DSpace Repository

Fuzzy based modeling for an effective IT security policy management

Show simple item record

dc.contributor.author K., Pradheep Kumar
dc.date.accessioned 2023-01-17T11:19:01Z
dc.date.available 2023-01-17T11:19:01Z
dc.date.issued 2016
dc.identifier.uri https://ieeexplore.ieee.org/document/7555979
dc.identifier.uri http://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/8530
dc.description.abstract This paper presents a fuzzy based modeling approach for determining the effectiveness of IT security policies of an organization. Normally organizations have different IT security policies, but modeling and maintaining them is a tedious process. In order to ensure appropriate IT support policies, there are many factors involved. The most common are the periodic data backups and prevention against the virus attack. Therefore, it is essential to ensure that the IT security policies are assessed for all the possible vulnerabilities and hidden threats. Thus fuzzy based modeling has been proposed to identify the effectiveness of the IT security policies for any organization. Mamdani's Fuzzy inference engine has been applied to construct the fuzzy rules based on the different primary and secondary factors. Finally the results from the analysis of the factors are processed by the fuzzy inference engine, to decide the rule strengths and its effectiveness of the overall IT security policies. en_US
dc.language.iso en en_US
dc.publisher IEEE en_US
dc.subject Computer Science en_US
dc.subject Knowledge taxonomy en_US
dc.subject IT support en_US
dc.subject Security en_US
dc.subject Weightage en_US
dc.subject Rule strengths en_US
dc.title Fuzzy based modeling for an effective IT security policy management en_US
dc.type Article en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account