Preview

Software Security Risk Analysis Using Fuzzy Expert System

Powerful Essays
Open Document
Open Document
1812 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Software Security Risk Analysis Using Fuzzy Expert System
| |
|Software Level of Security Risk Analysis Using Fuzzy |
|Expert System |
|[ARTIFICIAL INTELLIGENT] |

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

FACULTY OF INFORMATION & COMMUNICATION TECHNOLOGY

SESSION 2 - 2010/2011

|NURUL AZRIN BT AIRRUDIN – B031010343 |
|SITI NURSHAFIEQA BT SUHAIMI – B031010313 |
|NUR SHAHIDA BT MUHTAR – B031010266 |
| |
|LECTURE NAME: DR ABD. SAMAD HASSAN BASARI |
| |
|[12th APRIL 2011] |

SOFTWARE LEVEL OF SECURITY RISK ANALYSIS
USING FUZZY EXPERT SYSTEM

ABSTRACT

There is wide concern on the security of software systems because many organizations depend largely on them for their day-to-day operations. Since we have not seen a software system that is completely secure, there is need to analyze and determine the security risk of emerging software systems. This work presents a technique for analyzing software security using fuzzy expert system. The inputs to the system are suitable fuzzy sets

You May Also Find These Documents Helpful

  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Software is an integral part of most defense systems. Following are two reasons why software…

    • 2470 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    The most accurate way to assess vulnerabilities in an IT system is by penetration testing, which simulates an actual attack. It can be dangerous to both the targeted organization, as well as the penetration team. Since the testers use the same tools as an actual attacker, systems and networks could really be brought down during the “attack.” One of the biggest advantages to penetration testing is that it tests not only the security of the infrastructure, but the readiness of the response team as well. Even though a more realistic test would be performed during normal working hours when productivity would be affected, even after hours tests could cause problems. A successful attack could bring resources down and it may take time for them to come back up. All penetration testing should be signed off on by management prior to the test commencing.…

    • 591 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nowadays, security software is becoming a major part of enterprise business. Software development is activity connected with advanced technology and high level of knowledge. After viewing the growing number of malicious activity, it is now imperative that we develop a plan and stick to it. There are so many threats to vulnerabilities and threats that leave systems open to malicious attacks. Whenever you sit at a computer and log onto the internet, your system, becomes vulnerable. There is now potential for malicious attacks. Knowing what to look for can prevent a lot of these attacks.…

    • 534 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Isc363 Phase 3

    • 1899 Words
    • 8 Pages

    As we progress forward, a few specific requirements such as software and data, information and hardware must be obtained in order to identify the type of system needed. The collected information is vital when determining the type of classifications and what is needed to insure the items or information is being secured. When it comes to threat identification, are level of threats is categorize…

    • 1899 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    The Rookie Chief Iso

    • 3874 Words
    • 16 Pages

    The CISO is the executive responsible for the organization's entire security posture, both physical and digital. CISOs also frequently own or participate closely in related areas such as business continuity planning, loss prevention and fraud prevention, and privacy.…

    • 3874 Words
    • 16 Pages
    Powerful Essays
  • Better Essays

    There are many objectives to the computer security that protects the information from any theft and natural disaster which allows information into the computer network. The computer technologies have become unwanted computer behavior and security strategies behavior. The computer technology which has security went it comes to logic. The security primary goals are the computer designing, applications programs with the type of security which most have restrictions to different types of program behaviors. The computer software has to be trusted and be able to security the software and be trustworthy for the database to run.…

    • 1224 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Is a high integrity, medium availability for DoD ISs handling information that is important to the support of deployed and contingency forces. The consequence of loss of integrity is unacceptable. Loss of availability is difficult to deal with and can only be tolerated for a short time.…

    • 1633 Words
    • 7 Pages
    Powerful Essays
  • Best Essays

    Insider Threats

    • 4039 Words
    • 17 Pages

    In recent years, countries around the world have been developing rules and regulations which are designed to support data confidentiality and security. Many organizations have spent decades on building stronger defenses against intrusion, including firewalls, anti-virus software, email security, identity access badges, security policies and procedures. These protections have made the business world more effective at blocking threats and attacks from the outside and made it increasingly difficult for hackers and viruses to penetrate into the system. However these protections provide only a first line of defense since it is designed to prevent unauthorized access.…

