<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Fuzzy cognitive mapping as a scenario approach for information security risk analysis ⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Svitlana Shevchenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yuliia Zhdanova</string-name>
          <email>y.zhdanova@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olha Kryvytska</string-name>
          <email>olha.kryvytska@oa.edu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Halyna Shevchenko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>аnd Svitlana Spasiteleva</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv Metropolitan University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., 04053 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>CPITS-II 2024: Workshop on Cybersecurity Providing in Information and Telecommunication Systems II</institution>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>National University of Ostroh Academy</institution>
          ,
          <addr-line>2 Seminarska str., 35800 Ostroh</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>356</fpage>
      <lpage>362</lpage>
      <abstract>
        <p>To avoid damaging their reputation in the field of information and cyber security, companies tend to keep incidents and attacks that affect their operations under wraps. Insufficient information prevents a more accurate risk assessment; as statistical analysis requires a large volume of historical data. Thus, a quantitative-qualitative approach to risk analysis in cybersecurity, particularly scenario analysis, is most commonly applied. The scenario approach to information security risk assessment is a powerful tool for proactive information protection. Forecasting potential consequences, rather than responding to them, allows companies to avoid significant and unnecessary costs. Scenario analysis enables the modeling of various cyberattack situations, risk assessment, and management of information security risks. This research is dedicated to the application of the “What-if” scenario analysis method for assessing information security risks. The paper presents a detailed description of this methodology and the stages of the process. The advantages and disadvantages of the scenario approach and its potential use in information security risk management are identified. The scenarios are modeled using fuzzy cognitive maps. An influence matrix was developed, and the key concepts were calculated. Potential scenarios were generated using the Mental Modeler software tool.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;information security risk</kwd>
        <kwd>information security system</kwd>
        <kwd>cybersystem</kwd>
        <kwd>cyber risk</kwd>
        <kwd>cognitive modeling</kwd>
        <kwd>scenario analysis</kwd>
        <kwd>fuzzy cognitive map 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Information in today’s world has become one of the most
valuable assets of an enterprise. Its loss, leakage, or
destruction can lead to negative consequences for the
organization, ranging from financial losses to reputational
damage, potentially even resulting in bankruptcy.
Cybercriminals, who continually develop and refine
increasingly sophisticated attack methods, often count on
such outcomes. Organizations frequently do not know
where an attack may come from or even if it is happening.
Just one asset vulnerability can grant an attacker access to
the entire company’s information assets. Therefore,
information protection is a priority task for every
organization.</p>
      <p>
        A sufficient number of methodologies dedicated to
information protection systems have been developed, but
this field cannot remain static. Therefore, the improvement
of methods and the development of new ones remain and
will continue to be a relevant issue. At present, a risk-based
approach is highlighted as a key system for information
protection [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Implementing it allows for the following:
●
●
●
●
●
      </p>
      <p>Timely identification of potential vulnerabilities in
the information system and the development of
effective protection measures in advance.</p>
      <p>Focusing efforts and resources on the most
valuable and critically important assets through
the prioritization of risks, starting with the highest
ones.</p>
      <p>Avoiding unnecessary expenses by identifying
appropriate means of information protection.</p>
      <p>Ensuring maximum compliance with the
necessary legal requirements in the information
and cybersecurity system.</p>
      <p>Enhancing the company’s reputation strategies
and customer trust by ensuring a high level of
confidentiality and integrity of their data.</p>
      <p>The complexity and multifaceted nature of the elements in
the information and cybersecurity system complicates the
process of predicting information protection needs. A
productive and effective method for research and
forecasting in this area is modeling possible situations and
consequences. This approach allows for the analysis of
potential threats, risk assessment, and the development of
effective protection strategies. Numerous studies in this
field support this claim.</p>
      <p>
        In the scientific work [2], researchers propose a model
for information security risk assessment based on decision
theory, fuzzy logic, and fault tree analysis. In the study [3],
a cognitive model is described, which enables the
investigation of the impact of potential threats on the
security level of a critical infrastructure object, and scenario
modeling of this impact is conducted. A risk-based approach
in the cybersecurity protection system is described in [4],
where the model of decision-making delays in information
protection and its effect on security risks is explored using
logistic equations and Hutchinson’s equation.
