期刊文献+

基于层次分析涉密信息系统风险评估 被引量:7

Classifi ed Information System Security Risk Assessment based on Hierarchical Analysis
下载PDF
导出
摘要 信息技术的发展使得政府和军队相关部门对信息系统安全问题提出更高要求。涉密信息系统安全有其独特性,风险评估区别于普通信息安全系统。文章以涉密信息系统为研究对象,首先阐述涉密信息系统的特点,针对其独特性对现有信息安全风险评估方法进行分析评价。然后将基于层析分析法的评估模型引入到涉密信息系统安全风险评估中。为涉密信息系统进行风险评估提供一种新的技术思路。最后通过实例分析,所提模型在处理涉密信息系统评估过程中对得到的离散数据分布无要求,与德菲尔法以及BP神经网络相比,该模型具有一定实用性和可扩张性,适合用于实际地涉密信息系统风险评估中。 The development of information technology makes the government and military authorities put forward higher requirements on the security of information system. The uniqueness of classified information system security makes risk assessment different from the common information security system. In this paper, classified information systems are research object. We first describe the characteristics of information system security, the uniqueness of the existing methods of analysis and evaluation of information security risk assessment. Then an evaluation model based on AHP is introduced into security risk assessment of information system security. A new way of classified information system risk assessment is presented. At last, through the analysis of an example, we analyze that the proposed model in processing of information system security evaluation process to get the discrete data distribution is not required, compared with the Delphi method and BP neural network, this model is highly of practicability and expansibility, it does suitable for classified information system risk assessment actually.
出处 《信息网络安全》 2014年第3期80-86,共7页 Netinfo Security
基金 黑龙江省科技厅科学技术研究项目[12513049]
关键词 涉密信息系统 信息安全 层次分析法 风险评估 classified information system information security analytic hierarchy process risk assessment
  • 相关文献

参考文献14

二级参考文献89

共引文献466

同被引文献91

  • 1王锦生.喷墨打印机打印文件检验[J].刑事技术,1998,23(4):21-23. 被引量:10
  • 2史简,郭山清,谢立.一种实时的信息安全风险评估方法[J].计算机工程与应用,2006,42(1):109-111. 被引量:5
  • 3马继刚.当前文件检验的热点问题[J].中国司法鉴定,2007(1):47-50. 被引量:4
  • 4侯红霞,刘建华,范九伦.电信网风险评估方法研究[J].网络安全技术与应用,2007(8):20-22. 被引量:3
  • 5吴清海,韩毅,夏鸣.文检技术在行政执法中的应用[M].南京:江苏科学技术出版社,2007.
  • 6Gebhardt J, Goldstein M, Shafait F, et al. Document Authenticationusing Printing Technique Features and Unsupervised AnomalyDetection[C] //12th International Conference on Document Analysis andRecognition, Piscataway, 2013:479-483.
  • 7Lampert C H, Mei L, Breuel T M. Printing Technique Classificationfor Document Counterfeit Detection[C]//International Conference onComputational Intelligence and Security, Guangzhou, 2006: 639 - 644.
  • 8Umadevi M, Agarwal A, Rao R. Printed Text Characterizationfor Identifying Print Technology using Expectation MaximizationAlgorithm[C]//Multi-disciplinary Trends in Artificial Intelligence,Hyderabad, 2011, (7080): 201-212.
  • 9Tchan J. Classifying Digital Prints According to Their ProductionProcess using Image Analysis and Artificial Neural networks[C]//TheInternational Society for Optical Engineering, San Jose, 2000:105-116.
  • 10Tchan J. The Development of an Image Analysis System ThatCan Detect Fraudulent Alterations Made to Printed Images[C]//TheInternational Society for Optical Engineering, San Jose, 2004:151-159.

引证文献7

二级引证文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部