Risk Assessment of Power Information Risk Security Based on Risk Matrix

被引:0
|
作者
Wang Xu [1 ]
Chen Tao [1 ]
Wang Yujie [2 ]
Guo Qinrui [1 ]
Teng Yangxin [1 ]
机构
[1] State Grid Xinjiang Elect Power Res Inst, Urumqi, Peoples R China
[2] State Grid Urumqi Power Co, Urumqi, Peoples R China
基金
中国国家自然科学基金;
关键词
information security risk risk matrix; Borda count; analytical hierarchy process;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of information, power information security risk management has become more and more important. Based on the analysis of the eight information security risk factors, the author assess intiirm Mimi security risk with the risk matrix method which conceives an assessment model processed by expert 2-dimension matrix, Borda sequence and analytical hierarchy process. An example application shows the total risk level and figure out the biggest risk factor. The research results illustrate the validity and rationality of the above model as well as it will be of much use in improving power information security risk management.
引用
收藏
页码:1494 / 1498
页数:5
相关论文
共 50 条
  • [1] Risk Assessment Model of Information Security for Transportation Industry System Based on Risk Matrix
    Zhao Xiangmo
    Dai Ming
    Ren Shuai
    Li Luyao
    Duan Zongtao
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (03): : 1301 - 1306
  • [2] Risk Assessment for Information Security Based on Fuzzy Membership Matrix
    Bai, Yan
    Yao, Zhong
    Li, Hong
    Zhang, Yong-Qiang
    [J]. NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 547 - +
  • [3] Towards a Risk Assessment Matrix for Information Security Workarounds
    Slabbert, Eugene
    Thomson, Kerry-Lynn
    Futcher, Lynn
    [J]. HUMAN ASPECTS OF INFORMATION SECURITY AND ASSURANCE, HAISA 2021, 2021, 613 : 164 - 178
  • [4] A risk recommendation approach for information security risk assessment
    Chu, Ya-Chi
    Wei, Yu-Chih
    Chang, Wen-Hsuan
    [J]. 2013 15TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2013,
  • [5] Information security risk assessment model for risk management
    Wawrzyniak, Dariusz
    [J]. TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 21 - 30
  • [6] An information security risk assessment method for cloud systems based on risk contagion
    Li, Ziqian
    Tang, Zhenying
    Lv, Jingxian
    Li, Huiqin
    Han, Wei
    Zhang, Zhimin
    [J]. PROCEEDINGS OF 2020 IEEE 5TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2020), 2020, : 83 - 87
  • [7] Power System Risk Security Assessment Based on Maximum Information Entropy Principle
    Zeng, Ke
    Li, Hua-qiang
    Zeng, Meng-jie
    Liu, Pei-qing
    [J]. 2014 INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY (POWERCON), 2014,
  • [8] An Information Security Risk Assessment System Based on Knowledge
    Ma, Jianqiang
    [J]. 2017 4TH ICMIBI INTERNATIONAL CONFERENCE ON TRAINING, EDUCATION, AND MANAGEMENT (ICMIBI-TEM 2017), 2017, 83 : 376 - 381
  • [9] Risk Assessment Method of Information Security Based on AHP
    Ning, Xu
    [J]. PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS I AND II, 2010, : 430 - 433
  • [10] Information Security Risk Assessment in SCM
    Roy, Arup
    Gupta, A. D.
    Deshmukh, S. G.
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM 2013), 2013, : 1002 - 1006