Research of Information System Security Risk Management based on Probability Model and Security Entropy

被引:0
|
作者
Du, Jiawei [1 ]
Zhou, Ying [1 ]
Guo, Ronghua [1 ]
Zhang, Xing [1 ]
Suo, Guowei [1 ]
机构
[1] Luoyang Elect Equipment Test Ctr, Luoyang 471003, Peoples R China
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nowadays, there is a big challenge on the security risk of information system with the rapid development of network. Computer viruses have brought great intimidation on information systems, which made the loss of worldwide information security moving up. Therefore, more and more people focus on the security problem of information systems, which need our appropriate protection. At first, the principle approach from security risk identification to risk management is proposed. Secondly, an information system security risk management algorithm based on probability model and security entropy is described in detail. Thirdly, a particular system is selected as the example. The whole risk of information system security is modelled and computed according to the risk management computing formula. In accordance with the example, the applicability and feasibility of the probability model is verified. The method proposed in this paper provides some use of reference in the risk management of information system security and execution of security measures.
引用
收藏
页码:414 / 420
页数:7
相关论文
共 50 条
  • [1] Information security risk analysis model based on entropy
    Tang, Y. L.
    Xu, G. A.
    Niu, Y. X.
    Yang, Y. X.
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 4, 2008, : 1146 - 1150
  • [2] Information System Security Risk Assessment Based on Multidimensional Cloud Model and The Entropy Theory
    Huang, Liangliang
    Shen, Yongjun
    Zhang, Guidong
    Luo, Huixia
    PROCEEDINGS OF 2015 IEEE 5TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION, 2015, : 11 - 15
  • [3] Research on information security model and security system design
    Huang, Yi-Min
    Ping, Ling-Di
    Pan, Xue-Zeng
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2001, 35 (06): : 603 - 607
  • [4] Research on Assessment Model of Information System Security Based on Various Security Factors
    林梦泉
    朱赟
    王强民
    李建华
    JournalofShanghaiJiaotongUniversity, 2007, (03) : 405 - 409
  • [5] An enhanced smartphone security model based on information security management system (ISMS)
    Jong Hyuk Park
    Ki Jung Yi
    Young-Sik Jeong
    Electronic Commerce Research, 2014, 14 : 321 - 348
  • [6] An enhanced smartphone security model based on information security management system (ISMS)
    Park, Jong Hyuk
    Yi, Ki Jung
    Jeong, Young-Sik
    ELECTRONIC COMMERCE RESEARCH, 2014, 14 (03) : 321 - 348
  • [7] Research on comprehensive evaluation model of network security based on information entropy
    Zhang, Yi
    2021 6TH INTERNATIONAL CONFERENCE ON SMART GRID AND ELECTRICAL AUTOMATION (ICSGEA 2021), 2021, : 401 - 404
  • [8] Classified Information System Security Risk Assessment Model of the Research
    Peng, Chong
    Shao, Liping
    2015 INTERNATIONAL CONFERENCE ON LOGISTICS, INFORMATICS AND SERVICE SCIENCES (LISS), 2015,
  • [9] Information security risk analysis model using information entropy
    Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    Beijing Youdian Daxue Xuebao, 2008, 2 (50-53):
  • [10] Research on the University Network Information Security Risk Management Model Based on the Fuzzy Sets
    Huo, Cai-qiao
    Meng, Li-zhuang
    Chen, Kai
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING, 2015, 124 : 89 - 93