期刊文献+

一种量化安全风险等级评估模型

A model for quantitative risk grade evaluation
下载PDF
导出
摘要 为了寻找一种理想的、操作性强的网络安全风险评估模型,对网络安全风险评估进行了深入的分析和研究;结合网络安全的三要素(风险威胁、安全技术、安全性质),提出了一种网络安全风险等级的计算模型.该模型包括一个安全技术矩阵和细分的二级评估参数.其中,安全技术矩阵中各元素的值代表该元素在整体安全等级中的权重,对不同的网络系统进行评估时,根据专家的建议和网络系统的实际情况调整技术矩阵的权重分配值;二级评估参数是根据安全技术矩阵的元素,分别列出所面临的风险威胁,面对这些风险威胁所能够采用的安全技术,以及网络系统的安全性质评价,通过对这些评估参数的分值计算得到网络的安全等级,以此对网络安全等级进行划分.该模型比较好地解决了定量化评估问题,具有操作性、实用性等特点. At present, there isn't a kind of model for network security risk evaluation which is ideal and has good service ability. According to the three factors of the network safety(the risk threat, safe technique, safe property), by a model of quantitative risk grade evaluation, namely, according to the network level objects elected and the network security elements, this paper designed a computational model for network security risk grade, which included a security technical matrix and subdivided second-class evaluation parameters, among them, the value of each element represented in the security technical matrix that expressed power value in whole safe grade. For the valuation of different network system, according to the expert suggestions and the actual circumstance of network system, the model adjusted the power value of the technique matrix, second-class valuation parameter list existing risk threat, and second-class valuation parameter list existing risk threat. It also adopted the safe technique for the risks threat, and evaluation to the safe property of the network system, by the computation of which the network security grades were obtained, and network security grades were divided. The model has resolved problems of quantitative evaluation and has the characteristics of operability and practical use etc. Finally the paper gave the calculation example of the model and application method.
出处 《宁夏工程技术》 CAS 2006年第2期164-167,共4页 Ningxia Engineering Technology
关键词 网络安全 风险分析 风险等级评估模型 网络安全风险评估 network safety risk analysis model for evaluating risk grade network security risk evaluation
  • 相关文献

参考文献4

二级参考文献15

  • 1Richard Steven W 范建华等(译).TCP/IP详解(卷1):协议[M].北京:机械工业出版社,2000.9-10.
  • 2[1]http://www.commoncriteria.org/docs/PDF/CCPART 1 V21 .PDF
  • 3[2]http://www.commoncriteria.org/docs/PDF/CCPART2V21.PDF
  • 4[3]http://www.commoncriteria.org/docs/PDF/CCPART3V2 1.PDF
  • 5[4]http://vww.commoncriteria .org/docs/PDF/CEMV 10.PDF
  • 6Feghhi J, Feghhi J, William P. Digital Certificates [ M]. Canada: Addison- Wesley,1998.
  • 7National Institute of Standards and Technology (NIST).Computer Security Division Systems and Network Security Group. Information Technology Security Assessment Framework[Z]. 2000.
  • 8WeberS FA.Modified analytic hierarchy process for automated manufacturing decision[J] .Interface, 1993,23(4): 115.
  • 9BEVAN N. Measuring usability as quality of use[J].lonrnal of Software Oualitv. 1995,(4):115.
  • 10冷德辉,陈文革.网络安全测评和风险评估[J].广东通信技术,2001,21(7):11-16. 被引量:7

共引文献107

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部