INFORMATION CHANGE THE WORLD

International Journal of Intelligent Systems and Applications(IJISA)

ISSN: 2074-904X (Print), ISSN: 2074-9058 (Online)

Published By: MECS Press

IJISA Vol.6, No.7, Jun. 2014

A New Hybrid Method for Risk Management in Expert Systems

Full Text (PDF, 486KB), PP.60-65


Views:164   Downloads:1

Author(s)

Fereshteh Mohammadi, Mohammad bazmara, Hatef Pouryekta

Index Terms

Risk Assessment, Expert Systems, Certainty Factor, Fuzzy Logic

Abstract

Information security management is a part of information management, whose main task is to determine information goals and remove obstacles on the way of achieving such goals with providing necessary strategies. Information management is responsible to implement and control the performance of the organization`s security system while tries to keep it up to date. The purpose of information security management in an organization is maintaining different sorts of resources as software, hardware, information, communication and human resources.
The organization needs an integrated program against threats such as unauthorized access to information, environmental risks and dangers caused by users. In the present paper, the IT risk in an organization was assessed through an intelligent system benefiting from fuzzy analysis and certainty factors. As most of ambiguity samples have a level of belie, so doubt and the degree of membership were calculated as a part of output in the system and a better result achieved compared to previous methods.

Cite This Paper

Fereshteh Mohammadi, Mohammad bazmara, Hatef Pouryekta,"A New Hybrid Method for Risk Management in Expert Systems", International Journal of Intelligent Systems and Applications(IJISA), vol.6, no.7, pp.60-65, 2014. DOI: 10.5815/ijisa.2014.07.08

Reference

[1]Darby, J., (2006), “Evaluating Risk from Acts of Terrorism with Belief and Fuzzy Sets”, Carnahan Conferences Security Technology, Proceedings 2006 40th Annual IEEE International Oct. 2006 Page(s): 273 – 280.

[2]Anderson, K. "Intelligence-Based Threat Assessments for Information Networks and Infrastructures: A White Paper", 2005.

[3]ISO/IEC. Risk Management-Vocabulary-Guidelines for Use in Standards. ISO/IEC Guide 73, 2002.

[4]Dudeck, J., Dan, Q., (1992), “Some Problems Related with probabilistic interpretations for certainty factor”, Computer based Medical Systems, 1992 Proceedings, 5th Annual IEEE symposium on AI, Pages (538 -545).

[5]Heckerman, David E. , Shortliffe, Edward H. “From Certainty Factors to Belief Networks” To appear in Artificial Intelligence in Medicine, 1992.

[6]Andrew L.S. Gordon, Ivan Belik, Shahram Rahimi (2010), “A Hybrid Expert System for IT Security Risk Assessment”, International conference on parallel and distributed processing techniques and applications (PDPTA’10), Las Vegas,

[7]Ruspini, E.H., P.P. Bonissone, and W. Pedrycz, Handbook of fuzzy computation. 1998: Institute of Physics Pub.

[8]Grint, K., Fuzzy management: Contemporary ideas and practices at work. 1997: Oxford University Press Oxford.

[9]Zadeh, L.A., Fuzzy sets. Information and control, 1965. 8(3): p. 338-353.

[10]M. Bazmara, S. Jafari, and F. Pasand, “A Fuzzy expert system for goalkeeper quality recognition,” International Journal of Computer Science Issues, 9(5), 2012, pp. 318.

[11]F. Mohammadi, and M. Bazmara, “A New Approach of Fuzzy Theory with Uncertainties in Geographic Information Systems”, Journal of Mechatronics, Electrical and Computer Technology, 3(6): pp. 1001-1014, 2013.

[12]Azadi, H., et al., Sustainable rangeland management using fuzzy logic: A case study in Southwest Iran. Agriculture, Ecosystems & Environment, 2009. 131(3): p. 193-200.

[13]F Mohammadi, M. Bazmara, A New Survey of types of Uncertainties in Nonlinear System with Fuzzy Theory. International Journal of Mechatronics, Electrical and Computer Technology, 2013. 3(7): p. 1036-1047.