期刊文献+

一种面向业务的风险评估模型 被引量:8

A Business Oriented Risk Assessment Model
下载PDF
导出
摘要 当前主流的信息安全风险评估关注于资产损失,而忽视了对业务的影响.提出了一种面向业务的风险评估模型.该模型从业务安全需求出发,将机密性、完整性和可用性等安全属性引入风险评估过程中,通过评估对业务过程的影响来量化风险.将传统风险评估的资产要素视为业务的支撑,采用层次化方法依次分析资产风险、业务过程风险和业务风险.各风险要素采用面向属性归纳和聚类方法进行概化分析,并采用Markov模型描述业务过程的风险传导.最后以某网上银行交易系统风险进行模型验证.理论分析和实验结果表明,该模型能够将传统的资产风险转化为业务风险,从机密性、完整性和可用性3个安全属性进行度量,从而体现业务安全需求. Traditional information security risk assessment emphasizes the loss of asset, but ignores the effect of the risk on business. This paper proposes a business oriented risk assessment model BoRAM. On the basis of the business security requirements, the proposed model introduces three basic security goals (i. e. confidentiality, integrity and availability) into the process of the risk assessment, and further measures the risk according to the effect on business process. In the proposed model, the asset is not only severed as a basic evaluation element as same as the role in the traditional risk assessment models, but also is served as the support of the business. The risk of the asset, the risk of the business process, and the risk of the business are analyzed hierarchically. In order to measure these risks, all the risk elements are generalized and analyzed by attribute-oriented induction (AOI) as well as cluster algorithm. Furthermore, the Markov model is also introduced into the business to describe the transfer between business processes. Finally, the model is experimented in a typical Internet-bank business. Theoretical analysis and experimental results show that the proposed model can evaluate the business risk instead of traditional asset risk on the basis of confidentiality, integrity and availability of business, which is just the goal of the business security requirements.
出处 《计算机研究与发展》 EI CSCD 北大核心 2011年第9期1634-1642,共9页 Journal of Computer Research and Development
基金 国家自然科学基金项目(90818021)
关键词 风险评估 业务需求 业务过程 属性归纳 MARKOV模型 risk assessment business security requirement business process AOI Markov model
  • 相关文献

参考文献19

  • 1吴迪,陈晓桦,李斌,郭涛.IS风险评估方法分类研究[J].计算机应用研究,2007,24(9):55-57. 被引量:1
  • 2Moore A, Ellison R, Linger R. Attack modeling for information security and survivability [R]. Pittsburgh: Carnegie Mellon University, 2001.
  • 3Mauw S, Oostdijk M. Foundations of attack trees [G]// LNCS 3935 : Proc of the 8th Annual Int Conf on Information Security and Cryptology. Berlin: Springer, 2005:186-198.
  • 4Jha S, Sheyner O, Wing J. Two formal analyses of attack graphs[C] //Proc of the 15th IEEE Computer Security Foundations Workshop. Los Alamitos, CA: IEEE Computer Society, 2002:45-59.
  • 5Jha S, Sheyner O, Wing J. Minimization and reliability analyses of attack graphs, CMU-CS-02-109[R]. Pittsburgh: Carnegie Mellon University, 2002.
  • 6Sheyner O, Haines J, Jha S, et al. Automated generation and analysis of attack graphs [C]//Proc of the IEEE Syrup on Security and Privacy. Piscataway, NJ: IEEE, 2002: 273- 284.
  • 7Sheyner O. Scenario graphs and attack graphs [D]. Pittsburgh: Carnegie Mellon University, 2004.
  • 8Bodin L, Gordon L, Loeb M. Evaluating information security investments using the analytic hierarchy process [J]. Communications of the ACM, 2005, 48(2): 79-83.
  • 9陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:341
  • 10Karabacak B, Sogukpinar I. ISRAM: Information security risk analysis method [J]. Computers & Security, 2005, 24 (2) : 147-159.

二级参考文献10

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:307
  • 2HOO K J S.How much is enough? A risk-management approach to computer security[R].[S.l.]:CRISP,2000.
  • 3Carnegie Mellon University.OCTAVESM criteria version 2.0[K].2001.
  • 4Carnegie Mellon University.Operationally critical threat,asset,and vulnerability evaluation(OCTAVESM) framework[K].1999.
  • 5ISO 17799-1:2000,信息技术信息安全管理实施细则[S].
  • 6ISACA.Control objectives for information technology(COBIT)[S].2000.
  • 7NIST.Computer security division,systems and network security group,federal information technology security assessment framework[S].2000.
  • 8MOSLEH A.A framework for computer security risk management[C]//Proc of the 3rd International Computer Security Risk Management Model Builders' Workshop.[S.l.]:Los Alamos National Laboratory,NIST,NCSC,1989.
  • 9Australian/New Zealand standard,Risk management AS/NZS 4360[S].2004.
  • 10GRAN B A.The CORAS methodology for model-based risk assessment IST-2000-25031[R].2003.

共引文献340

同被引文献79

引证文献8

二级引证文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部