“Attackerdefender” situations are modeled using cognitive modeling in
[5]. The adaptation of SWOT analysis for assessing
information and cybersecurity risks is carried out in scientific
articles [
        <xref ref-type="bibr" rid="ref6">6, 7</xref>
        ]. The authors of [
        <xref ref-type="bibr" rid="ref7">8</xref>
        ] present a method for
assessing information security risks based on scenarios
involving advanced persistent threat attacks. The researchers
build risk scenarios for high-level vulnerabilities, analyze the
likelihood of each risk, and make decisions regarding both
technical and business risks. In the study [
        <xref ref-type="bibr" rid="ref8">9</xref>
        ], a model of
cognitive maps for information security risks is presented in
a static form as an oriented graph, with further selection of
methods for handling these risks.
      </p>
      <p>
        Thus, experts’ interest in information security risk
management promotes the introduction of mathematical
methods in this field [
        <xref ref-type="bibr" rid="ref10 ref9">10, 11</xref>
        ]. We agree with the authors
who consider cognitive modeling appropriate for use in
information protection systems, as risk assessment is
characterized by a high degree of uncertainty, difficulty in
strict formalization, and subjective nature.
      </p>
      <p>
        Cognitive modeling, as researchers argue in [5], is an
invaluable tool for identifying vulnerabilities in security
systems and developing measures to eliminate them. It
provides decision-makers with a valuable tool for analyzing
different scenarios and making informed decisions. The
complexity of applying this method requires practical
developments and the use of information and
communication technologies. The above allows us to
highlight the goal of this paper—to study the application of
fuzzy cognitive maps in constructing various dynamic
scenarios using the Mental Modeler software.
2. Cognitive modeling: Fuzzy
cognitive map and execution
stages
Cognitive modeling is based on the construction of a fuzzy
cognitive map, which is an oriented graph where the
vertices (concepts) represent system variables, and the
weighted edges reflect the strength of one concept’s
influence on another [
        <xref ref-type="bibr" rid="ref11">12</xref>
        ]. As is known, Kosko’s fuzzy
cognitive map is a weighted directed graph in which the
weights on the edges have values within the range of [-1; 1],
thus determining the level of influence one factor (concept)
has on another. Using a cognitive map, both static and
dynamic analyses can be performed (see Fig. 1).
3. Scenario modeling based on
cognitive modeling
3.1. Task formulation
1. Define the Structure of the Fuzzy Cognitive Map [
        <xref ref-type="bibr" rid="ref7">8</xref>
        ].
2. Let represent a directed graph,  ̅ =
{ ,  ,  },wherе  = { }—is the set of factors
(concepts); in our case, this is the set of possible
threats to a specific information asset,
vulnerabilities that the threat can exploit, and the
possible consequences of threat realization;  =
{ } is the set of edges representing causal
relationships between factors.
3.  = { } is the set of edge weights (strength of
influence). In our case,  =  =   , 0 ≤  ≤
1, where  being the risk level,  is the
probability of each threat’s realization;  is the
probability of corresponding losses. These values
are calculated based on expert assessments and
using SWOT analysis.
4. Characterize the Strength of Influence Between
      </p>
      <p>
        Each Pair of Concepts.
5. This is done using the risk level and qualitative
expert evaluations. Experts assess the likelihood
of each threat and the impact it would have on the
information asset, which contributes to
determining the strength of influence between
concepts.
6. Build the Model.
7. Construct a weighted directed graph based on the
fuzzy cognitive map for evaluating information
security risks. Each edge in the graph is assigned
a weight corresponding to the calculated risk
level, thus representing the impact one concept
(e.g., a threat or vulnerability) has on another.
8. Identify Critical Risks.
9. Identify the risks with the highest degree of
influence, as they pose the greatest threat. These
critical risks should be the focus of the analysis
and security measures.
