Assessing Information Security Risk Using Markov Chain

Daniel Tse*, Xiaoting Pan, Yuan Zong, Jiaxi Liu, Qinyan Yang

*Corresponding author for this work

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

1 Citation (Scopus)

Abstract

[1] Information leakage occurs several times in universities in recent years. In this article, we propose a risk assessment method based on Markov chain for universities to evaluate risks using menace index. After identifying the assets and threats in universities, we use a survey data of university risks to find out the probability of the occurrence of each threat. Markov chain is used to indicate the probability of future. The result of a predicted severity sequence of risks can be useful to universities which risks they should pay more attention to. Two methods are used in the Markov part: One is the traditional way to set the initial probability matrix; the other is a statistical probability to present each menace in the initial probability matrix. After comparison, we found that the second method is more precise for risk assessment.
Original languageEnglish
Title of host publication2018 IEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2018
PublisherIEEE
Pages808-813
ISBN (Electronic)978-1-5386-6786-6
DOIs
Publication statusPublished - Dec 2018
Event2018 IEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2018 - Bangkok, Thailand
Duration: 16 Dec 201819 Dec 2018

Publication series

NameIEEE International Conference on Industrial Engineering and Engineering Management
Volume2019-December
ISSN (Print)2157-3611
ISSN (Electronic)2157-362X

Conference

Conference2018 IEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2018
Country/TerritoryThailand
CityBangkok
Period16/12/1819/12/18

Research Keywords

  • Markov Chain
  • Menace Index
  • Security Risk Assessment

Fingerprint

Dive into the research topics of 'Assessing Information Security Risk Using Markov Chain'. Together they form a unique fingerprint.

Cite this