Information Security Risk Assessment Methods for the Transportation Industry

被引:0
|
作者
Deng Jing [1 ]
Song LaiQiang [2 ]
Wu XiaoBo [1 ]
机构
[1] China Acad Transportat Sci, Beijing 100029, Peoples R China
[2] North China Univ Technol, Beijing Key Lab Urban Rd Transportat Intelligent, Beijing 100144, Peoples R China
关键词
Risk assessment method; Information security; Transportation; Information system;
D O I
10.1117/12.2613964
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Information security risk assessment is the starting point and foothold of information security management. The construction of transportation informatization has achieved remarkable results, but the development of industry information security risk assessment is relatively backward, and the security level needs to be improved. While summarizing the typical information security risk assessment methods, this paper summarizes the existing advanced risk assessment methods at home and abroad, compares and analyzes the applicability of various methods in solving common problems in the process of industry information system risk assessment. The analysis results of this paper show that the information security risk assessment methods fused with multi-intelligent algorithms have better assessment effects, and provides a good reference for the choice of information security risk assessment methods in the transportation industry.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Taxonomy of information security risk assessment (ISRA)
    Shameli-Sendi, Alireza
    Aghababaei-Barzegar, Rouzbeh
    Cheriet, Mohamed
    COMPUTERS & SECURITY, 2016, 57 : 14 - 30
  • [22] On the role of the Facilitator in information security risk assessment
    Coles-Kemp, Lizzie
    Overill, Richard E.
    JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2007, 3 (02): : 143 - 148
  • [23] Information security risk assessment, aggregation, and mitigation
    Lenstra, A
    Voss, T
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 391 - 401
  • [24] A Study of Information Security Evaluation and Risk Assessment
    Li, Jingyi
    Chao, Shiwei
    Huo, Minxia
    2015 FIFTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2015, : 1909 - 1912
  • [25] Risk assessment of human error in information security
    Cheng, Xiang-Yun
    Wang, Ying-Mei
    Xu, Zi-Ling
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 3573 - +
  • [26] On the role of the Facilitator in information security risk assessment
    Lizzie Coles-Kemp
    Richard E. Overill
    Journal in Computer Virology, 2007, 3 (2): : 143 - 148
  • [27] A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture
    Govender S.G.
    Kritzinger E.
    Loock M.
    Personal and Ubiquitous Computing, 2021, 25 (05) : 927 - 940
  • [28] Collective information structuremodel for information security risk assessment (ISRA)
    University Tun Hussein Onn Malaysia , Johor, Malaysia
    不详
    不详
    J. Syst. Inf. Technol., 2 (193-219):
  • [29] Risk assessment methods for improving urban security
    Schoppe, C.
    Zehetner, J.
    Finger, J.
    Baumann, D.
    Siebold, U.
    Haering, I.
    SAFETY AND RELIABILITY: METHODOLOGY AND APPLICATIONS, 2015, : 701 - 708
  • [30] Review of Network Security Risk Assessment Methods
    Yang, Sun
    Wei, Xiong
    PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 430 - 434