10. Model Scenarios.
11. Using the Mental Modeler software, simulate
scenarios to analyze the impact of the most
significant concepts. This enables the exploration
of how different risk factors interact and affect the
overall security posture of the information asset.
3.2. Building the fuzzy cognitive map as a
graph and matrix
Once the structure is defined, construct the fuzzy cognitive
map as a weighted directed graph. Each node represents a
concept (such as a threat or vulnerability), and the edges
between them represent the causal relationships. The
weights on the edges quantify the strength of these
relationships. Additionally, the graph can be represented as
an adjacency matrix, where each element denotes the
weight of the edge from concept to concept. This matrix
form is useful for further analysis, including determining
the most influential nodes (critical risks) and simulating the
dynamic behavior of the system under different scenarios.
Building a Fuzzy Cognitive Map is a flexible process that can
involve various numbers of participants and utilize different
information sources. One person may create a map based on
personal experience, while a group of experts can develop it
based on data collected from the organization or obtained
through surveys. Additionally, all participants can be
involved in the process to achieve a more objective picture.
In our research, we propose using SWOT analysis to
identify the system and influence weights during a
brainstorming session, following the methods described in
studies [
        <xref ref-type="bibr" rid="ref6 ref8">6, 7, 9</xref>
        ].
      </p>
      <p>As a sample, we will highlight an information asset,
such as the organization’s database, and conduct the
identification of threats and vulnerabilities associated with
this asset (see Table 1).</p>
      <p>Availability</p>
      <p>Vulnerability
Database protection
is missing
Weak
cryptographic
protection
Uninterruptible
power supply
systems are missing
The system for
regular data backup
is absent</p>
      <p>Threat
Physical damage
to databases
(intentional or
unintentional)
Theft and data
falsification
Equipment failure
and loss of
unsaved data
Data loss</p>
      <p>Integrity</p>
      <p>Vulnerability
Database protection
is missing</p>
      <p>Threat
Physical damage to
databases (intentional
or unintentional)
Weak passwords for
data access</p>
      <p>Theft and data
falsification
Absence of access
rights segmentation
The system for
regular data backup
is absent</p>
      <p>Modification of data
(intentional or
unintentional)
Data loss</p>
      <p>Confidentiality
Vulnerability Threat
Database Unauthorized
protection is access (direct
missing and remote
Weak
cryptographic
protection
Two-factor
authentication
is absent
Absence of
access rights
segmentation</p>
      <p>Theft and data
falsification
Unauthorized
access (direct
and remote)
Unauthorized
access (direct
and remote)
Let’s define the following concepts:
●
●
●
●
●
●
●
●
●
●
●
●
●
С1 is physical damage to databases (intentional and
unintentional)
С2 is data theft and falsification
С3
is
data
modification
(intentional
and
unintentional)
С4 is unauthorized access (direct and remote)
С5 is equipment failure and loss of unsaved data
С7 is lack of a regular data backup system
С8 is weak passwords for data access
С9 is lack of uninterruptible power supplies
С10 is lack of two-factor authentication
С11 is lack of database protection
С12 is lack of access rights segregation
С13 is weak cryptographic protection.</p>
      <p>To determine the risk level for each factor (Table 2), we
will apply the formula 
=  =   , 0 ≤ 
≤ 1, where
 is the risk level, 
is the probability of each threat
lead to changes in others.
occurring;  is the probability of the corresponding losses.
Determination of the degree of risk for each factor</p>
      <p>
        The fuzzy cognitive map modeling will be carried out
using the software Mental Modeler [
        <xref ref-type="bibr" rid="ref12">13</xref>
        ]. Fig. 3 shows the
cause-and-effect relationships between the system elements
(concepts), demonstrating how changes in one element can
As a characteristic of the cognitive map, researchers suggest
It is evident that the more connections there are, the higher
calculating its density (clustering coefficient) using the
the density, and therefore, the greater the potential for
following formula:
number of concepts.
