期刊文献+

基于DEA模型的网络安全管理效率评价 被引量:5

Efficiency evaluation model based on data envelopment analysis for network security management
下载PDF
导出
摘要 为对网络安全管理的投入产出效率作分析,提出网络安全管理效率评价的DEA模型。从管理、技术和经济多个角度确定网络安全管理投入与产出的指标,通过CCR模型、BCC模型进行DEA求解得到各数据决策单元的效率评价结果;对非DEA有效的决策单元进行投影分析可得到其改进的方向和程度。实例结果表明了评价方法的可行性,基于DEA模型的网络安全管理效率评价能为管理者和部门人员提供决策支持,并有利于组织构建更为完善的信息安全管理体系。 To evaluate the efficiency of network security management (NSM), the model based on data envelopment analysis (DEA) for NSM is put forward, in which the input and output indicators of NSM are defined based on management, technical and economic considerations. The efficiency evaluation results of all decision making units (DMU) can be obtained through the CCR model and BCC model analysis. The projection analysis for low efficient DMUs illustrates how to improve their efficiency. The validity of the presented method is demonstrated by practical studies. The efficiency evaluation model based on DEA for NSM can support managers and department staffs, decision-making, as well as help building a better information security management system.
出处 《计算机工程与设计》 CSCD 北大核心 2013年第11期3775-3779,共5页 Computer Engineering and Design
基金 国家自然科学基金重点项目(61133014) 广东省自然科学基金项目(S2011010002708)
关键词 网络安全管理 效率 评价 数据包络分析 信息安全管理 network security management efficiency evaluation DEA information security management
  • 相关文献

参考文献14

  • 1ISACA. COBIT Online [EB/OL]. [2011-05-10]. http:// www. isaca. org/cobit.
  • 2NIST. Special Publications [EB/OL]. [2011-05-10]. http: //csrc. nist. gov.
  • 3ISO/IEC27004. Information technology-security techniques-Information security management measurements [S]. 2011-01-07.
  • 4LIU Fonghao, Lee Wei Tsong. Constructing enterprise infor- mation network security risk management mechanism by ontology [J]. Tamkang Journal of Science and Engineering, 2010, 13 (1): 79-87.
  • 5Premaratne U, Samarabandu J, Beresh B, et al. Application of security metrics in auditing computer network security= A case study [C]//Proceedings of ICIAFS08, 2008: 200-205.
  • 6Hagen J M, Albrechtsen E, Hovden J. Implementation and effectiveness of organizational information security measures [J]. Information Management and Computer Security, 2008, 16 (4) : 377-397.
  • 7汤永利,徐国爱,钮心忻,杨义先.基于AHP的信息安全管理测量模型[J].辽宁工程技术大学学报(自然科学版),2008,27(4):575-578. 被引量:2
  • 8Huang S, Lee C, Kao A. Balancing performance measures for information security management [J]. Industrial Management Data Systems, 2006, 106 (2): 242-255.
  • 9Boehmer W. Appraisal of the effectiveness and efficiency of an information security management system based on ISO 27001 [C] //Proceedings-2nd Int Conf Emerging Security Inf, Systems and Technologies, 2008: 224-231.
  • 10Moharnulad S, Abadullah A, Saad H. Using ISO 17799:2005 information security management: A STOPE view with six sig- ma approach [J]. International Journal of Network Manage- ment, 2007, 17 (1): 85-97.

二级参考文献39

共引文献16

同被引文献22

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部