期刊文献+

面向业务过程的信息安全风险分析

Analysis on Business Process-Oriented Information Security Risk
下载PDF
导出
摘要 为了能够充分描述业务及信息资产依赖的关系,以便在评估威胁的业务影响时,能综合考虑资产依赖程度和业务安全目标或需求,建立了一个内部依赖的递阶层次结构的资产依赖模型,结合网络分析法(ANP)计算组织业务在保密性、可用性和完整性上对资产的依赖程度,以反映业务对资产的安全需求,威胁对业务的影响由威胁强度和安全需求共同确定。实例分析表明,ANP方法得到的资产依赖性结果与现实更相符,从而为风险评估结果的合理性提供了保证。 In the information age, business process has become an important information security risk factor. However, there is lack of models to adequately describe the dependencies among business processes and information assets and in the process evaluating the impact of threat on business, the dependencies and security objectives or requirements of business have not been taken into account simultaneously, which has a negative impact on risk assessment result. This study presents an asset dependency diagram with hierarchical structure and inner dependencies and Analytic Network Process ( ANP ) is used to calculate the dependency degrees of organization business on information assets about confidentiality,integrity and availability respectively, which reflect the security requirements of business to assets. Based on this,the impact of a threat on business is determined by threat strength and security requirements. An example shows that the results about asset dependency according to ANP are more in line with reality,therefore the reasonableness of the risk assessment result is ensured.
作者 范士喜
出处 《北京印刷学院学报》 2015年第4期34-38,共5页 Journal of Beijing Institute of Graphic Communication
基金 北京市自然科学基金(4142016)
关键词 信息安全 风险分析 业务过程 网络分析法(ANP) 资产依赖性 information security risk analysis business process asset dependency
  • 相关文献

参考文献10

  • 1Rikhardsson Pall, Best Peter J, Green Peter et al. Business Process Risk Management, Compliance and Internal Control: A Research Agenda [ EB/OL ]. ( 2006-05-29 ) [ 2015-05-25 ].http://core, ac. uk/download/pdf/7279056, pdf.
  • 2Zur Muehlen M, Rosemann M. Integrating Risks in Business Process Models [ EB/OL ]. ( 2005-05-29 ) [ 2015-05-25 ]. http ://aisel. aisnet, org/acis2005/50/.
  • 3Fergle D'Aubeterre, Lakshmi S. Iyer Rahul Singh. An empirical evaluation of information security awareness levels in designing secure business processes [ EB/OL ]. ( 2009-05-20 ) [ 2015-05- 25 ]. http://delivery, acre. org/10. 1145/1560000/1555641/ al 6- d_aubeterre, pdf.
  • 4余志伟,唐任仲.业务过程元素安全目标分析方法[J].浙江大学学报(工学版),2007,41(8):1244-1248. 被引量:2
  • 5Conforti R, Rosa M L, Fortino G, et al. Real-time risk monitoring in business processes : A sensor-based approach[ J]. Journal of Systems & Software, 2013,86( 11 ) :2939-2965.
  • 6Stefan Fenz, Andreas Ekelhart, Thomas Neubauer. Business Process-Based Resource Importance Determination [ C ]// Proceedings of the 7th International Conference on Business Process Management. Springer-Verlag LNCS, University of Ulm, Ulm, Germany, 2009 : 113-127.
  • 7Suh B,Han I. The IS risk analysis based on a business model [J]. Information & Management, 2003,41 (2) :149-158.
  • 8RHRIG S. Using process models to analyse IT security requirements [ EB/OL ]. [ 2015-05-25 ]. http ://www. ifi. unizh. ch/publications/diss/Jahr_2003/thesis_roehrig, pdf.
  • 9Breu R, Innerhofer-Oberperfler F. Model based business driven IT security analysis [ EB/OL]. ( 2005-08-29 ) [ 2015-06-12 ]. http://citeseerx, ist. psu. edu/showciting? cid=5317990.
  • 10ISO/IEC 27005 : 2008, Information technology-Security techniques-Information security risk management [ S ]. International Organization for Standardization. 2008.

二级参考文献4

  • 1闵京华,马卫国,胡道元.基于信息安全理论和模型的安全需求分析[J].网络安全技术与应用,2004(11):58-60. 被引量:8
  • 2RHRIG S,Using process models to analyse IT security requirements[EB/OL].[2005-04-29].http://www.ifi.unizh.ch/ publications/diss/Jahr_2003/thesis_roehrig.pdf.
  • 3CHOI S,CHAE S,LEE G.SRS-Tool:a security functional requirement specification development tool for application information system of organization[C]∥ Computational Science and Its Applications-ICCSA 2005,Singapore.Berlin/Heidelberg:Lecture Notes in Computer Science,2005(3481):458-467.
  • 4何德全.安全并无绝对[J].信息网络安全,2002(10):23-23. 被引量:1

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部