期刊文献+

信息安全风险评估方法的研究 被引量:2

Survey of Information Security Risk Assessment Methods
下载PDF
导出
摘要 文章介绍了信息安全风险评估方法的传统方法以及近几年来研究出的新方法,尤其对新方法进行阐述、探讨,为风险评估的深入研究和发展起到一定的促进作用,更为风险评估新方法的实际应用起到推广作用。 This paper introduces the traditional methods of information security risk assessmentmethods andnew methods in recent years developed, especial y to the new methods are presented in this paper,the discussion plays a certainrole in promoting for the further research and development of risk assessment, the discussion also has a more practical application of new methods to spread for the risk assessment.
作者 张曼
出处 《信息安全与技术》 2015年第1期18-19 42,42,共3页
关键词 风险评估 信息安全 风险评估方法 risk assessment information security risk assessment method
  • 相关文献

参考文献3

  • 1毛捍东.基于逻辑渗透图模型的网络安全风险评估方法研究[D].国防科学技术大学2008
  • 2赵冬梅.信息安全风险评估量化方法研究[D].西安电子科技大学2007
  • 3唐思思.基于离散动态贝叶斯网络的信息安全风险评估方法的研究[D].东北大学2013

同被引文献8

  • 1Qasem M M. Information technology risk assessment methodologies: current status and future directions [ J ]. International Journal of Scientific & Engineering Re- search, 2013, 4 (12) : 966-973.
  • 2Dzazali S, Zolait A. Assessment of information security maturity : an exploration study of Malaysian public service organization [ J ]. Journal of Systems and Information Technology, 2012, 14(1) : 23-57.
  • 3Hemanidhi A, Chimmanee S, Kimpan C. Cyber risk e- valuation framework based on risk environment of military operation[ C ] //The First Asian Conference on Defense Technology. Hua Hin, Thailand: IEEE, 2015: 42-47.
  • 4Teixeira A, Kin C S, Sandberg H, et al. Secure control systems: a quantitative risk management approach [ J ]. Control System, 2015, 35( 1 ): 24-45.
  • 5Mousavian S, Valenzuela J, Wang Jianhui. A probabilis- tic risk mitigation model for cyber- attacks to PMU net- works[J]. Power Systems, 2015, 30(1) : 156-165.
  • 6Moyo M, Abdullah H, Nieuaber R C. Information securi- ty risk management in small -scale organisations: a case study of secondary schools computerised information sys- tems[ C ]//Information Security for South Africa. Johan- nesburg: IEEE, 2013: 1-6.
  • 7吴金龙.计算机网络对等安全通信技术的研究[J].华侨大学学报(自然科学版),2000,21(4):419-424. 被引量:5
  • 8薛鹏.信息安全的发展综述研究[J].华东师范大学学报(自然科学版),2015(B03):180-184. 被引量:3

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部