A Model for the Evaluation of Critical IT Systems Using Multicriteria Decision-Making with Elements for Risk Assessment
<p>Research process and scientific methods.</p> "> Figure 2
<p>Experts’ attitudes on the ISRA criteria.</p> "> Figure 3
<p>Matrix for estimating influences and dependencies between ISRA criteria.</p> "> Figure 4
<p>High-level components used in development of a new multicriteria model.</p> "> Figure 5
<p>Multicriteria model with ISRA elements for the evaluation of critical IT systems.</p> "> Figure 6
<p>Matrix for estimating influences and dependencies between inherent critera for transaction systems.</p> "> Figure 7
<p>Evaluation steps.</p> "> Figure A1
<p>Research questionnaire for the first Delphi round. Five risk assessment attributes were presented for evaluation (closed questions), while one open question was included for IT security experts to consider any additional elements that could be part of the new hybrid multicriteria model.</p> "> Figure A2
<p>Set of the individual questions for IT security experts necessary to obtain the level of competence of respondents in the domain of information security.</p> "> Figure A3
<p>Research questionnaire for the second Delphi round, which presented statistics from the first Delphi round and also included an exploitability (E) element for rating as a potential additional criterion for the new multicriteria model.</p> ">
Abstract
:1. Introduction
2. Related Works
- (1)
- RQ1: How to enable more efficient decision-making on the security posture and selection of an adequate critical information system for a financial institution?
- (2)
- RQ2: Which elements for security risk analysis and assessment are appropriate and relevant to the development of a hybrid multicriteria model for the evaluation and selection of critical IT systems in order to more efficiently make informed decisions about the observed critical IT system in a financial institution?
- (3)
- RQ3: For which critical IT systems is the designed mathematical multicriteria model applicable and valid?
3. Problem Observation
- (1)
- c1: Criteria weights: Yes—obtained by SNAP11 method
- (2)
- c1.1: Type of criteria weight: Relative
- (3)
- c2: Type of scale for evaluating alternatives: Relative
- (4)
- c3: Uncertainty in the decision-making problem: No
- (5)
- c4: Type of decision-making problem: Ranking and choice
- (6)
- c4.1: Ranking type: Complete.
4. Research Goals, Hypotheses, and Methodology
4.1. Research Goals and Hypotheses
- (1)
- SG1: To conduct a detailed and systematic review of the research area in order to determine which methods and techniques for risk assessment and multicriteria decision-making are currently used for the evaluation, ranking, and selection of information systems.
- (2)
- SG2: To develop a multicriteria hybrid model with relevant elements for risk assessment as generic criteria for the purpose of evaluation, ranking, and selection of critical information systems using multicriteria decision-making methods.
- (3)
- SG3: To validate a new multicriteria hybrid mathematical model.
- (1)
- M1: The deviation in the ranking of critical IT solutions for the results obtained by the new hybrid model with generic risk criteria in comparison to the ranking results using the inherent attributes of the observed information systems from the case study during the validation process.
- (2)
- M2: The difference in the number of full-time equivalents (FTEs) required for the evaluation of critical information systems according to the new proposed hybrid multicriteria model with generic risk criteria in comparison to the evaluation of such IT systems with inherent criteria.
4.2. Research Methodology
5. A Hybrid Mathematical Multicriteria Model
5.1. Identification of Risk Assessment Elements
5.2. Determining the Weights of Generic Risk Assessment Criteria
- The first input element is a matrix Z of weight relations of influence (aggregation of collected opinions of IT security experts and calculation of the average matrix Z—the first step in the DEMATEL method;
- Calculation of the average sums of each column and identifying the column with the largest average sum;
- Calculation of the normalized matrix S of the weight relations of the influence in such a way that each element from the matrix Z is divided by the value of the identified maximum sum of the column increased by 1;
- Defining a matrix E—a matrix of size n that has all values equal and is ;
- Calculation of the matrix G according to the formula G = (0.85⋅S) + (0.15⋅E).Various studies have tested different damping factors, but in general, according to the authors of the Google PageRank algorithm [60], this factor is around 0.85;
- Calculation of the matrix I − G (I represents the identity/unit matrix);
- Inverse matrix calculation ;
- Multiplication of the matrix G by the inverse matrix ;
- Calculating the values of , and their difference r (i.e., ) for the matrix from the previous step, where—outgoing centrality, i.e., the sum of the rows in the final matrix—incoming centrality, i.e., the sum of the columns in the final matrix;
- Adding the constant c to the difference r, where
- Calculating the average of the weights obtained from the previous step with the weights of the criteria in relation to the decision goal.
5.3. Selection of MCDM Method for Evaluation of Alternatives
5.4. Demonstration of the New Hybrid Multicriteria Model
6. Model Validation—Case Study
- Defining the inherent criteria of critical online banking transaction systemsAs a basis for defining the inherent (common) criteria for critical banking transaction systems, the research from [64] was used where security objectives and security mechanisms were analyzed and defined. A security mechanism is defined as an established process by which certain security objectives are achieved. Thus, the inherent criteria for the case study of critical banking transaction systems were defined as follows: authentication, authorization, encryption, digital signing, availability, logging, and backup. IT security experts were in agreement on these criteria.
