期刊文献+

基于风险偏好的信息系统安全技术策略研究 被引量:5

A research on the information system security technology strategy based on risk preference
原文传递
导出
摘要 以IDSs和人工调查技术组合为例,通过构建博弈模型,分析了基于风险偏好的信息系统安全技术选择与配置策略,认为组织信息系统安全技术的选择与配置不仅受其自身风险偏好影响,同时还受黑客风险偏好影响。研究结论显示:组织在黑客期望收益很低时对风险厌恶型黑客的人工调查率更高,而在黑客期望收益很高时对风险中立型黑客的调查率更高;黑客在组织人工调查成本较低时更倾向于入侵风险中立型组织,在人工调查成本很高时更愿意入侵风险厌恶型组织;多IDSs的防护效率并非总是优于单IDS,组织在两者之间选择时取防护效率高者,而不受风险偏好影响。 By taking the IDSs and manual investigation technology portfolio as the example and by constructing the game model,the selection and configuration of information system security technologies on the basis of risk preference was analyzed through a game model,considering that an organization's information system security technology strategy was not only influenced by its own risk preference,but also by the hacker's. The conclusions of this paper show us that organizations would investigate risk aversion hackers manually more than risk neutral ones when the hackers' expected revenues are very low,otherwise they would investigate risk neutral hackers manually more; hackers would intrude risk neutral organizations more probably when the costs of manual investigation are low,otherwise they would intrude risk aversion organizations more; the protective efficiency of deploying multiple IDSs is not always higher than deploying single one,and the technology portfolio with higher protective efficiency would be chosen by organizations,which is not influenced by risk preferences.
出处 《科研管理》 CSSCI CSCD 北大核心 2017年第12期165-172,共8页 Science Research Management
基金 国家自然科学基金资助项目(71071033) 扬州大学人文社科研究基金项目(xjj2016-38)
关键词 信息系统安全 安全技术策略 人工调查 配置 风险偏好 information system security security technology strategy manual investigation configuration risk preference
  • 相关文献

参考文献3

二级参考文献32

  • 1温忠麟,侯杰泰,张雷.调节效应与中介效应的比较和应用[J].心理学报,2005,37(2):268-274. 被引量:3132
  • 2方阳春,姚先国,赖普清.上市高新企业高管薪酬及其效应的实证研究[J].科研管理,2007,28(4):126-133. 被引量:30
  • 3徐南荣 仲伟俊.科学决策理论与方法[M].南京:东南大学出版社,1996.2-10.
  • 4Holden G. Guide to Firewalls and Network Security[M]. Boston: Course Technology, 2004.
  • 5Neumarm P, Porras P. Experience with emerald to date[C]//Proceedings of 1st USENIX Workshop Conference. Santa Clara: Intru- sion Detection Network Monitoring, 1999: 73-80.
  • 6Huseyin C, Srinivasan R. Configuration of detection software: A comparison of decision and game theory approach[J]. Decision Analysis, 2004, 1(3): 131-148.
  • 7Alpcan T, Basar T. A game theoretic approach to decision and analysis in network intrusion detection[C]//Proceedings of 42nd IEEE Conference Decision and Control. Hawaii: 2003: 2595-2600.
  • 8Ross A, Tyler M. The economics of information security: A survey and open questions[J]. Science, 2006, 314(27): 610-613. 8.
  • 9Chen L, Jean L. A game theoretical framework on intrusion detection in heterogeneous networks[J]. IEEE Transactions on Informa- tion Forensics and Security, 2009, 4(2): 165-17.
  • 10Hasan C, Huseyin C, Zhang Jun. Security patch management: Share the burden or share the damage[J]. Management science, 2008, 54(4): 657-670.

共引文献25

同被引文献52

引证文献5

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部