Skip to main content

2024 | OriginalPaper | Buchkapitel

Neuro-fuzzy Vulnerability Evaluation According to Excellence Criteria

verfasst von : Bence Tureczki, Katalin Szenes

Erschienen in: Critical Infrastructure Protection in the Light of the Armed Conflicts

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A method is presented for the evaluation of the effects of the vulnerabilities on corporate assets. An AI assistant performs this evaluation using the knowledge bases of state- and professional authorities (e.g.: the national banks, the European Banking Association—EBA). This AI assistant gives advice on the vulnerabilities reported by the users relying on ISACA, ISO, and NIST standards. Fuzzy metrics evaluate the individual vulnerabilities. The countermeasures are classified according to the targeted operational excellence criteria using the three pillars of corporate operations.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Szenes K (2013) Operational security—security based corporate governance. In: Proceedings of IEEE 9th International conference on computational cybernetics (ICCC), 8–10 July 2013, Tihany, Hungary, pp 375–378. IEEE Catalog Number: FP13575-USB (pendrive), CFP13575-PRT (printed). ISBN: 978-1-4799-0061-9 (pendrive), 978-1-4799-0060-2 (printed) Copyright @2013 by IEEE Szenes K (2013) Operational security—security based corporate governance. In: Proceedings of IEEE 9th International conference on computational cybernetics (ICCC), 8–10 July 2013, Tihany, Hungary, pp 375–378. IEEE Catalog Number: FP13575-USB (pendrive), CFP13575-PRT (printed). ISBN: 978-1-4799-0061-9 (pendrive), 978-1-4799-0060-2 (printed) Copyright @2013 by IEEE
3.
Zurück zum Zitat Faiz S, Rashid T, Sałabun W, Zafar S, Wątróbski J (2018) Decision making with uncertainty using hesitant fuzzy sets. Int J Fuzzy Syst 20:93–103MathSciNetCrossRef Faiz S, Rashid T, Sałabun W, Zafar S, Wątróbski J (2018) Decision making with uncertainty using hesitant fuzzy sets. Int J Fuzzy Syst 20:93–103MathSciNetCrossRef
4.
Zurück zum Zitat Torra V, Narukawa Y (2009) On hesitant fuzzy sets and decision. In: Proceedings of the 18th IEEE international conference on fuzzy systems, Jeju Island, Korea, pp 1378–1382 Torra V, Narukawa Y (2009) On hesitant fuzzy sets and decision. In: Proceedings of the 18th IEEE international conference on fuzzy systems, Jeju Island, Korea, pp 1378–1382
5.
Zurück zum Zitat Schuster G., Ady L (2018) Safety critical software development. Biztonságkritikus szoftver fejlesztés. REPÜLÉSTUDOMÁNYI KÖZLEMÉNYEK 30(1):151–160 Schuster G., Ady L (2018) Safety critical software development. Biztonságkritikus szoftver fejlesztés. REPÜLÉSTUDOMÁNYI KÖZLEMÉNYEK 30(1):151–160
6.
Zurück zum Zitat Váczi D, Laufer E, Szádeczky T (2021) Human risk factors to measure the potential of digital information leakage. Biztonságtudományi Szemle, pp 55–65 Váczi D, Laufer E, Szádeczky T (2021) Human risk factors to measure the potential of digital information leakage. Biztonságtudományi Szemle, pp 55–65
7.
Zurück zum Zitat Gózon FZ, Váczi D, Laufer E (2021) Fuzzy-based human factor centered cybersecurity risk assessment. In: Szakál A (ed) IEEE 19th International symposium on intelligent systems and informatics (SISY 2021): Proceedings Subotica, Szerbia, pp 83–88 Gózon FZ, Váczi D, Laufer E (2021) Fuzzy-based human factor centered cybersecurity risk assessment. In: Szakál A (ed) IEEE 19th International symposium on intelligent systems and informatics (SISY 2021): Proceedings Subotica, Szerbia, pp 83–88
9.
Zurück zum Zitat Tóth-Laufer E, Takács M, Rudas I (2015) Fuzzy logic-based risk assessment framework to evaluate physiological parameters. Acta Polytechnica Hungarica 12(2):159–178 Tóth-Laufer E, Takács M, Rudas I (2015) Fuzzy logic-based risk assessment framework to evaluate physiological parameters. Acta Polytechnica Hungarica 12(2):159–178
10.
Zurück zum Zitat Zadeh LA (1975) The concept of a linguistic variable and its application to approximate reasoning—II. Inf Sci 8(4):301–357MathSciNetCrossRef Zadeh LA (1975) The concept of a linguistic variable and its application to approximate reasoning—II. Inf Sci 8(4):301–357MathSciNetCrossRef