- Defining the weights of the inherent criteria of banking transaction systemsThe research was performed in the same way as for the generic ISRA criteria in 2 subphases:Phase 1: Security experts provided their ratings on the DEMATEL scale for the impacts (dependencies) between the common criteria for transaction systems.Figure 6 shows the matrix (7 × 7) that was sent to IT security professionals for completion. It was the same as that in the case with ISRA criteria weights; after collecting the answers, aggregation of received values was performed and all other necessary computations were conducted according to the steps of the SNAP method [44]. The results of this step were the weights of the inherent criteria for online transaction systems corresponding to those obtained with the SNAPv12 method, which are shown in Table 5.However, because the SNAPv12 method does not take into account comparisons of criteria in relation to the decision goal, which is important due to the definition of the research problem, phase 2 was needed to calculate the final weights of common criteria of online banking transaction systems using the targeted SNAPv11 method.Phase 2: Security experts provided their ratios on the importance of defined inherent criteria for online transaction systems in relation to the goal of decision-making using the AHP. The identified inherent criteria for critical banking transaction systems were divided into a total of 3 clusters. The cluters were segmented according to the logical principle that is most suitable for defined transaction systems and research issues identified by a consensus of information security experts. The following clusters with their elements were defined: identity (authentication and authorization), C-I-A (encryption, digital signing, and availability) and forensics (logging and backup). Pairwise comparisons were made between the inherent criteria within each cluster and also between the three clusters defined by IT security experts that work in the financial sector.Table 6 shows the inherent criteria weights obtained by input judgments from IT experts and the necessary calculations with the AHP. It is the same intermediate step that was performed when calculating the ISRA criteria weights. Again, in order to obtain the final inherent criteria weights, it was necessary to calculate arithmetic mean of the values obtained with the SNAPv12 method and the AHP intermediate step, as presented in Table 5 and Table 6.The final weights of the inherent criteria for banking online transaction systems obtained by the SNAP11 method were as follows:It can be seen from Table 7 that there are no large discrepancies between the weights of the inherent criteria for transaction systems, and that this is in fact a normal distribution with the encryption criterion having the highest weight.Additionally, as in the case with generic ISRA criteria, calculations of reference rankings for inherent criteria were performed using and WS coefficients.Table 8 shows coefficients and WS for inherent criteria for online banking transaction systems. Again, the WS coefficient seemed to be much more consistent and precise for measurements of the similarity of rankings for inherent criteria.
- Evaluation of critical online transaction systems using inherent criteriaInformation security experts evaluated online banking transaction systems using the inherent criteria within the AHP method, and in doing so asked a general question: which transaction system is of better quality (and how much on the Saaty scale) in regards to the observed inherent criterion? For each transaction system, the implemented security controls in relation to the observed criterion should have been taken into account when making judgments. For example, when evaluating critical transaction systems according to the authentication criterion, information security experts should have taken into account the authentication factors implemented on each transaction system itself as well as the means for their implementation, e.g., username and password, biometrics, two-factor authentication, etc. Security experts also evaluated transaction systems according to all other defined inherent criteria. Finally, all judgments were aggregated (using a geometric mean) for each observed inherent criterion, and the eigenvectors of those inherent criteria were calculated for each transaction system, as listed in Table 9.
- Evaluation of critical online transaction systems using generic ISRA criteriaInformation security experts evaluated banking transaction systems using the generic ISRA criteria within the AHP method, and in doing so asked a general question: which transaction system has a higher risk exposure compared to the observed risk criterion? For each observed ISRA criterion, the factors that may additionally affect the risk (according to the OWASP risk rating methodology [65]) of the banking transaction system in relation to the observed criterion also should have been taken into account. In other words, when evaluating critical transaction systems in relation to the threat criterion, it was necessary to consider which system is more exposed to different cyber security threats, e.g., malicious software, eavesdropping, hijacking, impersonating, unauthorized access, identity theft, DDoS attacks, more frequent ransom denial of service (RDoS) extortion attacks, etc. Security experts also evaluated transaction systems according to all other defined generic ISRA criteria. Finally, all judgments were aggregated (using geometric mean) for each observed ISRA criterion, and the eigenvectors of the ISRA criteria were calculated for each transaction system, as listed in Table 10.
