Mathematical Model for Choosing Counterparty When Assessing Information Security Risks

The need to assess the risks of the trustworthiness of counterparties is increasing every year. The identification of increasing cases of unfair behavior among counterparties only confirms the relevance of this topic. The existing work in the field of information and economic security does not create a reasonable methodology that allows for a comprehensive study and an adequate assessment of a counterparty (for example, a developer company) in the field of software design and development. The purpose of this work is to assess the risks of a counterparty’s trustworthiness in the context of the digital transformation of the economy, which in turn will reduce the risk of offenses and crimes that constitute threats to the security of organizations. This article discusses the main methods used in the construction of a mathematical model for assessing the trustworthiness of a counterparty. The main difficulties in assessing the accuracy and completeness of the model are identified. The use of cross-validation to eliminate difficulties in building a model is described. The developed model, using machine learning methods, gives an accurate result with a small number of compared counterparties, which corresponds to the order of checking a counterparty in a real system. The results of calculations in this model show the possibility of using machine learning methods in assessing the risks of counterparty trustworthiness.

[1]  D. Brigo,et al.  Forecasting recovery rates on non-performing loans with machine learning , 2021 .

[2]  Sylvain Frey,et al.  Contextualising and Aligning Security Metrics and Business Objectives: a GQM-based Methodology , 2020, Comput. Secur..

[3]  Youngsung Kim,et al.  Improvement of Personal Information Protection Level in the Military Using the Measurement of Disclosure Risk , 2015 .

[4]  Tom Fawcett,et al.  An introduction to ROC analysis , 2006, Pattern Recognit. Lett..

[5]  Dieter Rombach,et al.  GQM + Strategies in a Nutshell , 2014 .

[6]  Hangbae Chang,et al.  The rating model of corporate information for economic security activities , 2019, Security Journal.

[7]  Luca Di Persio,et al.  Estimating the Counterparty Risk Exposure by Using the Brownian Motion Local Time , 2017, Int. J. Appl. Math. Comput. Sci..

[8]  Lawrence Bodin,et al.  Information security and risk management , 2008, CACM.

[9]  Koltays Andrey,et al.  Automation of tax control mechanism with the use of specialized information and analytical systems within the framework of ensuring security , 2020, International Journal of Emerging Trends in Engineering Research.

[10]  C. Sabin,et al.  Medical Statistics at a Glance. Fourth Edition , 2020 .

[11]  Lawrence Bodin,et al.  Evaluating information security investments using the analytic hierarchy process , 2005, CACM.

[12]  Lawrence A. Gordon,et al.  Budgeting process for information security expenditures , 2006, CACM.

[13]  T. Saaty How to Make a Decision: The Analytic Hierarchy Process , 1990 .

[14]  Alireza Shameli-Sendi An efficient security data-driven approach for implementing risk assessment , 2020 .

[15]  Richard E. Overill,et al.  On the role of the Facilitator in information security risk assessment , 2007, Journal in Computer Virology.