The Application of Cloud Matter - element in Information Security Risk Assessment

被引:0
|
作者
Dai Zong-you [1 ]
Zhang Wen-long [1 ]
Shen Yan-an [1 ]
Wang Hai-tao [1 ]
机构
[1] Amry Officer Acad PLA, Force Management & Humanities Dept, Hefei, Anhui, Peoples R China
关键词
cloud matter-element; information security; risk assessment; evaluation method;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes an improved cloud-element model for information security risk assessment. Combined with the characteristics of dynamic balance of information security risk, we propose the control means and uncontrollable factors as information security risk evaluation index. The method of constructing the sample cloud has been expatiated, and the correlation between the cloud droplet and the sample cloud and the grade limit cloud has been analyzed. The weights have been calculated by using the comprehensive weight method. Finally, an example has been used to verify it.
引用
收藏
页码:218 / 222
页数:5
相关论文
共 50 条
  • [1] Campus Network Information Security Risk Assessment Based on FAHP and Matter Element Model
    Geng, Fangfang
    Ruan, Xiaolong
    [J]. INTELLIGENT COMPUTING METHODOLOGIES, ICIC 2017, PT III, 2017, 10363 : 298 - 306
  • [2] An information security risk assessment method for cloud systems based on risk contagion
    Li, Ziqian
    Tang, Zhenying
    Lv, Jingxian
    Li, Huiqin
    Han, Wei
    Zhang, Zhimin
    [J]. PROCEEDINGS OF 2020 IEEE 5TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2020), 2020, : 83 - 87
  • [3] An Application of Probabilistic Risk Assessment to Information Security Audit
    Satoh, Naoki
    Kumamoto, Hiromitsu
    [J]. AIC '09: PROCEEDINGS OF THE 9TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED INFORMATICS AND COMMUNICATIONS: RECENT ADVANCES IN APPLIED INFORMAT AND COMMUNICATIONS, 2009, : 436 - +
  • [4] Security and Risk Assessment in the Cloud
    Madria, Sanjay K.
    [J]. COMPUTER, 2016, 49 (09) : 110 - 113
  • [5] Information Security Risk Assessment Methods in Cloud Computing: Comprehensive Review
    Ali, Tarek
    Al-Khalidi, Mohammed
    Al-Zaidi, Rabab
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,
  • [6] Study on risk assessment of information security based on cloud computing model
    Wu, Guo-Hua
    Liu, Yu-Cheng
    Qi, Kai-Kai
    Wang, Peng
    Xu, Jian-Da
    [J]. Proceedings of the 2016 International Conference on Engineering and Advanced Technology, 2016, 82 : 91 - 95
  • [7] How Much Matter Probabilities in Information Security Quantitative Risk Assessment?
    Devos, Jan
    Munteanu, Adrian
    Fotache, Doina
    [J]. CREATING GLOBAL COMPETITIVE ECONOMIES: 2020 VISION PLANNING & IMPLEMENTATION, VOLS 1-3, 2013, : 45 - 57
  • [8] Application of Fuzzy Logic in the Process of Information Security Risk Assessment
    Kokles, Mojmir
    Filanova, Jana
    Korcek, Frantisek
    [J]. INNOVATION MANAGEMENT AND EDUCATION EXCELLENCE VISION 2020: FROM REGIONAL DEVELOPMENT SUSTAINABILITY TO GLOBAL ECONOMIC GROWTH, VOLS I - VI, 2016, : 1078 - 1088
  • [9] Analysis of Information Security Risk and Application Security of Cloud Computing from the Aspect of Hierarchical Protection
    Li, Zhao
    [J]. PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, MACHINERY AND ENERGY ENGINEERING (MSMEE 2017), 2017, 123 : 1521 - 1526
  • [10] Security Risk Assessment of Cloud Carrier
    Lenkala, Swetha Reddy
    Shetty, Sachin
    Xiong, Kaiqi
    [J]. PROCEEDINGS OF THE 2013 13TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID 2013), 2013, : 442 - 449