IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Stochastic Model for Improving Information Security in Supply Chain Systems

A Stochastic Model for Improving Information Security in Supply Chain Systems
View Sample PDF
Author(s): Ibrahim Al Kattan (American University of Sharjah, United Arab Emirates), Ahmed Al Nunu (American University of Sharjah, United Arab Emirates)and Kassem Saleh (Kuwait University, Kuwait)
Copyright: 2010
Pages: 15
Source title: Business Information Systems: Concepts, Methodologies, Tools and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-61520-969-9.ch037

Purchase

View A Stochastic Model for Improving Information Security in Supply Chain Systems on the publisher's website for pricing and purchasing information.

Abstract

This article presents a probabilistic security model for supply chain management systems (SCM) in which the basic goals of security (including confidentiality, integrity, availability and accountability, CIAA) are modeled and analyzed. Consequently, the weak points in system security are identified. A stochastic model using measurable values to describe the information system security of a SCM is introduced. Information security is a crucial and integral part of the network of supply chains. Each chain or driver requires a different security level according to the services it contributes to the overall SCM system. Different probabilistic weights are assigned to the four goals CIAA of security depending on the SCM driver’s mission. A Semi-Markov chain model is used to describe the probabilistic nature of different security levels for each driver in the system. A comparison of the steady-state security for a multi-driver model with different levels of attack is performed, and the results analyzed. Enhanced supply chain security could be achieved by identifying the effects of attacks on the security goals of an organization. The use of this model helps to identify weak points in supply chain system security, and offers hints on how to strengthen them. The model is tested by considering intrusion scenarios representing different levels of attack on the SCM system. An analysis of the results is performed using an interactive application.

Related Content

Vincent Lennard Kraus. © 2023. 32 pages.
Tlou Maggie Masenya. © 2023. 16 pages.
Arzu Tufan, Gurkan Tuna. © 2023. 30 pages.
Wasswa Shafik. © 2023. 19 pages.
Calvin Nobles, Sharon L. Burton, Darrell Norman Burrell. © 2023. 23 pages.
Darrell Norman Burrell, Calvin Nobles, Austin Cusak, Laura Ann Jones, Jorja B. Wright, Horace C. Mingo, Jennifer Ferreras-Perez, Katrina Khanta, Philip Shen, Kevin Richardson. © 2023. 16 pages.
Jorja B. Wright, Darrell Norman Burrell. © 2023. 12 pages.
Body Bottom