15.
Zurück zum Zitat Szenes K, Tureczki B (2019) Blockchain basics, applications. In: Blockchain & deep learning workshop, MTA SZTAKI, pp 1–40 Szenes K, Tureczki B (2019) Blockchain basics, applications. In: Blockchain & deep learning workshop, MTA SZTAKI, pp 1–40
16.
Zurück zum Zitat ISACA (Information Systems Audit and Control Association (2018) COBIT 2019 framework: governance and management objectives. Copyright © IT Governance Institute, 2018. Editor: ISACA, 1700 E. Golf Road, Suite 400, Schaumburg IL 60173 USA ISACA (Information Systems Audit and Control Association (2018) COBIT 2019 framework: governance and management objectives. Copyright © IT Governance Institute, 2018. Editor: ISACA, 1700 E. Golf Road, Suite 400, Schaumburg IL 60173 USA
17.
Zurück zum Zitat ISACA (Information Systems Audit and Control Association) (2019) CISA review manual, 27th edn. Copyright © 2019 ISACA, 1700 E. Golf Road, Suite 400, Schaumburg IL 30173 USA. ISBN: 978-1-60420-767-5 ISACA (Information Systems Audit and Control Association) (2019) CISA review manual, 27th edn. Copyright © 2019 ISACA, 1700 E. Golf Road, Suite 400, Schaumburg IL 30173 USA. ISBN: 978-1-60420-767-5
18.
Zurück zum Zitat Tureczki B, Szenes K (2021) Interdisciplinary optimization of security operations centers with digital assistant. In: Proceedings of 15th IEEE International symposium on applied computational intelligence and informatics (SACI 2021), Budapest, Hungary, Obuda University, IEEE, pp 397–402 Tureczki B, Szenes K (2021) Interdisciplinary optimization of security operations centers with digital assistant. In: Proceedings of 15th IEEE International symposium on applied computational intelligence and informatics (SACI 2021), Budapest, Hungary, Obuda University, IEEE, pp 397–402
19.
Zurück zum Zitat ISACA (Information Systems Audit and Control Association) (2020) CGEIT Review Manual, 8th edn. Copyright © 2020 ISACA, 1700 E. Golf Road, Suite 400, Schaumburg IL 30173 USA. ISBN: 9781604208252 ISACA (Information Systems Audit and Control Association) (2020) CGEIT Review Manual, 8th edn. Copyright © 2020 ISACA, 1700 E. Golf Road, Suite 400, Schaumburg IL 30173 USA. ISBN: 9781604208252
20.
Zurück zum Zitat ISACA (Information Systems Audit and Control Association) (2022) CISM Review Manual, 16th edn. Copyright © 2022 ISACA, 1700 E. Golf Road, Suite 400, Schaumburg IL 30173 USA. ISBN: 9781604209013 ISACA (Information Systems Audit and Control Association) (2022) CISM Review Manual, 16th edn. Copyright © 2022 ISACA, 1700 E. Golf Road, Suite 400, Schaumburg IL 30173 USA. ISBN: 9781604209013
21.
Zurück zum Zitat Szenes K (1987) PCUBE—an AI system for planning process systems. In: Proceedings of the 5th symposium on microcomputer and microprocessor applications, Budapest, Hungary, 29 Sept–1 Oct 1987, pp 551–562 Szenes K (1987) PCUBE—an AI system for planning process systems. In: Proceedings of the 5th symposium on microcomputer and microprocessor applications, Budapest, Hungary, 29 Sept–1 Oct 1987, pp 551–562
23.
Zurück zum Zitat Szenes K (2011) Serving strategy by corporate governance—case study: outsourcing of operational activities. In: Soliman KS (ed) Proceedings of 17th International Business Information Management Association (IBIMA), Milan, Italy, 14–15 Nov 2011, pp 2387–2398. ISBN: 978-0-9821489-6-9. https://doi.org/10.5171/2011.903755 Szenes K (2011) Serving strategy by corporate governance—case study: outsourcing of operational activities. In: Soliman KS (ed) Proceedings of 17th International Business Information Management Association (IBIMA), Milan, Italy, 14–15 Nov 2011, pp 2387–2398. ISBN: 978-0-9821489-6-9. https://​doi.​org/​10.​5171/​2011.​903755
24.
Zurück zum Zitat Szenes K (2006) On the intelligent and secure scheduling of web services in service oriented architectures—SOAs. In: Proceedings of the 7th International symposium of Hungarian researchers on computational intelligence, Budapest, Hungary, 24–25 Nov 2006, pp 473–478 Szenes K (2006) On the intelligent and secure scheduling of web services in service oriented architectures—SOAs. In: Proceedings of the 7th International symposium of Hungarian researchers on computational intelligence, Budapest, Hungary, 24–25 Nov 2006, pp 473–478