- Comparisons of the results obtained by inherent and generic criteriaIn order to confirm the H1 hypothesis in the validation process, it was necessary to perform a ranking and comparison of the results obtained by applying the hybrid multicriteria model in both cases, with the inherent and generic ISRA criteria, for banking transaction systems. Thus, when evaluating transaction systems according to the inherent and generic ISRA criteria, the following results were obtained, i.e., the ranking of alternatives (the result of the multiplication of eigenvectors and SNAP11 criteria weights, as shown in Table 11):Table 11 shows that mobile banking had the highest weight, which would mean that, according to information security experts, it is the online banking transaction system that has the best security mechanisms and controls in place compared to other observed systems. This was followed by e-banking and finally e-commerce with the lowest weight.Table 12 shows that the e-commerce transaction system had the highest weight, followed by e-banking and finally m-banking with the lowest weight. However, it is important to note that when evaluating critical transaction systems according to ISRA criteria, it was necessary to apply the reverse logic for evaluation of the same systems using inherent criteria where it was determined which transaction system had implemented better security mechanisms or control. On the other hand, when evaluating transaction systems according to generic ISRA criteria, we assessed which system was actually more risky compared to the observed generic ISRA criterion. Thus, the results for evaluation according to ISRA criteria were interpreted in a way that reflected which transaction system was more risky (in the same way that judgments/ratios were given). Therefore, the ranking of alternatives (i.e., transaction systems) according to generic ISRA criteria was interpreted in such a way that the transaction system with the lowest weight was considered the least risky at the time of evaluation and thus actually took first place in the ranking. When such reverse logic is applied to the results obtained from evaluations of transaction systems using generic ISRA criteria, m-banking was the least risky system followed by e-banking while the most risky system was considered to be e-commerce. Therefore, the rank obtained by assessing transaction systems using inherent criteria corresponded to the rank obtained by evaluating the same systems using generic criteria for risk analysis and assessment. It follows that theH1 hypothesis was confirmed in a case study for critical online banking transaction systems.
7. Discussion
- Today’s modern mobile banking applications are native versions, which means they are tailored to specific operating systems (i.e., iOS and Android) where rigorous tests must be performed before they can be released and made available for download through online app stores (especially Apple Store).
- Because m-banking apps are native, that means they are usually not prone to the most common web attacks, such as cross-site scripting (XSS) or SQL injections, because no common web components are included in them, unlike classic internet banking and especially e-commerce applications. Moreover, m-banking apps most often use strong (two-factor) authentication, where one authentication factor is the mobile device itself and the other one is a PIN or biometric element (fingerprint or face recognition). On the other hand, some e-commerce sites still even do not require strong authentication or additional elements for transaction authorization.
- Despite the enormous popularity of mobile apps, the main cyber-attacks today are still web related because attacking a web application requires less effort and knowledge in comparison to attacking a mobile app. However, that trend is certain to change in the future. Hence, the recommendation will be to definitely repeat the evaluation of online banking transaction systems within the next 2 years, possibly with a larger number of IT security experts involved.
8. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Appendix A
Appendix B
Aggregation (Z Matrix) | (T) | (V) | (P) | (C) | (R) |
---|---|---|---|---|---|
Threat (T) | 0 | 2.4348 | 2.4783 | 2.6522 | 1.6522 |
Vulnerability (V) | 3.0000 | 0 | 3.0435 | 2.6087 | 2.3478 |
Probability (P) | 2.3043 | 1.6957 | 0 | 1.7391 | 1.5652 |
Consequence (C) | 2.0435 | 1.6957 | 1.6522 | 0 | 2.3913 |
Resiliency (R) | 1.9565 | 1.9565 | 1.6522 | 2.9565 | 0 |
