期刊文献+

两种自构函数对信息安全资产价值评估的影响

Influence of Two Kinds of Self-organization Function for Assessment of Information Security Asset Value
下载PDF
导出
摘要 在信息安全风险评估的过程中,资产的价值是由资产的机密性、完整性和可用性3个安全属性来决定的。因而,在给资产进行赋值的时候必需考虑这3个因素。资产的价值是这3个因素的函数,具体的函数关系可以由评估者自行决定。本文讨论两种常用的函数关系对信息安全资产价值的影响。 In the process of information security risk assessment, the value of assets is decided by the three security attributes: asset confidentiality, integrity and availability. So we must consider these three factors when we assign the value to assets. The value of the assets is a function of the three factors, and the specific function relation can be made decisions by the assessor. This paper discusses the impact of two kinds of commonly used function relationship of information security assets value.
出处 《计算机与现代化》 2013年第10期102-105,共4页 Computer and Modernization
关键词 信息安全风险评估 资产的机密性 资产的完整性 资产的可用性 分析 information security risk assessment asset confidentiality asset integrity asset availability analysis
  • 相关文献

参考文献7

二级参考文献25

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:307
  • 2吴亚非.国家信息安全风险评估工作历程[J].信息网络安全,2005(9):9-11. 被引量:3
  • 3李嵩,孟亚平,孙铁,刘海峰.一种基于模型的信息安全风险评估方法[J].计算机工程与应用,2005,41(29):159-162. 被引量:10
  • 4孙强,郭江鸿,王慧.基于消息通信的安全管理系统的设计与实现[J].计算机工程与应用,2006,42(10):140-143. 被引量:5
  • 5[3]NIST.SP 800-30.Risk management guide for information technology system.Version2.0.2001
  • 6[4]G Bartoo.Risk management.IEEE Engineering in Medicine and Biology Magazine,2003,22(4):166-172
  • 7[6]United States General Accounting Office,Accounting and Information Management Division.GAO/AIMD-00-33.Information security risk assessment:Practices of leading organizations,1999
  • 8[7]M Granger Morgan,Max Henrion.Uncertainty:A Guide to Dealing with Uncertainty in Quantitative Risk and Policy Analysis.Cambridge,UK:Cambridge University Press,1990
  • 9[10]Matt Bishop,David Bailey.A critical analysis of vulnerability taxonomies.http://seclab.cs.ucdavis.edu/projects/vulnerabilities/scriv/ucd-ecs-96-11.pdf,1996
  • 10United States General Accounting Office, Accounting and Information Management Division. Information Security Risk Assessment[Z]. Augest 1999.

共引文献326

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部