25.
Zurück zum Zitat Szenes K, Tureczki B (2021) Supporting corporate governance on a blockchain basis. Cyber Secur Rev 2:1–6 Szenes K, Tureczki B (2021) Supporting corporate governance on a blockchain basis. Cyber Secur Rev 2:1–6
26.
Zurück zum Zitat Szenes K, Tureczki B (2021) AI supported corporate governance. In: Proceedings of IEEE 19th World symposium on applied machine intelligence and informatics (SAMI), Budapest, Hungary, IEEE Hungary Section, 507, pp 000465–000470 Szenes K, Tureczki B (2021) AI supported corporate governance. In: Proceedings of IEEE 19th World symposium on applied machine intelligence and informatics (SAMI), Budapest, Hungary, IEEE Hungary Section, 507, pp 000465–000470
27.
Zurück zum Zitat de Aguiar PE, Amaral RPF, Vellasco MMBR, Ribeiro MV (2018) An enhanced singleton Type-2 Fuzzy logic system for fault classification in a railroad switch machine. Electr Power Syst Res 158:195–206CrossRef de Aguiar PE, Amaral RPF, Vellasco MMBR, Ribeiro MV (2018) An enhanced singleton Type-2 Fuzzy logic system for fault classification in a railroad switch machine. Electr Power Syst Res 158:195–206CrossRef
28.
Zurück zum Zitat Kumar S, Jamal M (2016) A simple method for solving type-2 and type-4 fuzzy transportation problems. Int J Fuzzy Logic Intell Syst 16(4):225–237CrossRef Kumar S, Jamal M (2016) A simple method for solving type-2 and type-4 fuzzy transportation problems. Int J Fuzzy Logic Intell Syst 16(4):225–237CrossRef
29.
Zurück zum Zitat Maity S, Kumar Roy S (2019) A new approach for solving type-2-fuzzy transportation problem. Int J Math Eng Manage Sci 4(3):683–696 Maity S, Kumar Roy S (2019) A new approach for solving type-2-fuzzy transportation problem. Int J Math Eng Manage Sci 4(3):683–696
30.
Zurück zum Zitat Blagojević A, Vesković S, Kasalica S, Gojić A, Allamani A (2020) The application of the fuzzy AHP and DEA for measuring the efficiency of freight transport railway undertakings. Oper Res Eng Sci Theory Appl 3(2):1–23CrossRef Blagojević A, Vesković S, Kasalica S, Gojić A, Allamani A (2020) The application of the fuzzy AHP and DEA for measuring the efficiency of freight transport railway undertakings. Oper Res Eng Sci Theory Appl 3(2):1–23CrossRef
31.
Zurück zum Zitat Kundu P, Kar S, Maiti M (2015) Multi-item solid transportation problem with type-2 fuzzy parameters. Appl Soft Comput 31:61–80CrossRef Kundu P, Kar S, Maiti M (2015) Multi-item solid transportation problem with type-2 fuzzy parameters. Appl Soft Comput 31:61–80CrossRef
32.
Zurück zum Zitat Deveci M, Canitezb F, Gokasarc I (2018) WASPAS and TOPSIS based interval Type-2 Fuzzy MCDM method for a selection of a car sharing station. Sustain Cities Soc 41:777–791CrossRef Deveci M, Canitezb F, Gokasarc I (2018) WASPAS and TOPSIS based interval Type-2 Fuzzy MCDM method for a selection of a car sharing station. Sustain Cities Soc 41:777–791CrossRef
33.
Zurück zum Zitat Deveci M, Ozcanb E, Johnb R, Oners Sultan C (2018) Interval type-2 hesitant fuzzy set method for improving the service quality of domestic airlines in Turkey. J Air Transp Manag 69:83–98CrossRef Deveci M, Ozcanb E, Johnb R, Oners Sultan C (2018) Interval type-2 hesitant fuzzy set method for improving the service quality of domestic airlines in Turkey. J Air Transp Manag 69:83–98CrossRef
34.
Zurück zum Zitat Soner O, Celik E, Akyuz E (2017) Application of AHP and VIKOR methods under interval type 2 fuzzy environment in maritime transportation. Ocean Eng 129:107–116CrossRef Soner O, Celik E, Akyuz E (2017) Application of AHP and VIKOR methods under interval type 2 fuzzy environment in maritime transportation. Ocean Eng 129:107–116CrossRef
Metadaten
Titel
Neuro-fuzzy Vulnerability Evaluation According to Excellence Criteria
verfasst von
Bence Tureczki
Katalin Szenes
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-47990-8_40

Neuer Inhalt