack of the ability of experts to set the desired number of clusters in advance. The application of the k-means method is justified - the ability of experts to set the desired number of clusters in advance by setting the initial centers. The results obtained with the usual qualitative assessment are compared with the results obtained by the methods of cluster analysis. The expediency of using cluster analysis methods to improve the accuracy of information security risk assessment is justified.https://bit.mephi.ru/index.php/bit/article/view/1345risk assessment, cluster analysis methods, nearest neighbor method, remote neighbor method, k-means method, degree of threat realization, degree of threat impact on the asset, euclidean distance, determining distance, average intra-cluster distance.
spellingShingle Vladimir L. Evseev
Anton S. Burakov
Vitaliy G. Ivanenko
Using cluster analysis techniques to optimize the qualitative assessment of information security risk
Безопасность информационных технологий
risk assessment, cluster analysis methods, nearest neighbor method, remote neighbor method, k-means method, degree of threat realization, degree of threat impact on the asset, euclidean distance, determining distance, average intra-cluster distance.
title Using cluster analysis techniques to optimize the qualitative assessment of information security risk
title_full Using cluster analysis techniques to optimize the qualitative assessment of information security risk
title_fullStr Using cluster analysis techniques to optimize the qualitative assessment of information security risk
title_full_unstemmed Using cluster analysis techniques to optimize the qualitative assessment of information security risk
title_short Using cluster analysis techniques to optimize the qualitative assessment of information security risk
title_sort using cluster analysis techniques to optimize the qualitative assessment of information security risk
topic risk assessment, cluster analysis methods, nearest neighbor method, remote neighbor method, k-means method, degree of threat realization, degree of threat impact on the asset, euclidean distance, determining distance, average intra-cluster distance.
url https://bit.mephi.ru/index.php/bit/article/view/1345
work_keys_str_mv AT vladimirlevseev usingclusteranalysistechniquestooptimizethequalitativeassessmentofinformationsecurityrisk
AT antonsburakov usingclusteranalysistechniquestooptimizethequalitativeassessmentofinformationsecurityrisk
AT vitaliygivanenko usingclusteranalysistechniquestooptimizethequalitativeassessmentofinformationsecurityrisk