Research of Information System Security Risk Management based on Probability Model and Security Entropy

被引:0
|
作者
Du, Jiawei [1 ]
Zhou, Ying [1 ]
Guo, Ronghua [1 ]
Zhang, Xing [1 ]
Suo, Guowei [1 ]
机构
[1] Luoyang Elect Equipment Test Ctr, Luoyang 471003, Peoples R China
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nowadays, there is a big challenge on the security risk of information system with the rapid development of network. Computer viruses have brought great intimidation on information systems, which made the loss of worldwide information security moving up. Therefore, more and more people focus on the security problem of information systems, which need our appropriate protection. At first, the principle approach from security risk identification to risk management is proposed. Secondly, an information system security risk management algorithm based on probability model and security entropy is described in detail. Thirdly, a particular system is selected as the example. The whole risk of information system security is modelled and computed according to the risk management computing formula. In accordance with the example, the applicability and feasibility of the probability model is verified. The method proposed in this paper provides some use of reference in the risk management of information system security and execution of security measures.
引用
收藏
页码:414 / 420
页数:7
相关论文
共 50 条
  • [31] Survey on Information System Security Risk Management alignment
    Abbass, Wissam
    Baina, Amine
    Bellafkih, Mostafa
    2016 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY FOR ORGANIZATIONS DEVELOPMENT (IT4OD), 2016,
  • [32] Information Security Risk Management Model for Big Data
    Yang, Min
    ADVANCES IN MULTIMEDIA, 2022, 2022
  • [33] A Quantitative Model for Information-Security Risk Management
    Bojanc, Rok
    Jerman-Blazic, Borka
    ENGINEERING MANAGEMENT JOURNAL, 2013, 25 (02) : 25 - 37
  • [34] Fuzzy OWA Model for Information Security Risk Management
    Imamverdiev, Ya. N.
    Derakshande, S. A.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2011, 45 (01) : 20 - 28
  • [35] Assets Dependencies Model in Information Security Risk Management
    Breier, Jakub
    Schindler, Frank
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 405 - 412
  • [36] INFORMATION SECURITY OF THE BANK IN THE OPERATIONAL RISK MANAGEMENT SYSTEM
    Bezshtanko, D. V.
    FINANCIAL AND CREDIT ACTIVITY-PROBLEMS OF THEORY AND PRACTICE, 2012, 1 (12):
  • [37] An Information Security Risk Management Model for Smart Industries
    Sohrabi Safa, Nader
    Maple, Carsten
    Watson, Tim
    ADVANCES IN MANUFACTURING TECHNOLOGY XXXI, 2017, 6 : 257 - 262
  • [38] Evaluation of the Risk and Security Overlay of ArchiMate to model Information System Security Risks
    Mayer, Nicolas
    Feltus, Christophe
    PROCEEDINGS OF THE 2017 IEEE 21ST INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS AND DEMONSTRATIONS (EDOCW 2017), 2017, : 106 - 116
  • [39] Research on information security model
    Jiang, Tao
    Li, Xinman
    Liu, Jiren
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (10): : 1078 - 1081
  • [40] Research on Accounting Information Security Management Based on Blockchain
    Shao, Huaqing
    Zhang, Zongli
    Wang, Bin
    MOBILE INFORMATION SYSTEMS, 2021, 2021