Skip to main content

Table 2 Risk factors and associated weights

From: Fog computing network security based on resources management

Risk factor

Weight

Risk factor

Weight

Characteristics of Requester

20

Characteristics of The Information Requested

20

Role

5

Classification Level

5

Rank

5

Encryption Level

5

Clearance Level

5

Network Classification Level

5

Education Level

5

Permission Level

5

Characteristics of IT Components

20

Situational Factors

20

Machine Type

3.3

Specific Mission Role

3.3

Application

3.3

Time Sensitivity of Inf

3.3

Connection Type

3.3

Transaction Type

3.3

Authentication Type

3.3

Current Location

3.3

Network

3.3

Threat Level

3.3

Distance between requester and source

3.3

Physical location of the requester

3.3

Heuristics

20

  

Risk Knowledge

5

  

Trust Level

5

  

Previous Violations

5

  

Previous Access

5