Taguchi’s Experimental Design Model Inspired IT Infrastructure Security Risk Assessment Methodology
Erkan Yalcinkaya1, Daniel T. Semere2, Antonio Maffei3, Mauro Onori4
1Erkan Yalcinkaya*, Department of Production Engineering, Royal Institute of Technology, Stockholm, Sweden.
2Daniel T. Semere, Department of Production Engineering, Royal Institute of Technology, Stockholm, Sweden.
3Antonio Maffei, Department of Production Engineering, Royal Institute of Technology, Stockholm, Sweden.
4Mauro Onori, Department of Production Engineering, Royal Institute of Technology, Stockholm, Sweden.
Manuscript received on October 12, 2019. | Revised Manuscript received on 22 October, 2019. | Manuscript published on November 10, 2019. | PP: 1496-1501 | Volume-9 Issue-1, November 2019. | Retrieval Number: A4315119119/2019©BEIESP | DOI: 10.35940/ijitee.A4315.119119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Taguchi’s experimental design model is extensively applied by the manufacturing and production industries to systematically simulate different system states through altering controllable and uncontrollable variables to ensure system reliability and robustness. Managing an IT infrastructure complexity in a systematic way to assess the risks is a major challenge. This research paper proposes a novel IT infrastructure security risk assessment methodology inspired by the Taguchi’s experimental design model. The proposed methodology is capable of rating and ranking impact of controllable and uncontrollable infrastructure parameters in the form of threats against the system. The result of the assessment is fed into a mitigation process where the system is hardened by eliminating the highest ranking risks.
Keywords: Taguchi’s Experimental Design Model, Cybersecurity, risk Assessment, System Hardening
Scope of the Article: Cyber Security