1.2 Soft computing and Hybrid model
We must integrate these two methods to play their respective advantages and flexibility in order
to achieve the bust results. Typical methods of comprehensive assessment include hierarchical
analysis, probabilistic risk assessment and fuzzy comprehensive evaluation method ([10], [19],
[49]). Since the Analysis of Hierarchy Process (AHP) can change from the qualitative index into
quantitative index [3], therefore, AHP has been widely used in security risk assessment. The
other method such as Hybrid model, Hybrid model is developed by integrating two or more
existing model.
The rest of this paper is organized as follows. In section 2 we reviewed the literature of
information security analysis. We discussed the information security assessment process,
quantitative security risk analysis method (including Expect Annual Loss or Estimated Annual
Cost) and the process of IT risk assessment in section 3. In section 4, we explained the future
research for information risk analysis issues; a future research direction may be development and
application of soft computing and hybrid model for information security analysis. In section 5, A
Practical advice for evaluation information security risk based on AHP and fuzzy comprehensive
evaluation is discussed. We detail examine the steps of AHP and fuzzy comprehensive
evaluation method. Section 6 is conclusion.
Table 1: Advantages and disadvantages of Quantitative and Qualitative methods
1.2 Soft computing and Hybrid model
We must integrate these two methods to play their respective advantages and flexibility in order
to achieve the bust results. Typical methods of comprehensive assessment include hierarchical
analysis, probabilistic risk assessment and fuzzy comprehensive evaluation method ([10], [19],
[49]). Since the Analysis of Hierarchy Process (AHP) can change from the qualitative index into
quantitative index [3], therefore, AHP has been widely used in security risk assessment. The
other method such as Hybrid model, Hybrid model is developed by integrating two or more
existing model.
The rest of this paper is organized as follows. In section 2 we reviewed the literature of
information security analysis. We discussed the information security assessment process,
quantitative security risk analysis method (including Expect Annual Loss or Estimated Annual
Cost) and the process of IT risk assessment in section 3. In section 4, we explained the future
research for information risk analysis issues; a future research direction may be development and
application of soft computing and hybrid model for information security analysis. In section 5, A
Practical advice for evaluation information security risk based on AHP and fuzzy comprehensive
evaluation is discussed. We detail examine the steps of AHP and fuzzy comprehensive
evaluation method. Section 6 is conclusion.
Table 1: Advantages and disadvantages of Quantitative and Qualitative methods
การแปล กรุณารอสักครู่..
