Main Article Content

Andi Zulherry

Abstract

In an increasingly complex digital era, network security has become a crucial aspect in maintaining data integrity, confidentiality, and availability. Effective decision-making methods to select the right network security solution are becoming increasingly important. This article describes the application of the Simple Additive Weighting (SAW) method as a support tool in the context of decision-making for network security. In the presented case study, three network security solutions are evaluated based on four important criteria: data encryption level, threat detection, access management, and network performance. The SAW method is used to assign weights to each criterion and generate a ranking of solutions based on the final score. The results show that SAW provides a clear and structured view of the network security solution that best fits the user's needs and priorities. The conclusion of this research is that the SAW method can be used as a useful tool in making informed decisions in the context of network security. SAW allows organizations to adjust their priorities by setting the appropriate criteria weights, thus enabling the selection of solutions that are best suited to the unique needs of each organization. In an era of ever-evolving cyber threats, the ability to make effective decisions in the face of security challenges is becoming increasingly important, and the SAW method can be a valuable tool in achieving that goal.

Downloads

Download data is not yet available.

Article Details

How to Cite
Zulherry, A. . (2023). Decision making for network security with simple additive weighting method. Journal of Intelligent Decision Support System (IDSS), 6(3), 155-159. https://doi.org/10.35335/idss.v6i3.162
References
Alizadeh, R., Soltanisehat, L., Lund, P. D., & Zamanisabzi, H. (2020). Improving renewable energy policy planning and decision-making through a hybrid MCDM method. Energy Policy, 137, 111174.
Bian, T., Xiao, X., Xu, T., Zhao, P., Huang, W., Rong, Y., & Huang, J. (2020). Rumor detection on social media with bi-directional graph convolutional networks. Proceedings of the AAAI Conference on Artificial Intelligence, 34(01), 549–556.
Büyüközkan, G., & Güler, M. (2020). Smart watch evaluation with integrated hesitant fuzzy linguistic SAW-ARAS technique. Measurement, 153, 107353.
He, W., Zhang, Z. J., & Li, W. (2021). Information technology solutions, challenges, and suggestions for tackling the COVID-19 pandemic. International Journal of Information Management, 57, 102287.
Indriyanti, A. D., Prehanto, D. R., Prismana, I., Sujatmiko, B., & Fikandda, J. (2019). Simple Additive Weighting algorithm to aid administrator decision making of the underprivileged scholarship. Journal of Physics: Conference Series, 1402(6), 66070.
Irawan, Y. (2020). Decision support system for employee bonus determination with web-based simple additive weighting (SAW) method in PT. Mayatama Solusindo. Journal of Applied Engineering and Technological Science (JAETS), 2(1), 7–13.
Kiradoo, G. (2023). Exploring the Opportunities and Challenges for Entrepreneurs in Industry 4.0. Current Topics on Business, Economics and Finance, 2, 180–196.
Lallie, H. S., Shepherd, L. A., Nurse, J. R. C., Erola, A., Epiphaniou, G., Maple, C., & Bellekens, X. (2021). Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers & Security, 105, 102248.
Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, 7, 8176–8186.
Mahendra, G. S., Wali, M., Idwan, H., Listartha, I. M. E., Yuliastuti, G. E., Sasongko, D., & Saskara, G. A. J. (2022). Keamanan Komputer’. Galiono Digdaya.
Makhdoom, I., Zhou, I., Abolhasan, M., Lipman, J., & Ni, W. (2020). PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities. Computers & Security, 88, 101653.
Muljani, N., & Ellitan, L. (2019). The importance of information technology implementation in facing industrial revolution 4.0: Case study of banking industry. International Journal of Trend in Scientific Research and Development (IJTSRD), 4(1), 409–413.
Munaroh, L., Amrozi, Y., & Nurdian, R. A. (2021). Pengukuran Risiko Keamanan Aset TI Menggunakan Metode FMEA dan Standar ISO/IEC 27001: 2013. Technomedia Journal, 5(2 Februari), 167–181.
Namany, S., Al-Ansari, T., & Govindan, R. (2019). Sustainable energy, water and food nexus systems: A focused review of decision-making tools for efficient resource management and governance. Journal of Cleaner Production, 225, 610–626.
Omolara, A. E., Alabdulatif, A., Abiodun, O. I., Alawida, M., Alabdulatif, A., & Arshad, H. (2022). The internet of things security: A survey encompassing unexplored areas and new insights. Computers & Security, 112, 102494.
Prinsloo, J., Sinha, S., & von Solms, B. (2019). A review of industry 4.0 manufacturing process security risks. Applied Sciences, 9(23), 5105.
Rathee, G., Ahmad, F., Iqbal, R., & Mukherjee, M. (2020). Cognitive automation for smart decision-making in industrial internet of things. IEEE Transactions on Industrial Informatics, 17(3), 2152–2159.
Rathee, G., Garg, S., Kaddoum, G., & Choi, B. J. (2020). Decision-making model for securing IoT devices in smart industries. IEEE Transactions on Industrial Informatics, 17(6), 4270–4278.
Sadiku, M. N. O., Fagbohungbe, O. I., & Musa, S. M. (2020). Artificial intelligence in cyber security. International Journal of Engineering Research and Advanced Technology, 6(05), 1–7.
Siksnelyte-Butkiene, I., Zavadskas, E. K., & Streimikiene, D. (2020). Multi-criteria decision-making (MCDM) for the assessment of renewable energy technologies in a household: A review. Energies, 13(5), 1164.
Tabrizchi, H., & Kuchaki Rafsanjani, M. (2020). A survey on security challenges in cloud computing: issues, threats, and solutions. The Journal of Supercomputing, 76(12), 9493–9532.
Tawalbeh, L., Muheidat, F., Tawalbeh, M., & Quwaider, M. (2020). IoT Privacy and security: Challenges and solutions. Applied Sciences, 10(12), 4102.
Yohaness, F. (2020). Analisa Dan Perancangan Keamanan Jaringan Lokal Menggunakan Security Onion Dan Mikrotik. Journal of Information System and Technology (JOINT), 1(2), 37–61.