Skip to main content
Top

2024 | OriginalPaper | Chapter

Neuro-fuzzy Vulnerability Evaluation According to Excellence Criteria

Authors : Bence Tureczki, Katalin Szenes

Published in: Critical Infrastructure Protection in the Light of the Armed Conflicts

Publisher: Springer Nature Switzerland

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A method is presented for the evaluation of the effects of the vulnerabilities on corporate assets. An AI assistant performs this evaluation using the knowledge bases of state- and professional authorities (e.g.: the national banks, the European Banking Association—EBA). This AI assistant gives advice on the vulnerabilities reported by the users relying on ISACA, ISO, and NIST standards. Fuzzy metrics evaluate the individual vulnerabilities. The countermeasures are classified according to the targeted operational excellence criteria using the three pillars of corporate operations.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Szenes K (2013) Operational security—security based corporate governance. In: Proceedings of IEEE 9th International conference on computational cybernetics (ICCC), 8–10 July 2013, Tihany, Hungary, pp 375–378. IEEE Catalog Number: FP13575-USB (pendrive), CFP13575-PRT (printed). ISBN: 978-1-4799-0061-9 (pendrive), 978-1-4799-0060-2 (printed) Copyright @2013 by IEEE Szenes K (2013) Operational security—security based corporate governance. In: Proceedings of IEEE 9th International conference on computational cybernetics (ICCC), 8–10 July 2013, Tihany, Hungary, pp 375–378. IEEE Catalog Number: FP13575-USB (pendrive), CFP13575-PRT (printed). ISBN: 978-1-4799-0061-9 (pendrive), 978-1-4799-0060-2 (printed) Copyright @2013 by IEEE
3.
go back to reference Faiz S, Rashid T, Sałabun W, Zafar S, Wątróbski J (2018) Decision making with uncertainty using hesitant fuzzy sets. Int J Fuzzy Syst 20:93–103MathSciNetCrossRef Faiz S, Rashid T, Sałabun W, Zafar S, Wątróbski J (2018) Decision making with uncertainty using hesitant fuzzy sets. Int J Fuzzy Syst 20:93–103MathSciNetCrossRef
4.
go back to reference Torra V, Narukawa Y (2009) On hesitant fuzzy sets and decision. In: Proceedings of the 18th IEEE international conference on fuzzy systems, Jeju Island, Korea, pp 1378–1382 Torra V, Narukawa Y (2009) On hesitant fuzzy sets and decision. In: Proceedings of the 18th IEEE international conference on fuzzy systems, Jeju Island, Korea, pp 1378–1382
5.
go back to reference Schuster G., Ady L (2018) Safety critical software development. Biztonságkritikus szoftver fejlesztés. REPÜLÉSTUDOMÁNYI KÖZLEMÉNYEK 30(1):151–160 Schuster G., Ady L (2018) Safety critical software development. Biztonságkritikus szoftver fejlesztés. REPÜLÉSTUDOMÁNYI KÖZLEMÉNYEK 30(1):151–160
6.
go back to reference Váczi D, Laufer E, Szádeczky T (2021) Human risk factors to measure the potential of digital information leakage. Biztonságtudományi Szemle, pp 55–65 Váczi D, Laufer E, Szádeczky T (2021) Human risk factors to measure the potential of digital information leakage. Biztonságtudományi Szemle, pp 55–65
7.
go back to reference Gózon FZ, Váczi D, Laufer E (2021) Fuzzy-based human factor centered cybersecurity risk assessment. In: Szakál A (ed) IEEE 19th International symposium on intelligent systems and informatics (SISY 2021): Proceedings Subotica, Szerbia, pp 83–88 Gózon FZ, Váczi D, Laufer E (2021) Fuzzy-based human factor centered cybersecurity risk assessment. In: Szakál A (ed) IEEE 19th International symposium on intelligent systems and informatics (SISY 2021): Proceedings Subotica, Szerbia, pp 83–88
9.
go back to reference Tóth-Laufer E, Takács M, Rudas I (2015) Fuzzy logic-based risk assessment framework to evaluate physiological parameters. Acta Polytechnica Hungarica 12(2):159–178 Tóth-Laufer E, Takács M, Rudas I (2015) Fuzzy logic-based risk assessment framework to evaluate physiological parameters. Acta Polytechnica Hungarica 12(2):159–178
10.
go back to reference Zadeh LA (1975) The concept of a linguistic variable and its application to approximate reasoning—II. Inf Sci 8(4):301–357MathSciNetCrossRef Zadeh LA (1975) The concept of a linguistic variable and its application to approximate reasoning—II. Inf Sci 8(4):301–357MathSciNetCrossRef
