Research Article

A Grey Theory Based Approach to Big Data Risk Management Using FMEA

Table 11

The degree of grey relation for each failure mode and each dimension and the final rank.

DimensionsAssociated activities Degree of grey relation Degree of grey relation (dimension)Risk ranking

A1: Identification and access managementA1.1: Loss of secret keys 0.6130950.6193123
A1.2: Cryptanalysis of a ciphered signal0.654762
A1.3: Secret password divulged to any other user0.708333
A1.4: Intentional access to network services, for example, proxy servers0.560185
A1.5: Spoofing: impersonation of a legitimate user0.560185

A2: Device and application registrationA2.1: Facility problems0.5265150.5886482
A2.2: Failure of encryption equipment0.532407
A2.3: Unauthorized use of secure equipment0.631614
A2.4: Ineffective infrastructure investment0.597944
A2.5: Failure of application server0.654762

A3: Infrastructure managementA3.1: Cabling problems0.6316140.7127434
A3.2: Failure of radio platform transmission0.710317
A3.3: Failure of cipher audio (telephone) and video0.738095
A3.4: Failure of sensor networks0.708333
A3.5: Failure of potential of energy0.833333
A3.6: Unauthorized readout of data stored on a remote LAN0.654762

A4: Data governanceA4.1: Failure of interpretation and analysis of data0.4987370.509651
A4.2: Failure of audit review of implemented policies and information security 0.528499
A4.3: Failure to maximize new business value0.526515
A4.4: Failure of real-time demand forecasts0.484848