期刊文献+

复杂信息系统风险评估框架与流程 被引量:5

Risk Assessment Framework and Process of Complex Information System
下载PDF
导出
摘要 复杂信息系统(CIS)在系统风险管理和风险评估上因其结构复杂性而存在较大难度。为此,基于Zachman框架,提出一种CIS风险评估框架,并在GB/T 20984-2007信息安全技术-信息安全风险评估规范基础上,建立CIS的风险评估流程。依据风险管理层次与安全域划分原则对CIS进行架构分解,研究安全域内和域间的评估方法。在传统风险要素的基础上增加CIS互联关系的风险要素。引入互信息表征互联关系的关联度,利用层次分析法对风险权重进行评估。结合实例对CIS风险评估流程进行验证,结果表明,该流程可对CIS风险做出客观准确的评估。 Research on Complex Information Systems( CIS) is a big difficulty on a system of risk management and risk assessment because of the complexity of the structure. Based on Enterprise Architecture( EA) Zachman framew ork and GB / T 20984-2007 standard information security risk assessment norms,this paper presents a complex model of information system risk assessment framew ork and establishes a risk assessment process CIS. Based on risk management hierarchy and principle of security domain,it decomposes the architecture of CIS and studies assessment w ithin and betw een domains. On the basis of traditional risk factors,the paper increases interconnection risk factor as the specific factor to the CIS,it introduces correlation to characterize interconnection and AHP method. With examples of CIS risk assessment process is validated,results show that the process can make an objective and accurate assessment for CIS risk.
出处 《计算机工程》 CAS CSCD 北大核心 2015年第4期156-160,165,共6页 Computer Engineering
关键词 复杂信息系统 企业架构 Zachman框架 风险评估 风险要素 评估流程 Complex Information System(CIS) Enterprise Architecture(EA) Zachman framework risk assessment risk factor assessment process
  • 相关文献

参考文献12

二级参考文献41

  • 1杨惠珍,康凤举,阎晋屯.一种基于AHP的仿真可信度评估方法研究[J].系统仿真学报,2006,18(z2):52-54. 被引量:17
  • 2江常青,彭勇,林家骏,王贵驷.基于CMM的信息系统安全保障模型[J].计算机工程与应用,2006,42(34):112-115. 被引量:6
  • 3Adibi J,Chalupsky H,Melz E,et al.The KOJAK group finder:Connecting the dots via integrated knowledge-based and statistical reasoning[C]//Proceedings of IAAI,200d..
  • 4Adibi J,Chalupsky H.Scalable group detection via a mutual information model[C]//Proceedings of the First International Conference on Intelligence Analysis,2005.
  • 5Shetty J,Adibi J.Discovering important nodes through graph entropy:The case of enron email database[C]//Proceedings of the 3rd International Workshop on Link Discovery,2005:74-81.
  • 6Gehrke J,Ginsparg P,Kleinberg J.Overview of the 2003 KDD Cup[J]. SIGKDD Explorations, 2003,5 (2) : 149-151.
  • 7GB/T20274-2006.信息安全技术信息系统安全保障评估框架[S].北京:中国信息安全产品测评认证中心,2006.
  • 8Mansourov N, Campara D. System Assurance [M]. Burlington, USA: Morgan Kaufmann Publishers, 2011.
  • 9江常青.基于模型的信息系统安全评估研究[D].上海:华东理工大学,2007.
  • 10Bloomfield R E, Guerra S, Masera M, et al. Assurance Cases for Security. [R]. Washington DC, USA; Software Engineering Institute, 2005.

共引文献65

同被引文献83

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部