15.
go back to reference Szenes K, Tureczki B (2019) Blockchain basics, applications. In: Blockchain & deep learning workshop, MTA SZTAKI, pp 1–40 Szenes K, Tureczki B (2019) Blockchain basics, applications. In: Blockchain & deep learning workshop, MTA SZTAKI, pp 1–40
16.
go back to reference ISACA (Information Systems Audit and Control Association (2018) COBIT 2019 framework: governance and management objectives. Copyright © IT Governance Institute, 2018. Editor: ISACA, 1700 E. Golf Road, Suite 400, Schaumburg IL 60173 USA ISACA (Information Systems Audit and Control Association (2018) COBIT 2019 framework: governance and management objectives. Copyright © IT Governance Institute, 2018. Editor: ISACA, 1700 E. Golf Road, Suite 400, Schaumburg IL 60173 USA
17.
go back to reference ISACA (Information Systems Audit and Control Association) (2019) CISA review manual, 27th edn. Copyright © 2019 ISACA, 1700 E. Golf Road, Suite 400, Schaumburg IL 30173 USA. ISBN: 978-1-60420-767-5 ISACA (Information Systems Audit and Control Association) (2019) CISA review manual, 27th edn. Copyright © 2019 ISACA, 1700 E. Golf Road, Suite 400, Schaumburg IL 30173 USA. ISBN: 978-1-60420-767-5
18.
go back to reference Tureczki B, Szenes K (2021) Interdisciplinary optimization of security operations centers with digital assistant. In: Proceedings of 15th IEEE International symposium on applied computational intelligence and informatics (SACI 2021), Budapest, Hungary, Obuda University, IEEE, pp 397–402 Tureczki B, Szenes K (2021) Interdisciplinary optimization of security operations centers with digital assistant. In: Proceedings of 15th IEEE International symposium on applied computational intelligence and informatics (SACI 2021), Budapest, Hungary, Obuda University, IEEE, pp 397–402
19.
go back to reference ISACA (Information Systems Audit and Control Association) (2020) CGEIT Review Manual, 8th edn. Copyright © 2020 ISACA, 1700 E. Golf Road, Suite 400, Schaumburg IL 30173 USA. ISBN: 9781604208252 ISACA (Information Systems Audit and Control Association) (2020) CGEIT Review Manual, 8th edn. Copyright © 2020 ISACA, 1700 E. Golf Road, Suite 400, Schaumburg IL 30173 USA. ISBN: 9781604208252
20.
go back to reference ISACA (Information Systems Audit and Control Association) (2022) CISM Review Manual, 16th edn. Copyright © 2022 ISACA, 1700 E. Golf Road, Suite 400, Schaumburg IL 30173 USA. ISBN: 9781604209013 ISACA (Information Systems Audit and Control Association) (2022) CISM Review Manual, 16th edn. Copyright © 2022 ISACA, 1700 E. Golf Road, Suite 400, Schaumburg IL 30173 USA. ISBN: 9781604209013
21.
go back to reference Szenes K (1987) PCUBE—an AI system for planning process systems. In: Proceedings of the 5th symposium on microcomputer and microprocessor applications, Budapest, Hungary, 29 Sept–1 Oct 1987, pp 551–562 Szenes K (1987) PCUBE—an AI system for planning process systems. In: Proceedings of the 5th symposium on microcomputer and microprocessor applications, Budapest, Hungary, 29 Sept–1 Oct 1987, pp 551–562
23.
go back to reference Szenes K (2011) Serving strategy by corporate governance—case study: outsourcing of operational activities. In: Soliman KS (ed) Proceedings of 17th International Business Information Management Association (IBIMA), Milan, Italy, 14–15 Nov 2011, pp 2387–2398. ISBN: 978-0-9821489-6-9. https://doi.org/10.5171/2011.903755 Szenes K (2011) Serving strategy by corporate governance—case study: outsourcing of operational activities. In: Soliman KS (ed) Proceedings of 17th International Business Information Management Association (IBIMA), Milan, Italy, 14–15 Nov 2011, pp 2387–2398. ISBN: 978-0-9821489-6-9. https://​doi.​org/​10.​5171/​2011.​903755
24.
go back to reference Szenes K (2006) On the intelligent and secure scheduling of web services in service oriented architectures—SOAs. In: Proceedings of the 7th International symposium of Hungarian researchers on computational intelligence, Budapest, Hungary, 24–25 Nov 2006, pp 473–478 Szenes K (2006) On the intelligent and secure scheduling of web services in service oriented architectures—SOAs. In: Proceedings of the 7th International symposium of Hungarian researchers on computational intelligence, Budapest, Hungary, 24–25 Nov 2006, pp 473–478
