From: Fog computing network security based on resources management
Risk factor | Weight | Risk factor | Weight |
---|---|---|---|
Characteristics of Requester | 20 | Characteristics of The Information Requested | 20 |
Role | 5 | Classification Level | 5 |
Rank | 5 | Encryption Level | 5 |
Clearance Level | 5 | Network Classification Level | 5 |
Education Level | 5 | Permission Level | 5 |
Characteristics of IT Components | 20 | Situational Factors | 20 |
Machine Type | 3.3 | Specific Mission Role | 3.3 |
Application | 3.3 | Time Sensitivity of Inf | 3.3 |
Connection Type | 3.3 | Transaction Type | 3.3 |
Authentication Type | 3.3 | Current Location | 3.3 |
Network | 3.3 | Threat Level | 3.3 |
Distance between requester and source | 3.3 | Physical location of the requester | 3.3 |
Heuristics | 20 | ||
Risk Knowledge | 5 | ||
Trust Level | 5 | ||
Previous Violations | 5 | ||
Previous Access | 5 |