Research of Information System Security Risk Management based on Probability Model and Security Entropy

被引:0
|
作者
Du, Jiawei [1 ]
Zhou, Ying [1 ]
Guo, Ronghua [1 ]
Zhang, Xing [1 ]
Suo, Guowei [1 ]
机构
[1] Luoyang Elect Equipment Test Ctr, Luoyang 471003, Peoples R China
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nowadays, there is a big challenge on the security risk of information system with the rapid development of network. Computer viruses have brought great intimidation on information systems, which made the loss of worldwide information security moving up. Therefore, more and more people focus on the security problem of information systems, which need our appropriate protection. At first, the principle approach from security risk identification to risk management is proposed. Secondly, an information system security risk management algorithm based on probability model and security entropy is described in detail. Thirdly, a particular system is selected as the example. The whole risk of information system security is modelled and computed according to the risk management computing formula. In accordance with the example, the applicability and feasibility of the probability model is verified. The method proposed in this paper provides some use of reference in the risk management of information system security and execution of security measures.
引用
收藏
页码:414 / 420
页数:7
相关论文
共 50 条
  • [41] Information security management model
    Cribb, T
    Rao, A
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 654 - 657
  • [42] Research on Privacy Security Risk Assessment Method of Mobile Commerce Based on Information Entropy and Markov
    Zhang, Tao
    Zhao, Kun
    Yang, Ming
    Gao, Tilei
    Xie, Wanyu
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [43] Research on network information security model and system construction
    Wang, Haijun
    ICITCE 2015 - 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND CAREER EDUCATION, 2016, 25
  • [44] Complex information system security risk propagation research based on cellular automata
    Li Zhao
    Xu Guo-Ai
    Ban Xiao-Fang
    Zhang Yi
    Hu Zheng-Ming
    ACTA PHYSICA SINICA, 2013, 62 (20)
  • [45] General risk assessment model for information system security
    Chi, Yue
    Zhang, Yong-Zheng
    Yun, Xiao-Chun
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2005, 37 (SUPPL. 1): : 192 - 194
  • [46] Research on Information Security Strategy and Risk Management for Smart Grid
    Wang, Rui
    2014 CHINA INTERNATIONAL CONFERENCE ON ELECTRICITY DISTRIBUTION (CICED), 2014,
  • [47] Statistics Based Information Security Risk Management Methodology
    Saluja, Upasna
    Idris, Dato Norbik Bashah
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (10): : 117 - 123
  • [48] A Novel Security Risk Assessment Model for Information System
    Lv, Huiying
    2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 282 - 287
  • [49] Research on Memory Security Based on Probability
    Zhang Du-le
    Li Zhi-qiang
    INTERNATIONAL CONFERENCE OF CHINA COMMUNICATION (ICCC2010), 2010, : 284 - +
  • [50] Risk Evaluation for Security Network Based on Protection Model and Risk Entropy
    Lv, Haitao
    Hu, Ruimin
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON TEACHING AND COMPUTATIONAL SCIENCE, 2014, : 146 - 149