Integrated information security risk management model based on ahp and bayesian networks
The subject of the study is information security risk management in a modern digital environment, where the integration of strategic and tactical approaches is necessary to ensure adaptive protection. The purpose of the work is to develop a hybrid model of cyber risk management by combining methodol...
        Saved in:
      
    
          | Published in | Sučasnij stan naukovih doslìdženʹ ta tehnologìj v promislovostì (Online) no. 3(33); pp. 166 - 179 | 
|---|---|
| Main Authors | , , , , , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
          
        25.09.2025
     | 
| Online Access | Get full text | 
| ISSN | 2522-9818 2524-2296 2524-2296  | 
| DOI | 10.30837/2522-9818.2025.3.166 | 
Cover
| Abstract | The subject of the study is information security risk management in a modern digital environment, where the integration of strategic and tactical approaches is necessary to ensure adaptive protection. The purpose of the work is to develop a hybrid model of cyber risk management by combining methodological analysis, expert assessments, probabilistic modeling and technical monitoring. The objectives of the study are: (1) analysis of the complementarity of the CRAMM methodology and SIEM systems; (2) construction of a procedure for quantitative prioritization of threats and vulnerabilities based on the analytical hierarchy process (AHP); (3) integration of the obtained estimates into Bayesian networks (BN) for probabilistic risk forecasting; (4) implementation of the proposed approach using modern automation tools. The methods used in the work include: CRAMM methodology for identifying assets, threats and vulnerabilities; Thomas Saati's AHP for quantitative assessment of priorities based on expert judgments with measurement of consistency using the Kendall concordance coefficient; mathematical modeling of causal relationships using Bayesian networks (BN); and the use of SIEM-class systems for operational monitoring of security events. The practical implementation of the approach was carried out using Python, in particular the Numpy, SciPy, pgmpy libraries, and the Streamlit web interface. Results. An integrated approach was developed that combines CRAMM, AHP, BN, and SIEM into a single adaptive risk management system. It is shown that AHP allows you to transform subjective expert assessments into objective weighting factors, which increases the reliability of the analysis. Based on these data, a Bayesian network was built to assess the risk of financial losses, which takes into account the presence of a threat, vulnerability, and a possible incident. The model is implemented programmatically, demonstrating the process of factoring the joint distribution and marginalizing latent variables to obtain posterior probabilities. The web interface based on Streamlit ensures the ease of use of the tool by non-professional users. Conclusions. The proposed hybrid approach allows for the effective combination of strategic planning (CRAMM), expert assessments (AHP), probabilistic modeling (BN) and operational monitoring (SIEM), forming a proactive, scientifically sound risk management system. Such integration provides a high level of adaptability and accuracy in a dynamic threat landscape, which makes the model practically applicable for organizations of various levels. | 
    
|---|---|
| AbstractList | The subject of the study is information security risk management in a modern digital environment, where the integration of strategic and tactical approaches is necessary to ensure adaptive protection. The purpose of the work is to develop a hybrid model of cyber risk management by combining methodological analysis, expert assessments, probabilistic modeling and technical monitoring. The objectives of the study are: (1) analysis of the complementarity of the CRAMM methodology and SIEM systems; (2) construction of a procedure for quantitative prioritization of threats and vulnerabilities based on the analytical hierarchy process (AHP); (3) integration of the obtained estimates into Bayesian networks (BN) for probabilistic risk forecasting; (4) implementation of the proposed approach using modern automation tools. The methods used in the work include: CRAMM methodology for identifying assets, threats and vulnerabilities; Thomas Saati's AHP for quantitative assessment of priorities based on expert judgments with measurement of consistency using the Kendall concordance coefficient; mathematical modeling of causal relationships using Bayesian networks (BN); and the use of SIEM-class systems for operational monitoring of security events. The practical implementation of the approach was carried out using Python, in particular the Numpy, SciPy, pgmpy libraries, and the Streamlit web interface. Results. An integrated approach was developed that combines CRAMM, AHP, BN, and SIEM into a single adaptive risk management system. It is shown that AHP allows you to transform subjective expert assessments into objective weighting factors, which increases the reliability of the analysis. Based on these data, a Bayesian network was built to assess the risk of financial losses, which takes into account the presence of a threat, vulnerability, and a possible incident. The model is implemented programmatically, demonstrating the process of factoring the joint distribution and marginalizing latent variables to obtain posterior probabilities. The web interface based on Streamlit ensures the ease of use of the tool by non-professional users. Conclusions. The proposed hybrid approach allows for the effective combination of strategic planning (CRAMM), expert assessments (AHP), probabilistic modeling (BN) and operational monitoring (SIEM), forming a proactive, scientifically sound risk management system. Such integration provides a high level of adaptability and accuracy in a dynamic threat landscape, which makes the model practically applicable for organizations of various levels. | 
    