      </p>
      <p>Thus,
where n is the total number of connections, N is the total
 =</p>
      <p>,


22
13
 =
= 0,13.
changes. In our case, the density is moderate. This is
reasonable due to the selection of a small number of factors
(threats and vulnerabilities).</p>
      <p>For the systematic analysis of the fuzzy cognitive map,
we use the
matrix</p>
      <p>method. This method allows for
formalizing knowledge about the system and identifying
patterns in its functioning. The results are presented in
To assess the properties of a fuzzy cognitive map, we use
the formal apparatus of graph theory, specifically the
transitive closure operation, which allows us to build a
complete graph of interactions between concepts and
calculate various indicators based on it: consonance,
dissonance, and the impact of concepts on risk assessment.
The results are presented in Fig. 5.
A static analysis for this process has been modeled. By
comparing the obtained risk level with the benchmark
outlined in the organization’s Security Policy, the
information security officer decides on risk treatment: to
minimize, transfer, mitigate, or accept the risks. At the next
stage, various scenario modeling is conducted depending on
the measures chosen by the company’s management.
3.3. Scenario building based on concept
changes
The results of the previous matrix indicate that the most
significant concepts, i.e., those with the greatest impact on
the system, are:</p>
      <p>С3 is threat: Data modification (intentional or
unintentional).</p>
      <p>С8 is vulnerability: Weak passwords for data access.</p>
      <p>Let’s model situations when these respective values
change.</p>
      <p>Situation 1.</p>
      <p>The risk of data modification С3 will have a nearly
maximum value if the risk level associated with the
vulnerability of weak passwords for data access increases by
0.01 (Fig. 6).</p>
      <sec id="sec-1-1">
        <title>Situation 2.</title>
        <p>The risk of data modification С3 and unauthorized
access (both direct and remote) С4 will have a nearly
maximum value if the risk level associated with the
vulnerability of weak passwords for data access increases by
0.02 (Fig. 7).</p>
      </sec>
      <sec id="sec-1-2">
        <title>Scenario 3.</title>
        <p>The risk of data modification С3 and data theft and
falsification С2 will reach near-maximum levels if the risk
associated with vulnerabilities such as weak passwords for
data access increases by 0.02 (Fig. 8).
Thus, the use of fuzzy cognitive maps allows for the
identification of key concepts that influence system
behavior. Through cognitive modeling, it is possible to
explore how changes in the values of these factors will affect
other system elements. This enables the development of
various event scenarios and the evaluation of their
consequences. However, one limitation is that cognitive
maps are tools for visualizing and structuring expert
knowledge but do not replace objective data. They reflect
the subjective understanding of experts about the system
and can serve as a basis for further analysis. Nevertheless,
for effective use of cognitive maps, it is necessary to apply
more specialized software that includes a threat library,
their sources, a set of asset vulnerabilities, and other tools
that allow automating routine operations and providing a
more accurate information security risk analysis.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>4. Conclusions</title>
      <p>The proposed methodological approach to information and
cyber security risk management through scenario analysis,
represented by fuzzy cognitive mapping, enables the
identification of key indicators that determine system
behavior, the influence of various factors and concepts on
the system as a whole, and the identification of the highest
risks and priorities for developing measures to ensure
confidentiality, integrity, and availability of information.</p>
      <p>This approach provides the ability to construct event
development scenarios, which supports informed
managerial decision-making.</p>
      <p>The research results will be useful for information
security professionals, managers responsible for data
protection, as well as students studying disciplines related
to risk management in the field of security.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <source>[1] [2] [3] [4] [5]</source>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          , et al.,
          <source>Protection of Information in Telecommunication Medical Systems based on a RiskOriented Approach</source>
          , in: Workshop on Cybersecurity Providing in
          <source>Information and Telecommunication Systems</source>
          , vol.
          <volume>3421</volume>
          (
          <year>2023</year>
          )
          <fpage>158</fpage>
          -
          <lpage>167</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Gusmão</surname>
          </string-name>
          , et al.,
          <article-title>Cybersecurity Risk Analysis Model Using Fault Tree Analysis and Fuzzy Decision Theory, Int</article-title>
          .
          <source>J. Inf. Manag</source>
          .
