Study on security risk evaluation model, process and tools of information system

被引:0
|
作者
Zheng, Pei [1 ]
Lai, KinKeung [2 ]
Zhang, Yirong [3 ]
机构
[1] Hunan Univ, Coll Business Adm, Changsha 410082, Hunan, Peoples R China
[2] City Univ Hong Kong, Fac Business, Hong Kong, Hong Kong, Peoples R China
[3] China Elect Equipment & Syst Engn Corp, Res Inst, Beijing 100039, Peoples R China
关键词
risk evaluation; security architecture; asset; vulnerability; threat;
D O I
暂无
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Information security risk evaluation, an important process of information security assure system, plays the key role in security design, construction, operation and maintenance of information system. Based on the security architecture described by security dimension, security layer and security plane, a common information security risk evaluation model is put forward and the risk evaluation technique is presented in this paper. Moreover, the general process of risk evaluation is illustrated in detail.
引用
收藏
页码:47 / +
页数:3
相关论文
共 50 条
  • [1] Risk Evaluation Process Model of Information Security
    Liu Jing
    [J]. 2009 INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION, VOL II, 2009, : 321 - 324
  • [2] Evaluation of the Risk and Security Overlay of ArchiMate to model Information System Security Risks
    Mayer, Nicolas
    Feltus, Christophe
    [J]. PROCEEDINGS OF THE 2017 IEEE 21ST INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS AND DEMONSTRATIONS (EDOCW 2017), 2017, : 106 - 116
  • [3] A Synthesized Risk Evaluation Model of Information Security
    Zhao Jinhui
    Wen Chao
    Qian Xu
    Zhang Juncai
    [J]. 2009 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, VOL I, PROCEEDINGS, 2009, : 305 - 308
  • [4] A Study of Information Security Evaluation and Risk Assessment
    Li, Jingyi
    Chao, Shiwei
    Huo, Minxia
    [J]. 2015 FIFTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2015, : 1909 - 1912
  • [5] An Information System Security Risk Assessment Model Based on Fuzzy Analytic Hierarchy Process
    Liu Dong-liang
    Yang Shi-song
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 874 - 877
  • [6] Collaborative Information System Monitoring and Evaluation Tools Model
    Wahyudin, Asep
    Siregar, Herbert
    Balqis, Siti Bati'ah
    [J]. 2020 6TH INTERNATIONAL CONFERENCE ON SCIENCE IN INFORMATION TECHNOLOGY (ICSITECH): EMBRACING INDUSTRY 4.0: TOWARDS INNOVATION IN DISASTER MANAGEMENT, 2020, : 159 - 164
  • [7] General risk assessment model for information system security
    Chi, Yue
    Zhang, Yong-Zheng
    Yun, Xiao-Chun
    [J]. Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2005, 37 (SUPPL. 1): : 192 - 194
  • [8] A Novel Security Risk Assessment Model for Information System
    Lv, Huiying
    [J]. 2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 282 - 287
  • [9] A Practical Security Risk Analysis Process and Tool for Information System
    Chung, YoonJung
    Kim, InJung
    Lee, DoHoon
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2006, 2 (02): : 95 - 100
  • [10] An Application Security Model Based on Business Process in Information System
    Xu, Peng
    Chen, Meirong
    Feng, Lifang
    Wu, Guanfeng
    Ma, Fangli
    Wang, Danchen
    [J]. 2017 12TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND KNOWLEDGE ENGINEERING (IEEE ISKE), 2017,