Calculation of column sums and identification of max column sum | 9.3043 | 7.7826 | 8.8261 | 9.9565 | 7.9565 |
Max column sum increased by 1, i.e.,: 1/(9.9565 + 1) | 0.0913 |
S Matrix | (T) | (V) | (P) | (C) | (R) |
---|---|---|---|---|---|
Threat (T) | 0 | 0.2222 | 0.2262 | 0.2421 | 0.1508 |
Vulnerability (V) | 0.2738 | 0 | 0.2778 | 0.2381 | 0.2143 |
Probability (P) | 0.2103 | 0.1548 | 0 | 0.1587 | 0.1429 |
Consequence (C) | 0.1865 | 0.1548 | 0.1508 | 0 | 0.2183 |
Resiliency (R) | 0.1786 | 0.1786 | 0.1508 | 0.2698 | 0 |
E matrix (n = 5) | (T) | (V) | (P) | (C) | (R) |
Threat (T) | 0.2 | 0.2 | 0.2 | 0.2 | 0.2 |
Vulnerability (V) | 0.2 | 0.2 | 0.2 | 0.2 | 0.2 |
Probability (P) | 0.2 | 0.2 | 0.2 | 0.2 | 0.2 |
Consequence (C) | 0.2 | 0.2 | 0.2 | 0.2 | 0.2 |
Resiliency (R) | 0.2 | 0.2 | 0.2 | 0.2 | 0.2 |
G matrix | (T) | (V) | (P) | (C) | (R) |
Threat (T) | 0.03 | 0.2189 | 0.2223 | 0.2358 | 0.1582 |
Vulnerability (V) | 0.2627 | 0.03 | 0.2661 | 0.2324 | 0.2121 |
Probability (P) | 0.2088 | 0.1615 | 0.03 | 0.1649 | 0.1514 |
Consequence (C) | 0.1885 | 0.1615 | 0.1582 | 0.03 | 0.2155 |
Resiliency (R) | 0.1818 | 0.1818 | 0.1582 | 0.2594 | 0.03 |
I − G | (T) | (V) | (P) | (C) | (R) |
Threat (T) | 1 | −0.2189 | −0.2223 | −0.2358 | −0.1582 |
Vulnerability (V) | −0.2627 | 1 | −0.2661 | −0.2324 | −0.2121 |
Probability (P) | −0.2088 | −0.1615 | 1 | −0.1649 | −0.1514 |
Consequence (C) | −0.1885 | −0.1615 | −0.1582 | 1 | −0.2155 |
Resiliency (R) | −0.1818 | −0.1818 | −0.1582 | −0.2594 | 1 |
Inverse (I − G) | (T) | (V) | (P) | (C) | (R) |
Threat (T) | 1.7076 | 0.8042 | 0.8631 | 0.9321 | 0.7723 |
Vulnerability (V) | 1.0106 | 1.7086 | 0.9833 | 1.0291 | 0.8930 |
Probability (P) | 0.7732 | 0.6708 | 1.5785 | 0.7723 | 0.6701 |
Consequence (C) | 0.7842 | 0.6938 | 0.7387 | 1.6601 | 0.7409 |
Resiliency (R) | 0.8198 | 0.7429 | 0.7769 | 0.9092 | 1.6009 |
G * Inverse (I − G) | (T) | (V) | (P) | (C) | (R) |
---|---|---|---|---|---|
Threat (T) | 0.7588 | 0.8283 | 0.8890 | 0.9601 | 0.7955 |
Vulnerability (V) | 1.0409 | 0.7599 | 1.0128 | 1.0600 | 0.9198 |
Probability (P) | 0.7964 | 0.6910 | 0.6259 | 0.7955 | 0.6902 |
Consequence (C) | 0.8077 | 0.7147 | 0.7609 | 0.7099 | 0.7631 |
Resiliency (R) | 0.8444 | 0.7651 | 0.8002 | 0.9365 | 0.6489 |
Sum of columns | 4.2483 | 3.7590 | 4.0888 | 4.4619 | 3.8175 |
r | c | r − c | N1 | SNAP12 | AHP | SNAP11 | |
---|---|---|---|---|---|---|---|
Threat (T) | 4.2317 | 4.2483 | −0.0166 | 1.7235 | 0.1981 | 0.1058 | 0.151960196 |
Vulnerability (V) | 4.7934 | 3.7590 | 1.0344 | 2.7744 | 0.3189 | 0.1868 | 0.252842812 |
Probability (P) | 3.5989 | 4.0888 | −0.4899 | 1.2502 | 0.1437 | 0.0572 | 0.100434911 |
Consequence (C) | 3.7562 | 4.4619 | −0.7057 | 1.0344 | 0.1189 | 0.1964 | 0.157652935 |
Resiliency (R) | 3.9952 | 3.8175 | 0.1778 | 1.9179 | 0.2204 | 0.4538 | 0.337109146 |
References
- Wheeler, E. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up; Elsevier Inc.: Waltham, MA, USA, 2011. [Google Scholar]
- Von Roessing, R. The ISACA Business Model for Information Security: An Integrative and Innovative Approach. In ISSE 2009 Securing Electronic Business Processes; Vieweg+Teubner: Wiesbaden, Germany, 2010; pp. 37–47. [Google Scholar]
- Mohyeddin, M.A.; Gharaee, H. FAHP-TOPSIS Risks Ranking Models in ISMS. In Proceedings of the 7th International Symposium on Telecommunications (IST), Tehran, Iran, 9–11 September 2014; pp. 879–881. [Google Scholar]
- Raghavan, A.R.; Parthiban, L. The effect of cybercrime on a Bank’s finances. Int. J. Curr. Res. Acad. Rev. 2014, 2, 173–178. [Google Scholar]
- Biancotti, C. Cyber Attacks: Preliminary Evidence from the Bank of Italy’s Business Surveys. Bank Italy Occas. Pap. 2017, 373. [Google Scholar] [CrossRef] [Green Version]
- Bouveret, A. Cyber Risk for the Financial Sector: A Framework for Quantitative Assessment. IMF Work. Pap. Int. Monet. Fund. 2018, 18. [Google Scholar]
- Aidan, J.S.; Verma, H.K.; Awasthi, L.K. Comprehensive Survey on Petya Ransomware Attack. In Proceedings of the International Conference on Next Generation Computing and Information Sciences (ICNGCIS), Jammu, India, 11–12 December 2017; pp. 122–125. [Google Scholar]
- Hsiao, S.-C.; Kao, D.-Y. The Static Analysis of WannaCry Ransomware. In Proceedings of the 20th International Conference on Advanced Communication Technology (ICACT), Chuncheon, Korea, 11–14 February 2018; pp. 153–158. [Google Scholar]
- Verizon Enterprise. Data Breach Investigations Report, Public Sector Excerpt. 2020. Available online: https://enterprise.verizon.com/resources/reports/2020-data-breach-investigations-report.pdf (accessed on 5 April 2021).