          <volume>43</volume>
          (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .1016/j.ijinfomgt.
          <year>2018</year>
          .
          <volume>08</volume>
          .008.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>O.</given-names>
            <surname>Saliyeva</surname>
          </string-name>
          , Yu. Yaremchuk,
          <article-title>Cognitive Model for Researching the Level of Security of a Critical Infrastructure Object</article-title>
          ,
          <source>Security of Information</source>
          ,
          <volume>26</volume>
          (
          <issue>2</issue>
          ) (
          <year>2020</year>
          )
          <fpage>64</fpage>
          -
          <lpage>73</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>V.</given-names>
            <surname>Kononovich</surname>
          </string-name>
          , et al.,
          <source>Influence of Delays Decision Action for Information Protection on Information Security Risks</source>
          ,
          <source>Ukrainian Sci. J. Inf. Secur</source>
          .
          <volume>20</volume>
          (
          <issue>1</issue>
          ) (
          <year>2014</year>
          )
          <fpage>83</fpage>
          -
          <lpage>91</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>V.</given-names>
            <surname>Veksler</surname>
          </string-name>
          , et al.,
          <source>Cognitive Models in Cybersecurity: Learning from Expert Analysts and Predicting Attacker Behavior</source>
          , Frontiers in Psychology,
          <volume>11</volume>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhdanovа</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Kravchuk</surname>
          </string-name>
          ,
          <article-title>Information Protection Model based on Information Security Risk Assessment for Small</article-title>
          and
          <string-name>
            <surname>Medium-Sized</surname>
            <given-names>Business</given-names>
          </string-name>
          ,
          <source>Cybersecur. Educ. Sci. Tech</source>
          .
          <volume>2</volume>
          (
          <issue>14</issue>
          ) (
          <year>2021</year>
          )
          <fpage>158</fpage>
          -
          <lpage>175</lpage>
          . URL: doi: 10.28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2021</year>
          .
          <volume>14</volume>
          .158175.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>X.</given-names>
            <surname>Ban</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Tong</surname>
          </string-name>
          ,
          <article-title>A Scenario-based Information Security Risk Evaluation Method, Int</article-title>
          .
          <source>J. Secur. Appl</source>
          .
          <volume>8</volume>
          (
          <year>2014</year>
          )
          <fpage>21</fpage>
          -
          <lpage>30</lpage>
          . doi:
          <volume>10</volume>
          .14257/ijsia.
          <year>2014</year>
          .
          <volume>8</volume>
          .5.03.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          , et al.,
          <source>Information Security Risk Management using Cognitive Modeling, in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3550</volume>
          (
          <year>2023</year>
          )
          <fpage>297</fpage>
          -
          <lpage>305</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Zybin</surname>
          </string-name>
          , et al.,
          <article-title>Approach of the Attack Analysis to Reduce Omissions in the Risk Management</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems, CPITS</source>
          , vol.
          <volume>2923</volume>
          (
          <year>2021</year>
          )
          <fpage>318</fpage>
          -
          <lpage>328</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>D.</given-names>
            <surname>Berestov</surname>
          </string-name>
          , et al.,
          <article-title>Synthesis of the System of Iterative Dynamic Risk Assessment of Information Security</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems II, CPITS-II-2</source>
          , vol.
          <volume>3188</volume>
          (
          <year>2021</year>
          )
          <fpage>135</fpage>
          -
          <lpage>148</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>B.</given-names>
            <surname>Kosko</surname>
          </string-name>
          , Fuzzy Cognitive Maps,
          <source>Int. J. Man-Machine Studies</source>
          ,
          <volume>24</volume>
          (
          <year>1986</year>
          )
          <fpage>65</fpage>
          -
          <lpage>75</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Gray</surname>
          </string-name>
          , et al.,
          <article-title>Using Fuzzy Cognitive Mapping as a Participatory Approach to Analyze Change, Preferred States, and Perceived Resilience of Social-Ecological Systems</article-title>
          ,
          <source>Ecology and Society</source>
          ,
          <volume>20</volume>
          (
          <issue>2</issue>
          ) (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>