Evaluating and Applying Risk Remission Strategy Approaches to Prevent Prospective Failures in Information Systems

Askar Boranbayev, Seilkhan Boranbayev, Askar Nurbekov

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

The article is devoted to a study related to applying various approaches to increase the dependability of Information Systems. In this article we evaluated and applied approaches such as RED (Risk in Early Design), GREEN (Generated Risk Event Effect Neutralization), and studied the possibility of using these approaches to prevent prospective failures in Information Systems. The MCDM (Multiple-Criteria Decision-Making) method was applied to assess information security risks in critical infrastructures. Based on this study we propose to use these methods and approaches as risk remission strategy tools in increasing the level of dependability of information systems. The proposed approach can be used to help in finding and neutralizing relevant risks.

Original languageEnglish
Title of host publication17th International Conference on Information Technology–New Generations, ITNG 2020
EditorsShahram Latifi
PublisherSpringer
Pages647-651
Number of pages5
ISBN (Print)9783030430191
DOIs
Publication statusPublished - Jan 1 2020
Event17th International Conference on Information Technology: New Generations, ITNG 2020 - Las Vegas, United States
Duration: Apr 5 2020Apr 8 2020

Publication series

NameAdvances in Intelligent Systems and Computing
Volume1134
ISSN (Print)2194-5357
ISSN (Electronic)2194-5365

Conference

Conference17th International Conference on Information Technology: New Generations, ITNG 2020
CountryUnited States
CityLas Vegas
Period4/5/204/8/20

Keywords

  • Fault tolerance
  • Information systems
  • Multi-criteria method
  • Reliability

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Evaluating and Applying Risk Remission Strategy Approaches to Prevent Prospective Failures in Information Systems'. Together they form a unique fingerprint.

Cite this