An approach for risk estimation in information security using text mining and jaccard method
Bulletin of Electrical Engineering and Informatics, 2018•beei.org
Involvement of digital information in almost of enterprise sectors makes information having
value that must be protected from information leakage. In order to obtain proper method for
protecting sensitive information, enterprise must perform risk analysis of threat. However,
enterprises often get limitation in measuring risk related information security threat.
Therefore, this paper has goal to give approach for estimating risk by using information
value. Techniques for measuring information value in this paper are text mining and Jaccard …
value that must be protected from information leakage. In order to obtain proper method for
protecting sensitive information, enterprise must perform risk analysis of threat. However,
enterprises often get limitation in measuring risk related information security threat.
Therefore, this paper has goal to give approach for estimating risk by using information
value. Techniques for measuring information value in this paper are text mining and Jaccard …
Abstract
Involvement of digital information in almost of enterprise sectors makes information having value that must be protected from information leakage. In order to obtain proper method for protecting sensitive information, enterprise must perform risk analysis of threat. However, enterprises often get limitation in measuring risk related information security threat. Therefore, this paper has goal to give approach for estimating risk by using information value. Techniques for measuring information value in this paper are text mining and Jaccard method. Text mining is used to recognize information pattern based on three classes namely high business impact, medium business impact and low business impact. Furthermore, information is given weight by Jaccard method. The weight represents risk levelof information leakage in enterprise quantitatively. Result of comparative analysis with existing method show that proposed method results more detailed output in estimating risk of information security threat.
beei.org
以上显示的是最相近的搜索结果。 查看全部搜索结果