- Lagarde, C. Estimating Cyber Risk for the Financial Sector. IMFBlog, Insights & Analysis on Economics & Finance. 2018. Available online: https://blogs.imf.org/2018/06/22/estimating-cyber-risk-for-the-financial-sector/ (accessed on 5 April 2021).
- Interpol. INTERPOL Report Shows Alarming Rate of Cyberattacks during COVID-19. Available online: https://www.interpol.int/News-and-Events/News/2020/INTERPOL-report-shows-alarming-rate-of-cyberattacks-during-COVID-19 (accessed on 5 April 2021).
- Hakak, S.; Khan, W.Z.; Imran, M.; Choo, K.-K.R.; Shoaib, M. Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies. IEEE Access 2020, 8, 124134–124144. [Google Scholar] [CrossRef]
- NIST. SP 800-30: Guide for Conducting Risk Assessments, Joint Task Force Transformation Initiative, Revision 1. 2012. Available online: https://csrc.nist.gov/publications/detail/sp/800-30/rev-1/final (accessed on 5 April 2021).
- NIST. SP 800-37: Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy, Joint Task Force, Revision 2. 2018. Available online: https://csrc.nist.gov/publications/detail/sp/800-37/rev-2/final (accessed on 5 April 2021).
- Mbowe, J.E.; Zlotnikova, I.; Msanjila, S.S.; Oreku, G.S. A Conceptual Framework for Threat Assessment Based on Organization’s Information Security Policy. J. Inf. Secur. 2014, 5, 166–177. [Google Scholar] [CrossRef] [Green Version]
- Maček, D.; Magdalenić, I.; Begičević Ređep, N. Towards a Hybrid Model for the Evaluation of Critical IT Systems. In Proceedings of the 31st Central European Conference on Information and Intelligent Systems (CECIIS), Varaždin, Croatia, 7–9 October 2020; Faculty of Organization and Informatics Varaždin, University of Zagreb: Varaždin, Croatia, 2020; pp. 249–255. [Google Scholar]
- Kitchenham, B. Guidelines for performing Systematic Literature Reviews in Software Engineering. In EBSE Technical Report; Software Engineering Group, School of Computer Science and Mathematics, Keele University: Keele, UK; Department of Computer Science, University of Durham: Durham, UK, 2007. [Google Scholar]
- Maček, D.; Magdalenić, I.; Begičević Ređep, N. A Systematic Literature Review on the Application of Multicriteria Decision Making Methods for Information Security Risk Assessment. Int. J. Saf. Secur. Eng. 2020, 10, 161–174. [Google Scholar]
- Shameli-Sendi, A.; Aghababaei-Barzegar, R.; Cheriet, M. Taxonomy of information security risk assessment (ISRA). Comput. Secur. 2016, 57, 14–30. [Google Scholar] [CrossRef]
- Pan, L.; Tomlinson, A. A systematic review of information security risk assessment. Int. J. Saf. Secur. Eng. 2016, 6, 270–281. [Google Scholar] [CrossRef] [Green Version]
- Wangen, G.; Hallstensen, C.; Snekkenes, E. A framework for estimating information security risk assessment method completeness. Int. J. Inf. Secur. 2018, 17, 681–699. [Google Scholar] [CrossRef] [Green Version]
- Alcántara, M.; Melgar, A. Risk management in information security: A systematic review. J. Adv. Inf. Technol. 2016, 7, 1–7. [Google Scholar] [CrossRef]
- Saaty, T.L. Decision making with the analytic hierarchy process. Int. J. Serv. Sci. 2008, 1, 83–98. [Google Scholar] [CrossRef] [Green Version]
- Sumrit, D.; Anuntavoranich, P. Using DEMATEL method to analyze the causal relations on technological innovation capability evaluation factors in Thai technology-based firms. Int. Trans. J. Eng. Manag. Appl. Sci. Technol. 2013, 4, 81–103. [Google Scholar]
- Saaty, T.L. Decision Making with Dependence and Feedback: The Analytic Network Process: The Organization and Prioritization of Complexity; RWS Publications: New York, NY, USA, 2001. [Google Scholar]
- Saaty, T.L. Decision Making–The Analytic Hierarchy and Network Processes (AHP/ANP). J. Syst. Sci. Syst. Eng. 2004, 13, 1–35. [Google Scholar] [CrossRef]
- Lo, C.-C.; Chen, W.-J. A hybrid information security risk assessment procedure considering interdependences between controls. Expert Syst. Appl. 2012, 39, 247–257. [Google Scholar] [CrossRef]
