期刊文献+

一种基于系统安全性差距分析的风险评估尺度和方法 被引量:3

A System Security Gap Analysis Based Risk Assessment Metric and Method
下载PDF
导出
摘要 本文提出一种基于信息系统安全性分析来定量计算信息安全风险的度量尺度,差距分析方法及相应的评估流程.通过差距分析法,可以定量地度量信息安全目的和安全现状的在安全保障控制措施和安全保障能力两方面差距,从而改进对信息安全的分析和设计以及如何提升信息安全保障能力.通过本文定义并计算整体信息安全风险度量尺度,还可以计算不同安全控制措施的产生的安全边际效益,进行安全投入产出效益分析.这种可计算的信息安全风险评估尺度和方法的有效性在实际工程中得到应用与检验. This paper propose a quantitative information security risk metric based on information system security analysis, gap analysis method and its assessment procedure, Through security gap analysis method, we can compute quantitatively the difference between security target and TOE security in security assurance control and security assurance capability, and then improve the information system security architecture design and its assurance level. Using the metric, we can also compare the benefit difference among security contols, and calculate the input-output analysis. This computable information security risk assessment metric and method was applied in real case and proved effective.
出处 《电子学报》 EI CAS CSCD 北大核心 2006年第B12期2556-2559,共4页 Acta Electronica Sinica
关键词 差距分析 安全评估 风险评估 安全度量 gap analysis security assessment risk assessment security metric
  • 相关文献

参考文献8

  • 1Michael Greenwald. Computer security is not a science (but itshould be)[ A]. In Proceedings of the Large-Scale Network Security Workshop[ C ]. Landsdowne, VA, March 2003 : 24 - 27.
  • 2GB/T 18336,信息技术安全性评估准则[S].
  • 3ISO 18045, Common Evaluation Methodology[ S ].
  • 4B Littlewood. Towards operational measures of computer security[ J ]. Journal of Computer Security, 1993,2 (3) : 211 - 229.
  • 5P Manadhata, J M Wing. Measuring a Syste-m's Attack Surface[ OL ]. http://www, cs. cmu. edu/- wing/publications/tr04102.pdf.
  • 6E Jonsson, T Olovsson. A quantitative model of the security intrusion process based on attacker behavior [ J ]. IEEE Transactions on Software Engineering, 1997,23(4) :235 - 245.
  • 7GB/T 20274—2006,信息系统安全保障评估框架[S].
  • 8National Security Agency. Information Assur-ance Technical Framework Release 3.1 [ OL]. http://www, iatf. net.

同被引文献23

  • 1李涛.基于免疫的网络安全风险检测[J].中国科学(E辑),2005,35(8):798-816. 被引量:40
  • 2Alexander Zemlianov, Gustavo de Veciana. Capacity of Ad Hoe wireless networks with infrastructure support [ J]. IEEE Journal on Selected Areas in Communications, 2005,23 (3) :657 - 667.
  • 3Sam Elisa Schaeffer, Stefano Marinoni, Mikko S, Pekka Nikander. Dynamic local clustering for hierarchical Ad Hoc networks [ A]. Proceedings of SECON '06[ C]. Virginia: IEEE press, 2006,667 - 672.
  • 4Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao. Adaptive security design with malicious node detection in cluster-based sensor networks [ J ]. Computer Communications, 2007,30 ( 11 - 12) :2385 - 2400.
  • 5Andre Konig, Matthias Hollick, Ralf Steinmetz. On the implications of adaptive transmission power for assisting MANET security [ A ]. Proceedings of ICDCS ' 09 [ C ]. Quebec: IEEE press, 2009,537 - 544.
  • 6S A Razak, S M Furnell,N L Clarke,P J Brooke.Friend-assisted intrusion detection and response mechanisms for mobile Ad Hoc networks [ J ]. Ad Hoc Networks, 2008, 6 (7) : 1151 - 1167.
  • 7Jie Zeng, Jinquan Zeng. A dynamic imrntmity-based real-time network risk evaluation method[ A]. Proceedings of ISBIM ' 08 [ C]. Wuhan: IEEE press,2008.3 - 6.
  • 8Vasileios Karyotis, Symeon Papavassiliou. Risk-based attack strategies for mobile Ad Hoc networks under probabilistic attack modeling framework [J].Computer Networks, 2007,51 (9) :2397 - 2410.
  • 9Wenyuan Li, Jiaqi Zhou, Kaigui Xie, Xiaofu Xiong. Power system risk assessment using a hybrid method of fuzzy set and Monte Carlo simulation[ J]. IEEE Transactions on Power Systems, 2008,23 (2) : 336 - 343.
  • 10Lei Wen, Zhaocai Xi. Supply chain risk evaluation based on fuzzy multi-criteria lattice-order decision-making [ A ]. Proceedings of ICAL' 07 [ C ]. Jinan, IEEE Press, 2007, 1442 - 1445.

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部