    • 4039 Words
    • 17 Pages
    Best Essays
  • Powerful Essays

    Security Incidents

    • 2032 Words
    • 9 Pages

    In this document, the importance of security incidents is expressed as a high priority for any business that may possess valuable information. Computer networks are attacked more now than they have before, and in large numbers. There is a high demand for security within Information Technology to ensure that businesses, as well as their clients, do not fall victims to attacks that may compromise their assets. The categories of incidents explain the levels of risk according to the type of incident, as well as what classifies the incident levels. Security incidents are a major part of today’s world, and this document states the issues concerning the rise of e-commerce and products, such as software, that require access to the internet. Concluding the document is a brief example on how to identify and how to prevent a security incident by informing the reader what to look for as a potential threat and how to minimize vulnerabilities within a network.…

    • 2032 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    MANAGE RISKS PROJECT

    • 553 Words
    • 3 Pages

    a gamble at wether your change is going to be a success for your company.…

    • 553 Words
    • 3 Pages
    Good Essays
  • Good Essays

    As computer systems have become more and more sophisticated over the time, it has become less and less credible to ensure security by inspection and intuition alone. However, standard methods of analyzing different aspects of the area have been developed to identify and apply key principles of the area, but the area of Security Analysis is constantly developing as new secure designs are invented and so are the new ways of breaking them. In many cases, systems are so complex that it is impossible find a secure solution. In situations like such, instead improvement measures, one should focus towards counter-measures.…

    • 484 Words
    • 2 Pages
    Good Essays
  • Better Essays

    It Risk Analysis Case Study

    • 4910 Words
    • 20 Pages

    Information Technology is vital to every business today, since most businesses today are linked together with high speed broadband networks, high definition screens; superfast computers only make them a treat for a user. So, if the IT fails the businesses suffer huge losses in a matter of minutes for e.g. the London stock exchange has an IT failure it could possibly mean a loss of thousands of pounds every fraction of a second. Every Risk no matter how big or small is a potential threat for e.g. a small cut on the hand could turn gangrenous over the period of time, what are we prescribed to do then, we would lose our limb, IT too is similar. A proper analysis and management is necessary to keep the IT in a good shape. Businesses understand IT as a risky proposition since they believe an IT system might last a while but would invariably die because of the stiff competition. Every time a new technology erupts on the market the one previous to it dies either a sudden or a slow death. For the past 4 decades IT has been a boon to the service industry making itself a slave science by supporting other sciences to grow, but very little effort has been made to log the number of times IT system failed and a even poorer job is done in logging the reasons that led to the failure. Most often the same mistakes are repeated but no serious lesson are learnt. We believe it’s high time we start logging our failures because a shocking 60% of all IT projects fail even today. Normally, IT Risks are detected pretty late which leads to a failure it happens because a proper analysis and assessment is lacking. A good management would always like to know where and how its investment will be used in and hence Risk Management is used to analyse and manage their risks in a more strategized format.…

    • 4910 Words
    • 20 Pages
    Better Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    The level of security and its effectiveness in an application is a concern for all software development projects. Operations and Information Technology will hold key responsibility in implementation and maintenance of the software security measures. These measures will include but not be limited to firewalls, intrusion detection systems, credential verification, and standard backup operations (Valacich, 2012). This responsibility isn’t limited to just these measures or to this scope of responsibility. All hands that take part in development will have some responsibility in assuring appropriate security measures are developed, implemented, and maintained.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Good Essays

    There is no tradeoff between ease of use and comprehensiveness of protection provided. The interface is designed in a fashion that guides user right from the installation process to the actual protection. The software provides clear operating guidelines dividing interface between complete, quick and vulnerability scans and displaying outputs according to user defined criteria.…

    • 822 Words
    • 4 Pages
    Good Essays

Related Topics