- Yang, Y.-P.; Shieh, H.-M.; Tzeng, G.-H. A VIKOR technique based on DEMATEL and ANP for information security risk control assessment. Inf. Sci. 2013, 232, 482–500. [Google Scholar] [CrossRef]
- Wu, T.; Zhao, G. A novel risk assessment model for privacy security in internet of things. Wuhan Univ. J. Nat. Sci. 2014, 19, 398–404. [Google Scholar] [CrossRef]
- Zhang, K.; Shao, L. Research on the quantitative methods of classified information system security risk assessment. In Proceedings of the International Conference on Logistics, Informatics and Service Science (LISS), Berkeley, CA, USA, 25–28 July 2014; Springer: Berlin/Heidelberg, Germany, 2015; pp. 571–575. [Google Scholar]
- Tianshui, W.; Gang, Z. A new security and privacy risk assessment model for information system considering influence relation of risk elements. In Proceedings of the International Conference on Broadband and Wireless Computing, Communication and Applications (BECCA), Guangdong, China, 8–10 November 2014; pp. 233–238. [Google Scholar]
- Hiete, M.; Merz, M.; Comes, T.; Schultmann, F. Trapezoidal fuzzy DEMATEL method to analyze and correct for relations between variables in a composite indicator for disaster resilience. OR Spectrum 2012, 34, 971–995. [Google Scholar] [CrossRef]
- Kim, K.-Y.; Na, K.-S. Business information system recovery priority decision using TOPSIS on interval data. J. Syst. Inf. Technol. 2014, 16, 103–112. [Google Scholar] [CrossRef]
- Tsai, H.-Y.; Huang, Y.-L. An Analytic Hierarchy Process-Based Risk Assessment Method for Wireless Networks. IEEE Trans. Reliab. 2012, 60, 801–816. [Google Scholar] [CrossRef]
- Huang, Y.-L.; Sun, W.-L. An AHP-based risk assessment for an industrial IoT cloud. In Proceedings of the IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), Lisbon, Portugal, 16–20 July 2018; pp. 637–638. [Google Scholar]
- Sałabun, W.; Wątróbski, J.; Shekhovtsov, A. Are MCDA Methods Benchmarkable? A Comparative Study of TOPSIS, VIKOR, COPRAS, and PROMETHEE II Methods. Symmetry 2020, 12, 1549. [Google Scholar] [CrossRef]
- Rehman, A.u.; Shekhovtsov, A.; Rehman, N.; Faizi, S.; Sałabun, W. On the Analytic Hierarchy Process Structure in Group Decision-Making Using Incomplete Fuzzy Information with Applications. Symmetry 2021, 13, 609. [Google Scholar] [CrossRef]
- Lo, H.-W.; Hsu, C.-C.; Huang, C.-N.; Liou, J.J.H. An ITARA-TOPSIS Based Integrated Assessment Model to Identify Potential Product and System Risks. Mathematics 2021, 9, 239. [Google Scholar] [CrossRef]
- Michnik, J. Weighted Influence Non-linear Gauge System (WINGS)–An analysis method for the systems of interrelated components. Eur. J. Oper. Res. 2013, 228, 536–544. [Google Scholar] [CrossRef]
- Ju, Y.; Wang, A.; You, T. Emergency alternative evaluation and selection based on ANP, DEMATEL, and TL-TOPSIS. Nat. Hazards 2015, 75, 347–379. [Google Scholar] [CrossRef]
- Si, S.-L.; You, X.-Y.; Liu, H.-C.; Zhang, P. DEMATEL Technique: A Systematic Review of the State-of-the-Art Literature on Methodologies and Applications. Math. Probl. Eng. 2018. [Google Scholar] [CrossRef] [Green Version]
- Kadoić, N.; Divjak, B.; Begičević Ređep, N. Integrating the DEMATEL with the analytic network process for effective decision-making. Cent. Eur. J. Oper. Res. 2019, 27, 653–678. [Google Scholar] [CrossRef]
- Fan, C.K.; Chen, T.-C. The risk management strategy of applying cloud computing. Int. J. Adv. Comput. Sci. Appl. 2012, 3, 18–27. [Google Scholar]
- Kadoić, N.; Begičević Ređep, N.; Divjak, B. A new method for strategic decision-making in higher education. Cent. Eur. J. Oper. Res. 2018, 26, 611–628. [Google Scholar] [CrossRef]
- Henni, K.; Mezghani, N.; Gouin-Valleranda, C. Unsupervised graph-based feature selection via subspace and PageRank centrality. Expert Syst. Appl. 2018, 114, 46–53. [Google Scholar] [CrossRef] [Green Version]
