期刊文献+

安全风险模型在郑州北车站管理信息系统中的应用 被引量:1

Implementation of information system security risk model to Managemeat Information System at Zhengzhou North
下载PDF
导出
摘要 在对现有的信息系统安全体系构架和安全风险模型进行分析的基础上,结合能力成熟度模型,提出基于能力成熟度模型的信息系统安全风险模型。该模型针对信息系统生命周期的不同阶段,通过风险识别、分析、评估过程,在人员、技术、管理等方面运用多个关键过程域对风险进行控制,保障信息系统安全。并以郑州北车站管理信息系统为例,详细探讨该模型的运用方案,对其他管理信息系统有着积极的指导意义。 It was proposed based on CMM information system security risk model with carrying on the analysis to the existing information system security system skeleton and the security risk model in the foundation, the combining Capacity Maturity Model(CMM). It was in view of the information system life cycle different stage, identify, analyze and evaluate through a risk, in the personnel, the technology, aspects and so on management utilized many essential processes to carry on controlling the risk, safeguarded the information system security. It was taken Management Information System at Zhengzhou North Station as an example, had in detail discussed implementation plan of this model, had the positive guiding sense to other management Information System.
作者 丁雷
出处 《铁路计算机应用》 2008年第6期21-25,共5页 Railway Computer Application
关键词 信息系统 安全风险 能力成熟度模型 故障树分析法 Information System security risk CMM FTA
  • 相关文献

参考文献6

二级参考文献12

  • 1Fredrik Vraalsen, Folker den Braber, Ida Hogganvik.The CORAS Tool-Supported Methodology for UML-Based Security Analysis.http:// coras.sourceforge.net/document s/CORAS-framework-report.pdf.
  • 2P L Clemens.Fauh Tree Analysis.JE Jacobs Sverdrup.http://www. sverdrup.com/safety/fta.pdf, 2002.
  • 3Andrew P Moore,Robert J Ellison,Richard C Linger.Attack Modeling for Information Security and Survivability.http:// www.cert.org/archive/ pdf/01tn001.pdf.
  • 4Peter Richardson.Model Driven Architecture.http://www.ejv.org.-au/ present at ions/new/MDA_Object Consulting.pdf.
  • 5Mass Soldal Lund,Lda Hogganvik,Fredrik Seehusen et al.UML profile for security assessment[R].Technical report STF40 A03066,SINTEF Telecom and Informatics,http://heim.ifi.uio.no/-massl/uml-sa/umlsa-report1.pdf, 2003-12.
  • 6Mass Soldal Lund,Forker den Braber,Ketil Stolen et al.A UML profile for the identification and analysis of security risks during structured brainstorming[R].Technical report STF40 A03067,SINTEF ICT, http ://heim.ifi .uio.no/-massl/uml-sa/uml-sa-report 2.pdf, 2004-05.
  • 7Guy Helmer,JohnnyWong,Mark Slagell et al.A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System. http ://www.cs.iastate.-edu/-honavar/Papers/SFFA-TD.pdf.
  • 8沈昌祥.用信息安全工程理论规范信息安全建设[N].计算机世界,2001—09—03(81).
  • 9ISO/IEC 21827:2002, Systems Security Engineering Capability Maturity Model[S].
  • 10Kwork L, Longley D. Information Security Management and Modeling[J]. Information Management and Computer Security, 1999:7(1).

共引文献14

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部