Research Article
A Cooperative Model for IS Security Risk Management in Distributed Environment
Table 3
BN information of S1.
| Node ID | Node name | State space | Parent nodes | Children nodes |
| S1_1 | Communication secrecy | High; medium; low | | S1_6 | S1_2 | Audit logging | Secure; average; insecure | | S1_6 | S1_3 | Network access control | Effective; average; ineffective | | S1_5 | S1_4 | Network security audit | Comprehensive; incomprehensive | | S1_5 | S1_5 | Network security | High; medium; low | S1_3, S1_4 | S1_7 | S1_6 | Communication security | High; medium; low | S1_1, S1_2 | S1_7 | S1_7 | S1 threat level | 0; 1; 2; 3; 4; 5 | S1_5, S1_6 | |
|
|