- Hashemi, A.; Bagher Dowlatshahi, M.; Nezamabadi-pour, H. MGFS: A multi-label graph-based feature selection algorithm via PageRank centrality. Expert Syst. Appl. 2020, 142. [Google Scholar] [CrossRef]
- Roy, B. Multicriteria Methodology for Decision Aiding (Nonconvex Optimization and Its Applications); Kluwer Academic Publishers: Dordrecht, The Netherlands, 1996. [Google Scholar]
- Kornyshova, E.; Salinesi, C. MCDM Techniques Selection Approaches: State of the Art. In Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Multicriteria Decision Making, Honolulu, HI, USA, 1–5 April 2007; pp. 22–29. [Google Scholar]
- Ishizaka, A.; Nemery, P. Multi-criteria Decision Analysis: Methods and Software, 1st ed.; John Wiley & Sons Ltd: West Sussex, UK, 2013. [Google Scholar]
- Li, Y.; Thomas, M.A. A Multiple Criteria Decision Analysis (MCDA) software selection framework. In Proceedings of the 47th Hawaii International Conference on System Sciences (HICSS), Waikoloa, HI, USA, 6–9 January 2014; pp. 1084–1094. [Google Scholar]
- Salinesi, C.; Kornyshova, E. Choosing a Prioritization Method—Case of IS Security Improvement. In Proceedings of the 18th Conference on Advanced Information Systems Engineering (CAiSE’ 06), Forum Proceedings, Theme: Trusted Information Systems, Luxembourg, 5–9 June 2006. [Google Scholar]
- Wątróbski, J.; Jankowski, J.; Ziebma, P.; Karczmarczyk, A.; Zioło, M. Generalised framework for multi-criteria method selection. Omega 2018, 86, 107–124. [Google Scholar] [CrossRef]
- Wątróbski, J.; Jankowski, J.; Ziemba, P.; Karczmarczyk, A.; Zioło, M. MCDA Method Selection Tool. 2019. Available online: http://www.mcda.it/ (accessed on 5 April 2021).
- Peffers, K.; Tuunanen, T.; Rothenberger, M.A.; Chatterjee, S. A Design Science Research Methodology for Information Systems Research. J. Manag. Inf. Syst. 2007, 24, 45–78. [Google Scholar] [CrossRef]
- Vaishnavi, V.; Kuechler, B. Design Science Research in Information Systems. Design Science Research in Information Systems and Technology. 2015. Available online: http://desrist.org/desrist/content/design-science-research-in-information-systems.pdf/ (accessed on 5 April 2021).
- Hevner, A.R.; March, S.T.; Park, J.; Ram, S. Design Science in Information Systems Research. MIS Q. 2004, 28, 75–105. [Google Scholar] [CrossRef] [Green Version]
- Hevner, A.R. A Three Cycle View of Design Science Research. Scand. J. Inf. Syst. 2007, 19, 87–92. [Google Scholar]
- Menold, N.; Bogner, K. Design of Rating Scales in Questionnaires, GESIS Survey Guidelines, Version 2.0; GESIS–Leibniz-Institut für Solzialwissenschaften: Mannheim, Germany, 2016. [Google Scholar]
- Giannarou, L.; Zervas, E. Using Delphi technique to build consensus in practice. Int. J. Bus. Sci. Appl. Manag. 2014, 9, 65–82. [Google Scholar]
- Brin, S.; Page, L. The Anatomy of a Large-Scale Hypertextual Web Search Engine. 7th International World-Wide Web Conference (WWW 1998). Available online: http://infolab.stanford.edu/~backrub/google.html (accessed on 5 April 2021).
- Sałabun, W.; Urbaniak, K. A New Coefficient of Rankings Similarity in Decision-Making Problems. In Proceedings of the International Conference on Computational Science (ICCS 2020), Amsterdam, The Netherlands, 3–5 June 2020; pp. 632–645. [Google Scholar]
- Saaty, T.L. Multicriteria Decision Making: The Analytic Hierarchy Process; RWS Publications: Pittsburgh, PA, USA, 1980. [Google Scholar]
- Bayazit, O. Use of AHP in decision-making for flexible manufacturing systems. J. Manuf. Technol. Manag. 2005, 16, 808–819. [Google Scholar] [CrossRef] [Green Version]
- Cherdantseva, Y.; Hilton, J. Information Security and Information Assurance: Discussion about the Meaning, Scope, and Goals. Organizational, Legal, and Technological Dimensions of Information System Administration (Chapter 10); IGI Global: Hershey, PA, USA, 2014. [Google Scholar]
- OWASP Risk Rating Methodology, Category: OWASP Testing Project. 2019. Available online: https://www.owasp.org/index.php/OWASP_Risk_Rating_Methodology (accessed on 5 April 2021).
