期刊文献+

信息系统的模糊风险评估模型 被引量:63

Model of fuzzy risk assessment of the information system
下载PDF
导出
摘要 提出了一种信息系统的综合风险评估模型。首先采用AHP(analytic hierarchy process)与模糊逻辑法相结合的方法进行风险评估,并根据信息系统风险评估的实际情况对2种方法进行了改造。应用模糊逻辑法对各个风险因素从概率方面、影响方面、不可控制性方面分别评价其重要度,利用AHP求出各个风险因素的风险值,通过比较各个因素的风险值,指出哪些风险需要采取措施加以控制。其次通过引进信息熵,求出各个风险因素在系统风险评估中所占的比例,可以计算整个系统的风险度,由此决定系统的总体风险水平。通过实例分析可知,该模型可以方便地用于信息系统风险评估,实验结果符合实际。 A model of risk assessment was introduced to the estimation of the information system. The method, which combined AHP and fuzzy logical method, was applied to the risk assessment. AHP and fuzzy logical method were altered according to the actual condition of the risk assessment of information system. Applying fuzzy logical method, the im- portant degree of each factor was judged in the aspects of the probability, the impact severity and uncontrollability, not judged immediately. Finally, the risk value of each factor was calculated. By comparing the risk value of each factor, it is known that which risk can take measures to control. By introducing entropy, the proportion of each risk factor in the whole risk assessment system was calculated. Next the risk degree of the whole system was calculated. Then the risk level of the whole system can be determined. The study of the case shows that the model can be easily used to the risk assessment of the information system security. The results are in accord with the reality.
出处 《通信学报》 EI CSCD 北大核心 2007年第4期51-56,64,共7页 Journal on Communications
基金 国家自然科学基金资助项目(60573036) 河北省科学技术攻关计划(042135127)~~
关键词 信息安全 风险评估 模型 AHP 模糊逻辑法 information security risk assessment model analytic hierarchy process fuzzy logical method entropy
  • 相关文献

参考文献16

  • 1Trusted Computer System Evaluation Criteria[S].US National Computer Security Center,NCSC 5200.28-STD,1985.
  • 2Information Technology Security Evaluation Criteria[S].Provisional Harmonized Criteria of France,Germany,Netherlands,and United Kingdom,Commission of the European Communities,1991.
  • 3The International Organization for Standardization.Information Technology-Code of Practice for Information Security Management,ISO/IEC 17799:2000(E)[S].1999.
  • 4The International Organization for Standardization.Common Criteria for Information Technology Security Evaluation-Part1:Introduction and General Model,ISO/IEC 15408-1:1999(E)[S].1999.
  • 5The International Organization for Standardization.Common Criteria for Information Technology Security Evaluation-Part2:Security Function Requirements,ISO/IEC 15408-2:1999(E)[S].1999.
  • 6The International Organization for Standardization.Common Criteria for Information Technology Security Evaluation-Part3:Security Assurance Requirements,ISO/IEC 15408-3:1999(E)[S].1999.
  • 7张义荣,鲜明,王国玉.一种基于网络熵的计算机网络攻击效果定量评估方法[J].通信学报,2004,25(11):158-165. 被引量:55
  • 8Centers for Medicare & Medicaid Services(CMS).CMS Information Security Risk Assessment Methodology[S].
  • 9程湘云,王英梅,刘增良.一种定量的信息安全风险评估模型[J].空军工程大学学报(自然科学版),2005,6(6):56-59. 被引量:7
  • 10许福永,申健,李剑英.基于AHP和ANN的网络安全综合评价方法研究[J].计算机工程与应用,2005,41(29):127-129. 被引量:29

二级参考文献33

  • 1朱斌红,胡明.办公网的信息安全模型研究[J].空军工程大学学报(自然科学版),2000,1(4):48-51. 被引量:3
  • 2焦李成.神经网络系统理论[M].西安:西安电子工业大学出版社,1993.268-280.
  • 3United States General Accounting Office, Accounting and Information Management Division. Information Security Risk Assessment[Z]. Augest 1999.
  • 4National Institute of Standards and Technology. Special Publications 800-30, Risk Management Guide(DRAFT)[Z]. June 2001.
  • 5BUTLER S A, FISCHBECK P. Multi-Attribute Risk Assessment, Technical Report CMD-CS-01-169[R]. December 2001.
  • 6BUTLER S A. Security Attribute Evaluation Method: A Cost-Benefit Approach[Z]. Computer Science. Department, 2001.
  • 7PELTIER T R. Information Security Risk Analysis[Z]. Rothstein Associates Inc, 2001.
  • 8CMS(Centers for Mediceare & Medicaid Services).CMS Information Security Risk Assessment Methodology.2002-09-12
  • 9Tah JHM,Carr V.A Proposal for Construction Project Risk Assessment Using Fuzzy Logic[J].Construction Management and Economics,2000,18(4):491-500
  • 10ISO IEC 17799;ISO 2000(E)

共引文献417

同被引文献456

引证文献63

二级引证文献327

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部