期刊文献+

黑客随机攻击下的企业信息系统安全投资策略 被引量:1

Enterprise Information System Security Investment Strategies in Consideration of Opportunistic Attacks Based on Evolutionary Game Theory
下载PDF
导出
摘要 在企业信息系统安全投资策略研究中,黑客攻击方式是企业投资决策需要考虑的重要因素。本文采用演化博弈理论,通过构建企业群体与黑客群体的动态博弈模型,对黑客随机攻击情形下企业与黑客的演化稳定策略进行了求解,并分析了黑客攻击概率、企业网络对外联接度和安全投资效率等因素对演化稳定策略的影响。研究表明:在黑客随机攻击情形下,为改变对企业不利的稳定策略,企业成本过高时,可以在估计黑客攻击概率的基础上,通过调整网络对外联接度、潜在损失和安全投资效率的关系来达到降低投资成本和提高企业信息系统安全水平的目的。 In the research of enterprise information system security investment strategy,the type of hacker attacks is an important factor to consider in enterprise investment decision.This paper uses the evolutionary game theory to construct a dynamic game model between enterprise group and hacker group to solve the evolutionary stability strategies of enterprises and hackers under opportunistic attack and analyze the impact of factors such as the hacker attack probability,enterprise network exposure degree and security investment efficiency on evolutionary stability strategies.It is found that,to change the adverse stability strategy for enterprises,when the enterprise cost is too high,it's better for enterprises to adjust the relation of network exposure degree,potential losses and security investment efficiency to reduce investment costs and improve the level of enterprise information system security based on estimating attack probability in the case of opportunistic attacks.
作者 潘崇霞 周玮 李立望 谢吉刚 Pan Chongxia;Zhou Wei;Li Liwang;Xie Jigang
出处 《企业经济》 北大核心 2021年第11期52-63,共12页 Enterprise Economy
基金 南京工业职业技术大学引进人才科研启动基金项目“不同关联安全风险情形下的企业信息系统安全投资策略研究”(项目编号:YK20-07-01) 江苏高校哲学社会科学一般项目“基于网络平台信息共享下的关联企业信息系统安全投资策略研究”(项目编号:2021SJA0663) 教育部人文社会科学研究规划基金“乡村旅游地文化韧性:测度、形成机制与提升策略研究”(项目编号:21YJA630125) 江苏高校哲学社会科学重大项目“新时代文旅融合视域下乡村文化振兴机制和模式研究”(项目编号:2019SJZDA134)。
关键词 信息系统安全投资策略 随机攻击 关联性 演化博弈 information system security investment strategies opportunistic attack interdependency evolutionary game
  • 相关文献

参考文献1

二级参考文献18

  • 1刘彤.构造复杂信息系统安全基线的研究[J].中国管理科学,2000,8(S1):636-644. 被引量:5
  • 2Information technology-Guidelines forthe management of IT Security:ISO/IEC TR 13335[S].
  • 3AS/NZS4360:1999 Risk Management Standard[S].
  • 4ISO/IEC 17799 Information security management-part 1:Code of practice for informationsecurity management[S].
  • 5Enders,W.and Sandler,T.Transnational terrorism 1968 -2000:Thresholds,persistence,andforecasts[J].Southern Economic Journal,2005,(1):467-483
  • 6Sandler,T.,A roe M.Pure public goods versus commons:Benefit-cost duality[J].LandEconomics,2003,79 (3):355-368
  • 7Sandler,T.,Lapan,H.E.The calculus of dissent:An analysis of terrorists' choice of targets[J].Synthese,1988,76(2):245-261.
  • 8Orszag,Peter,Stiglitz,et al.Optimal Fire Departments:Evaluating Public Policy in the Face of Externalities[C].Brookings Working Paper,2002,January.
  • 9Kunreuther,Howard,Onculer,et al.Time Insensitivity for Protective Measures[J].Journal of Risk and Uncertainty,1998,16:279-299.
  • 10Heal,Geoffrey,Kunreuther,et al.You Only Die Once:The General Case of Interdependent Security[C].Wharton Risk Management and Decision Processes Center Working Paper Philadelphia:University of Pennsylvania,2002.

共引文献13

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部