| Author | Kalienichenko, Lidia Tsuranov, Mykhailo Khavina, Inna Timoshyn, Anatolii Gnusov, Yurii Dovhan, Iryna  | 
    
| Author_xml | – sequence: 1 givenname: Anatolii orcidid: 0009-0005-6916-8252 surname: Timoshyn fullname: Timoshyn, Anatolii – sequence: 2 givenname: Lidia orcidid: 0000-0003-4068-4729 surname: Kalienichenko fullname: Kalienichenko, Lidia – sequence: 3 givenname: Yurii orcidid: 0000-0002-9017-9635 surname: Gnusov fullname: Gnusov, Yurii – sequence: 4 givenname: Inna orcidid: 0000-0002-1856-1186 surname: Khavina fullname: Khavina, Inna – sequence: 5 givenname: Mykhailo orcidid: 0000-0002-2115-7029 surname: Tsuranov fullname: Tsuranov, Mykhailo – sequence: 6 givenname: Iryna orcidid: 0009-0001-0440-9810 surname: Dovhan fullname: Dovhan, Iryna  | 
    
| BookMark | eNqNkM1qwzAQhEVJoWmaRyjoBexKWluSjyX0JxDoJYfexEaSUze2HCSX4Levk_QBetphmG9h5p7MQh88IY-c5cA0qCdRCpFVmutcMFHmkHMpb8h8sotMiErOLvoauSPLlL4ZY0IryQSfk891GPw-4uAdbULdxw6Hpg80efsTm2GksUkH2mHAve98GGjXO9_SHaYJmHL4daQY3GSMPjUYaPDDqY-H9EBua2yTX_7dBdm-vmxX79nm4229et5ktgKZSeRcASgoUEsNNVhV292u5oVlwB2DUkpXgENVWoVWaVuISvnCSue0qhUsiLy-_QlHHE_YtuYYmw7jaDgzl4XMub451zfnhQyYaaEJLK-gjX1K0df_5H4BPcBsPQ | 
    
| ContentType | Journal Article | 
    
| DBID | AAYXX CITATION ADTOC UNPAY  | 
    
| DOI | 10.30837/2522-9818.2025.3.166 | 
    
| DatabaseName | CrossRef Unpaywall for CDI: Periodical Content Unpaywall  | 
    
| DatabaseTitle | CrossRef | 
    
| DatabaseTitleList | CrossRef | 
    
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Business | 
    
| EISSN | 2524-2296 | 
    
| EndPage | 179 | 
    
| ExternalDocumentID | 10.30837/2522-9818.2025.3.166 10_30837_2522_9818_2025_3_166  | 
    
| GroupedDBID | AAYXX ADBBV ALMA_UNASSIGNED_HOLDINGS BCNDV CITATION GROUPED_DOAJ ADTOC UNPAY  | 
    
| ID | FETCH-LOGICAL-c936-6a11733734a8683f3c7fcbbf14c031d03566d43da75c7ac78c4297e4c6dd87f73 | 
    
| IEDL.DBID | UNPAY | 
    
| ISSN | 2522-9818 2524-2296  | 
    
| IngestDate | Thu Oct 09 05:42:44 EDT 2025 Thu Oct 09 00:15:02 EDT 2025  | 
    
| IsDoiOpenAccess | true | 
    
| IsOpenAccess | true | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Issue | 3(33) | 
    
| Language | English | 
    
| License | http://creativecommons.org/licenses/by-nc-sa/4.0 cc-by-nc-sa  | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-c936-6a11733734a8683f3c7fcbbf14c031d03566d43da75c7ac78c4297e4c6dd87f73 | 
    
| ORCID | 0000-0002-9017-9635 0009-0005-6916-8252 0000-0003-4068-4729 0000-0002-1856-1186 0009-0001-0440-9810 0000-0002-2115-7029  | 
    
