Research Article

A Grey Theory Based Approach to Big Data Risk Management Using FMEA

Table 9

Difference between comparative series and standard series.

DimensionsAssociated activities OSD

A1: Identification and access managementA1.1: Loss of secret keys463
A1.2: Cryptanalysis of a ciphered signal443
A1.3: Secret password divulged to any other user164
A1.4: Intentional access to network services, for example, proxy servers546
A1.5: Spoofing: impersonation of a legitimate user546

A2: Device and application registrationA2.1: Facility problems764
A2.2: Failure of encryption equipment534
A2.3: Unauthorized use of secure equipment543
A2.4: Ineffective infrastructure investment743
A2.5: Failure of application server434

A3: Infrastructure managementA3.1: Cabling problems543
A3.2: Failure of radio platform transmission183
A3.3: Failure of cipher audio (telephone) and video163
A3.4: Failure of sensor networks461
A3.5: Failure of potential of energy161
A3.6: Unauthorized readout of data stored on a remote LAN443

A4: Data governanceA4.1: Failure of interpretation and analysis of data784
A4.2: Failure of audit review of implemented policies and information security783
A4.3: Failure to maximize new business value764
A4.4: Failure of real-time demand forecasts766