期刊文献+

信息系统安全风险评估 被引量:9

The Evaluation of Information System Security Risk
下载PDF
导出
摘要 文章在介绍有关信息系统安全风险评估概念基础上,提出了一种以人为定性评估与灰类综合定量评判相结合的信息系统安全风险评估模型,并分析了该评估模型的优缺点。 Introducing the conception of information system security risk,followlng the international and national standards about that,a measuring model for information system security risk is proposed in this paper combined the subjective qualitative evaluation with the quantitative synthetic decision based on gray system,the advantage and weakness for that assessing model is also put at last.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第4期145-148,共4页 Computer Engineering and Applications
基金 江苏省高校自然科学资助项目(编号:02KJD120001)
关键词 信息系统 安全风险 灰色系统 评估模型 information system, security risk, gray system, measuring model
  • 相关文献

参考文献12

  • 1Department of Defense.Trusted Computer System Evaluation Criteria[S].DoD 5200.282 STD,1985.
  • 2The Information Assurance Technical Framework(IATF).Release 3.1, NSA,2002-09.
  • 3Michael E Whitman,Herbert J Mattord.Principles of Information Security[M].Thomson Learning,2003.
  • 4Information technology-Guidelines for the management of IT Security- Part 3:Techniques for the management of IT Security[S].ISO/IEC TR 13335-3:1998(E), 1998.
  • 5The International Organization for Standardization.Information Technology- Code of Practice for Information Security Management[S].ISO/IEC 17799 : 2000 (E), 2000.
  • 6ACSA ed.Proceedings of the Workshop on Information Security System Scoring and Ranking[C].In : Williamsburg, Virginia,2001.
  • 7The international Organization for Standardization.Common Criteria for Information Technology Security Evaluation-Part 3:Security Assurance Requirements[S].ISO/IEC 15408-3 : 1999(E), 1999.
  • 8System Security Engineering Capability Maturity Model.Model Description Document,Version 2.0,1999-04.
  • 9Carlos Villarrubia,Eduardo Fern'andez-Medina,Mario Piattini.Analysis of ISO/IEC 17799:2000 to be used in Security Metrics.http://www. scom.hud.ac.uk/scomzl/conference.
  • 10Swanson M.Security self-assessment guide for information technology systems[R].Technical Report NIST 800-26,National Institute of Standards and Technology ,2001.

二级参考文献11

  • 1[1]Rommelfanger HJ.Multicriteria Decision Making Using Fuzzy Logic [C].In:Proceedings of the Conference on the North American Fuzzy Information Processing Society, 1998: 360~364
  • 2[2]Hanseong S,Poonghyun S.A Software Safety Evaluation Method Based on Fuzzy Colored Petri Nets[C].In:Proceedings of International Conference on Fuzzy Systems, 1999; (2): 830~834
  • 3[3]Antonakopoulos T, Agavanakis K.CASE Tools Evaluation: An Automatic Process Based on Fuzzy Sets Theory[C].In:Proceedings of Sixth IEEE International Workshop on Rapid System Prototyping, 1995:140~146
  • 4[4]Cannavacciuolo A,Capaldo G.A Fuzzy Model of the Evaluation Process[C].In:Proceedings of the Fifth IEEE International Conference on Fuzzy Systems, 1996; (2) :828~834
  • 5[5]Copigneaux F,Martin S.Software Security Evaluation Based on a Topdown McCall-like Approach[C].In:Proceedings of the Fourth Conference on Aerospace Computer Security Applications, 1988:414~418
  • 6[6]Garrabrants WM,Ellis AW.CERTS :A Comparative Evaluation Methodfor Risk Management Methodologies and Tools[C].In:Proceedings of the Sixth Annual Computer Security Applications Conference,1990:251~257
  • 7United States General Accounting Office, Accounting and Information Management Division. Information Security Risk Assessment[Z]. Augest 1999.
  • 8National Institute of Standards and Technology. Special Publications 800-30, Risk Management Guide(DRAFT)[Z]. June 2001.
  • 9BUTLER S A, FISCHBECK P. Multi-Attribute Risk Assessment, Technical Report CMD-CS-01-169[R]. December 2001.
  • 10BUTLER S A. Security Attribute Evaluation Method: A Cost-Benefit Approach[Z]. Computer Science. Department, 2001.

共引文献328

同被引文献41

引证文献9

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部