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://journals.uran.ua/itssi/article/download/340566/328544 | 
    
| PageCount | 14 | 
    
| ParticipantIDs | unpaywall_primary_10_30837_2522_9818_2025_3_166 crossref_primary_10_30837_2522_9818_2025_3_166  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2025-09-25 | 
    
| PublicationDateYYYYMMDD | 2025-09-25 | 
    
| PublicationDate_xml | – month: 09 year: 2025 text: 2025-09-25 day: 25  | 
    
| PublicationDecade | 2020 | 
    
| PublicationTitle | Sučasnij stan naukovih doslìdženʹ ta tehnologìj v promislovostì (Online) | 
    
| PublicationYear | 2025 | 
    
| SSID | ssj0002876021 ssib044762074 ssib036251356  | 
    
| Score | 2.3066337 | 
    
| Snippet | The subject of the study is information security risk management in a modern digital environment, where the integration of strategic and tactical approaches is... | 
    
| SourceID | unpaywall crossref  | 
    
| SourceType | Open Access Repository Index Database  | 
    
| StartPage | 166 | 
    
| Title | Integrated information security risk management model based on ahp and bayesian networks | 
    
| URI | https://journals.uran.ua/itssi/article/download/340566/328544 | 
    
| UnpaywallVersion | publishedVersion | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: Directory of Open Access Journals - DOAJ (NTUSG) customDbUrl: eissn: 2524-2296 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002876021 issn: 2524-2296 databaseCode: DOA dateStart: 20170101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2524-2296 dateEnd: 99991231 omitProxy: true ssIdentifier: ssib044762074 issn: 2522-9818 databaseCode: M~E dateStart: 20170101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PS8MwFA66gZ78LU505OC1P5Mm6XGIYwoODxvMU0mTFMXZDdsi86_3pe2meFJvpeRBm--R9177ve8hdBXzVGQ6Fo40GRQo2o8c-zPMEVpw6WsqY2abk-_HbDSld7No1nJzbC9Mu4OFW8FR7VbSey7BN7x2Gz1tFeQXUnsEEg3GPGIbAOk26rIIUvEO6k7HD4NHO1AO8gonFvX3PbimThjGrOngIZB1cG-zAGrEMHKJG9RCiV-xabfKl3L1LufzbwFnuN9MVS1qnULLM3lxqzJ11ccPFcd_v8sB2mtTUTxoFh6iLZMfoZ01E_4YzW7XUhIat_qqFkVctCPvsKWl49cNfwbXU3WwjYsawzr5tMQy13BjZWyrJs4bynlxgibDm8n1yGkHMTgqJsxhMgg4IZxQKZggGVE8U2maBVTBkaB9Ak-vKdGSR4pLxYWCIMcNVUwD4hknp6iTL3JzhnCYRiqQEZgbQ0XE4ywFzzA6o35KjAx7yF0jkCwbuY0EypQassRClljIEgtZQhKArIe8DU6_szj_s8UF6pRvlbmE7KNM-3XV3m897RMXStgW | 
    
| linkProvider | Unpaywall | 
    
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEF60BT35Fisqe_Ca5252N8cilipYPLRQT2FfQVHTYhOk_npnk7SKJ_UWwg4k-w073yQz3yB0mXIlcpMKT9ocEhQTJp77GeYJI7gMDZUpc83JdyM2nNDbaTJta3NcL0y7gwu_gqPar2TwVIJvBO02BsYpyM-kCQgQDcYC4hoA6SbqsgSoeAd1J6P7_oMbKAe8wktF_X0PrqkXxylrOngIsA4erBdAjhgnPvGjWijxKzZtV8VcLt_ly8u3gDPYbaaqLmqdQldn8uxXpfL1xw8Vx3-_yx7aaako7jcL99GGLQ7Q1qoS_hBNb1ZSEga3-qoORbxoR95hV5aOX9f1M7ieqoNdXDQY1snHOZaFgRtL61o1cdGUnC-O0HhwPb4aeu0gBk-nhHlMRhEnhBMqBRMkJ5rnWqk8ohqOBBMSeHpDiZE80VxqLjQEOW6pZgYQzzk5Rp1iVtgThGOV6EgmYG4tFQlPcwWeYU1OQ0WsjHvIXyGQzRu5jQzSlBqyzEGWOcgyB1lGMoCsh4I1Tr-zOP2zxRnqlG-VPQf2UaqL1sc-AQxG1yE | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Integrated+information+security+risk+management+model+based+on+ahp+and+bayesian+networks&rft.jtitle=Su%C4%8Dasnij+stan+naukovih+dosl%C3%ACd%C5%BEen%CA%B9+ta+tehnolog%C3%ACj+v+promislovost%C3%AC+%28Online%29&rft.au=Timoshyn%2C+Anatolii&rft.au=Kalienichenko%2C+Lidia&rft.au=Gnusov%2C+Yurii&rft.au=Khavina%2C+Inna&rft.date=2025-09-25&rft.issn=2522-9818&rft.eissn=2524-2296&rft.issue=3%2833%29&rft.spage=166&rft.epage=179&rft_id=info:doi/10.30837%2F2522-9818.2025.3.166&rft.externalDBID=n%2Fa&rft.externalDocID=10_30837_2522_9818_2025_3_166 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2522-9818&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2522-9818&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2522-9818&client=summon |