期刊文献+

企业信息安全风险及控制策略探究 被引量:3

下载PDF
导出
摘要 随着我国信息化的发展,如今企业在管理工作中对信息技术的运用越来越广泛,由此大大提高了企业管理效率的同时,也造成信息安全的隐藏风险,这对企业造成的危害不可小视。基于此,本篇文章就企业安全风险管理的内容出发,阐述了企业信息安全风险管理存在的问题,并提出了解决措施。
作者 刘志勋
出处 《信息系统工程》 2016年第3期74-74,共1页
  • 相关文献

参考文献1

二级参考文献21

  • 1Bodin L D,Gordon L A,Loeb M EEvaluating information security investments using the analytic hierarchy process[J].Communications of the ACM, 2005,48 (2) : 78-83.
  • 2Gordon L,Loeb M.Budgeting process for information security expenditures[J].Communications of the ACM, 2006, 49 (1) : 121-125.
  • 3Xu X Z.The SIR method:A superiority and inferiority ranking method for multiple criteria decision making[J].European Journal of Operation Research, 2001 ( 131 ) : 587-602.
  • 4Anderson R.Why information security is hard:An economic perspective[C]//Proceedings of the 17th Annual Computer Security Applications Conference,New Orleans,LA,2001:559-566.
  • 5Gordon L,Loeb M,Lucyshyn W.Sharing information on computer systems security:An economic analysis[J].Acc Public Policy, 2003,22(6) :461-485.
  • 6Mercuri R T.Security watch:Analyzing security costs[J].Communications of the ACM,2003,46(6) : 15-18.
  • 7Bistarelli S, Fioravanti F, Peretti RDefense trees for economic evaluation of security investments[C]//Proceedings of the First International Conference on Availability,Reliability and Security, Vienna, 2006: 416-423.
  • 8Cremonini M, Martini EEvaluating information security investments from attackers perspective: The Return-On-Attack (ROA) [C]// Proceedings of the Fourth Workshop on the Economics of Information Security,2005.
  • 9Butler S A.Security attribute evaluation method: A cost-benefit approach[C]//Proc of International Conference on Software Engineering, 2002 : 232-240.
  • 10Hoo K J S.How much is enough? A risk management approach to computer security[D].Stanford University,2000.

共引文献1

同被引文献19

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部