2015
DOI: 10.18178/jacn.2015.3.4.190
|View full text |Cite
|
Sign up to set email alerts
|

Finding the Weakest Link in the Interdependent Security Chain Using the Analytic Hierarchy Process

Abstract: Abstract-with the rapid development of network finance and electronic commerce, the network and information security problems are more complex and prominent, and economics of information security has also become a hot research topic. This paper uses AHP (analytic hierarchy process) method to find the weakest link in the interdependent security chain. And the result can help information security investment decision-making. This paper firstly introduces research background including current research situations a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 15 publications
(15 reference statements)
0
4
0
Order By: Relevance
“…The statistics enumerating the successes of cyber incidents influenced by the ability of attackers to easily con human actors to behave or respond inappropriate to attack and compromise scenarios within their work domains add to the evidence that suggests that human actors are potentially the weakest links (Ashford, 2016). Clearly, all other things being equal including well instituted technical security measures, the record of cyber incidents described in Section 2 also demonstrate facts that intelligent attackers motivated by potential financial gains tend to direct their malicious effort toward less-protected targets (Pan et al, 2015). The attackers aim to compromise potential targets (human actors) with poor or weak abilities to defend infrastructure and information systems from attacks.…”
Section: The Weakest Linkmentioning
confidence: 99%
See 2 more Smart Citations
“…The statistics enumerating the successes of cyber incidents influenced by the ability of attackers to easily con human actors to behave or respond inappropriate to attack and compromise scenarios within their work domains add to the evidence that suggests that human actors are potentially the weakest links (Ashford, 2016). Clearly, all other things being equal including well instituted technical security measures, the record of cyber incidents described in Section 2 also demonstrate facts that intelligent attackers motivated by potential financial gains tend to direct their malicious effort toward less-protected targets (Pan et al, 2015). The attackers aim to compromise potential targets (human actors) with poor or weak abilities to defend infrastructure and information systems from attacks.…”
Section: The Weakest Linkmentioning
confidence: 99%
“…"The weakest link" asset has become a key factor to determine the security level of the chain. If these corporations want to improve the security level of the whole information systems and optimise security chain integration, then they must improve the security level of "the weakest link" (Pan et al, 2015). The question left to be answered remains; how to find the weakest link?…”
Section: The Weakest Linkmentioning
confidence: 99%
See 1 more Smart Citation
“…However, contrary to popular belief that hackers target only big companies, attacks have been increasingly common to home and small office (HOSO) routers as well. This is because hackers hunt poorly managed computer systems (Pan, Zhong, & Mei, 2015) with varied intentions frequently for monetary gain (Australian Institute of Criminology, 2005). So end-users, with the least effort and awareness on cybersecurity landscape, are considered the "weakest link" and the frequent target of cyber attacks (Aloul, 2012).…”
Section: Introductionmentioning
confidence: 99%