ISRA Criteria | Weight (SNAP12) |
---|---|
Threat (T) | 0.198096379 |
Vulnerability (V) | 0.318888835 |
Probability (P) | 0.143692265 |
Consequence (C) | 0.118888835 |
Resiliency (R) | 0.220433685 |
ISRA Criteria | Weight (AHP) |
---|---|
Threat (T) | 0.105824012 |
Vulnerability (V) | 0.186796789 |
Probability (P) | 0.057177557 |
Consequence (C) | 0.196417034 |
Resiliency (R) | 0.453784608 |
ISRA Criteria | Weight (SNAP11) |
---|---|
Threat (T) | 0.151960196 |
Vulnerability (V) | 0.252842812 |
Probability (P) | 0.100434911 |
Consequence (C) | 0.157652935 |
Resiliency (R) | 0.337109146 |
ISRA Criteria | |||
---|---|---|---|
Threat (T) | 3 | 4 | 4 |
Vulnerability (V) | 1 | 3 | 2 |
Probability (P) | 4 | 5 | 5 |
Consequence (C) | 5 | 2 | 3 |
Resiliency (R) | 2 | 1 | 1 |
Coefficients | 0.216667 | 0.650000 | |
WS | 0.559896 | 0.692708 |
Inherent Criteria for Transaction Systems (SNAP12) | Weight (SNAP12) |
---|---|
Authentication | 0.135265454 |
Authorization | 0.105908484 |
Encryption | 0.173263665 |
Digital signature | 0.117567661 |
Availability | 0.241961344 |
Logging | 0.099104201 |
Backup | 0.126929191 |
Inherent Criteria for Transaction Systems (AHP) | Weight (AHP) |
---|---|
Authentication | 0.205736222 |
Authorization | 0.164580753 |
Encryption | 0.203349261 |
Digital signature | 0.153751556 |
Availability | 0.074480352 |
Logging | 0.110567964 |
Backup | 0.087533891 |
Inherent Criteria for Transaction Systems (SNAP11) | Weight (SNAP11) |
---|---|
Authentication | 0.170500838 |
Authorization | 0.135244618 |
Encryption | 0.188306463 |
Digital signature | 0.135659609 |
Availability | 0.158220848 |
Logging | 0.104836083 |
Backup | 0.107231541 |
ISRA Criteria | |||
---|---|---|---|
Authentication | 3 | 1 | 2 |
Authorization | 6 | 3 | 5 |
Encryption | 2 | 2 | 1 |
Digital signature | 5 | 4 | 4 |
Availability | 1 | 7 | 3 |
Logging | 7 | 5 | 7 |
Backup | 4 | 6 | 6 |
Coefficients | 0.004464286 | 0.758928571 | |
WS | 0.376041667 | 0.699479167 |
Alternatives/Criteria | Auth | Atz | Enc | DS | Av | Log | Bck |
---|---|---|---|---|---|---|---|
e-banking | 0.372191993 | 0.386198686 | 0.359962141 | 0.442262711 | 0.405931898 | 0.393551596 | 0.371068639 |
m-banking | 0.426442961 | 0.388951499 | 0.410070356 | 0.388810918 | 0.378993865 | 0.388203063 | 0.384273720 |
e-commerce | 0.201365046 | 0.224849816 | 0.229967503 | 0.168926371 | 0.215074237 | 0.218245341 | 0.244657641 |
Alternatives/Criteria | Threat (T) | Vulnerability (V) | Probability (P) | Consequence (C) | Resiliency (R) |
---|---|---|---|---|---|
e-banking | 0.300439318 | 0.346069687 | 0.392030313 | 0.471548400 | 0.307823618 |
m-banking | 0.312925954 | 0.250583450 | 0.244493668 | 0.319128828 | 0.312331238 |
e-commerce | 0.386634729 | 0.403346863 | 0.363476020 | 0.209322771 | 0.379845144 |
Transaction Systems (Inherent Criteria) | Rank/Weight |
---|---|
e-banking | 0.388746283 |
m-banking | 0.397145997 |
e-commerce | 0.21410772 |
Transaction Systems (Generic ISRA Criteria) | Rank/Weight |
---|---|
e-banking | 0.350640726 |
m-banking | 0.291067527 |
e-commerce | 0.358291747 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Maček, D.; Magdalenić, I.; Begičević Ređep, N. A Model for the Evaluation of Critical IT Systems Using Multicriteria Decision-Making with Elements for Risk Assessment. Mathematics 2021, 9, 1045. https://doi.org/10.3390/math9091045
Maček D, Magdalenić I, Begičević Ređep N. A Model for the Evaluation of Critical IT Systems Using Multicriteria Decision-Making with Elements for Risk Assessment. Mathematics. 2021; 9(9):1045. https://doi.org/10.3390/math9091045
Chicago/Turabian StyleMaček, Davor, Ivan Magdalenić, and Nina Begičević Ređep. 2021. "A Model for the Evaluation of Critical IT Systems Using Multicriteria Decision-Making with Elements for Risk Assessment" Mathematics 9, no. 9: 1045. https://doi.org/10.3390/math9091045
APA StyleMaček, D., Magdalenić, I., & Begičević Ređep, N. (2021). A Model for the Evaluation of Critical IT Systems Using Multicriteria Decision-Making with Elements for Risk Assessment. Mathematics, 9(9), 1045. https://doi.org/10.3390/math9091045