Research Article

A Cooperative Model for IS Security Risk Management in Distributed Environment

Table 3

BN information of S1.

Node IDNode nameState spaceParent nodesChildren nodes

S1_1Communication secrecy High; medium; low S1_6
S1_2Audit logging Secure; average; insecure S1_6
S1_3Network access control Effective; average; ineffective S1_5
S1_4Network security audit Comprehensive; incomprehensive S1_5
S1_5Network security High; medium; low S1_3, S1_4 S1_7
S1_6Communication security High; medium; low S1_1, S1_2 S1_7
S1_7S1 threat level 0; 1; 2; 3; 4; 5 S1_5, S1_6