Risk Assessment of Hostile Attacks Using Analytic Network Process Model
Document Type : Original Article
Abstract
Investigating the factors and identifying the type of potential threats and risks of important assets at the time of incidents are of the key measures in reducing vulnerability with the passive approach. Therefore, in order to develop the most likely scenario to prevent or reduce vulnerability and the consequences, we need to develop comprehensive indicators and risk analysis techniques. In the present models, all stages of risk analysis are linear, while it can be a major weakness in the evaluation process. For example, in the asset screening stage, an asset that does not have a high value in terms of assets is eliminated, but with high potential for large system vulnerabilities. In fact, due to the nature of the linearity of the models, the asset is eliminated in the first stage and prevents evaluation in the next steps (vulnerability assessment). Due to the weakness of linear models for determining the priority of the vulnerability of the three nuclear sites, the network analysis process model has been used. The research method of the present study is based on the purpose of the developmental type. From the nature of the subject, a description of the library resources and the views of the elites to examine the proposed models have been used. Finally, while explaining the indicator, the model of the network analysis process is described in order to evaluate the final risk, which is the most risk related to sites A, B, C.
M. Garcia-Melon, J. Ferris-Onate, J. Aznar-Bellver, P. Aragonés-Beltran, and R. Poveda-Bautista, “Farmland appraisal based on the analytic network Process,” Journal of Global Optimization, vol. 2, pp. 143-155, 2008.##
T. L. Saaty and J. M. Alexander, “The Thinking with Models, Mathematical Model in Physical and Social Science, Oxford Pergamon Press, pp.48-155, 1988.##
Y.-H. Lin, K.-M. Tsai, and W.-J. Shiang, “Research on using ANP to establish a performance assessment model for business intelligence systems,” Expert Systems with Application, vol. 36, pp. 4135-4146, 2009.##