25.
go back to reference Szenes K, Tureczki B (2021) Supporting corporate governance on a blockchain basis. Cyber Secur Rev 2:1–6 Szenes K, Tureczki B (2021) Supporting corporate governance on a blockchain basis. Cyber Secur Rev 2:1–6
26.
go back to reference Szenes K, Tureczki B (2021) AI supported corporate governance. In: Proceedings of IEEE 19th World symposium on applied machine intelligence and informatics (SAMI), Budapest, Hungary, IEEE Hungary Section, 507, pp 000465–000470 Szenes K, Tureczki B (2021) AI supported corporate governance. In: Proceedings of IEEE 19th World symposium on applied machine intelligence and informatics (SAMI), Budapest, Hungary, IEEE Hungary Section, 507, pp 000465–000470
27.
go back to reference de Aguiar PE, Amaral RPF, Vellasco MMBR, Ribeiro MV (2018) An enhanced singleton Type-2 Fuzzy logic system for fault classification in a railroad switch machine. Electr Power Syst Res 158:195–206CrossRef de Aguiar PE, Amaral RPF, Vellasco MMBR, Ribeiro MV (2018) An enhanced singleton Type-2 Fuzzy logic system for fault classification in a railroad switch machine. Electr Power Syst Res 158:195–206CrossRef
28.
go back to reference Kumar S, Jamal M (2016) A simple method for solving type-2 and type-4 fuzzy transportation problems. Int J Fuzzy Logic Intell Syst 16(4):225–237CrossRef Kumar S, Jamal M (2016) A simple method for solving type-2 and type-4 fuzzy transportation problems. Int J Fuzzy Logic Intell Syst 16(4):225–237CrossRef
29.
go back to reference Maity S, Kumar Roy S (2019) A new approach for solving type-2-fuzzy transportation problem. Int J Math Eng Manage Sci 4(3):683–696 Maity S, Kumar Roy S (2019) A new approach for solving type-2-fuzzy transportation problem. Int J Math Eng Manage Sci 4(3):683–696
30.
go back to reference Blagojević A, Vesković S, Kasalica S, Gojić A, Allamani A (2020) The application of the fuzzy AHP and DEA for measuring the efficiency of freight transport railway undertakings. Oper Res Eng Sci Theory Appl 3(2):1–23CrossRef Blagojević A, Vesković S, Kasalica S, Gojić A, Allamani A (2020) The application of the fuzzy AHP and DEA for measuring the efficiency of freight transport railway undertakings. Oper Res Eng Sci Theory Appl 3(2):1–23CrossRef
31.
go back to reference Kundu P, Kar S, Maiti M (2015) Multi-item solid transportation problem with type-2 fuzzy parameters. Appl Soft Comput 31:61–80CrossRef Kundu P, Kar S, Maiti M (2015) Multi-item solid transportation problem with type-2 fuzzy parameters. Appl Soft Comput 31:61–80CrossRef
32.
go back to reference Deveci M, Canitezb F, Gokasarc I (2018) WASPAS and TOPSIS based interval Type-2 Fuzzy MCDM method for a selection of a car sharing station. Sustain Cities Soc 41:777–791CrossRef Deveci M, Canitezb F, Gokasarc I (2018) WASPAS and TOPSIS based interval Type-2 Fuzzy MCDM method for a selection of a car sharing station. Sustain Cities Soc 41:777–791CrossRef
33.
go back to reference Deveci M, Ozcanb E, Johnb R, Oners Sultan C (2018) Interval type-2 hesitant fuzzy set method for improving the service quality of domestic airlines in Turkey. J Air Transp Manag 69:83–98CrossRef Deveci M, Ozcanb E, Johnb R, Oners Sultan C (2018) Interval type-2 hesitant fuzzy set method for improving the service quality of domestic airlines in Turkey. J Air Transp Manag 69:83–98CrossRef
34.
go back to reference Soner O, Celik E, Akyuz E (2017) Application of AHP and VIKOR methods under interval type 2 fuzzy environment in maritime transportation. Ocean Eng 129:107–116CrossRef Soner O, Celik E, Akyuz E (2017) Application of AHP and VIKOR methods under interval type 2 fuzzy environment in maritime transportation. Ocean Eng 129:107–116CrossRef
Metadata
Title
Neuro-fuzzy Vulnerability Evaluation According to Excellence Criteria
Authors
Bence Tureczki
Katalin Szenes
Copyright Year
2024
DOI
https://doi.org/10.1007/978-3-031-47990-8_40