Risk Assessment of Power Information Risk Security Based on Risk Matrix

被引:0
|
作者
Wang Xu [1 ]
Chen Tao [1 ]
Wang Yujie [2 ]
Guo Qinrui [1 ]
Teng Yangxin [1 ]
机构
[1] State Grid Xinjiang Elect Power Res Inst, Urumqi, Peoples R China
[2] State Grid Urumqi Power Co, Urumqi, Peoples R China
基金
中国国家自然科学基金;
关键词
information security risk risk matrix; Borda count; analytical hierarchy process;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of information, power information security risk management has become more and more important. Based on the analysis of the eight information security risk factors, the author assess intiirm Mimi security risk with the risk matrix method which conceives an assessment model processed by expert 2-dimension matrix, Borda sequence and analytical hierarchy process. An example application shows the total risk level and figure out the biggest risk factor. The research results illustrate the validity and rationality of the above model as well as it will be of much use in improving power information security risk management.
引用
收藏
页码:1494 / 1498
页数:5
相关论文
共 50 条
  • [21] An approach to support information security risk assessment
    Genchev, Petko
    [J]. PROCEEDINGS OF THE 2020 INTERNATIONAL CONFERENCE ON BIOMEDICAL INNOVATIONS AND APPLICATIONS (BIA 2020), 2020, : 125 - 128
  • [22] Information Security Risk Assessment of Commercial Organizations
    Kupriyanov, A. O.
    Babenko, A. A.
    Bakhracheva, Y. S.
    [J]. PHYSICS, TECHNOLOGIES AND INNOVATION (PTI-2019), 2019, 2174
  • [23] Information Security Risk Assessment: A Method Comparison
    Wangen, Gaute
    [J]. COMPUTER, 2017, 50 (04) : 52 - 61
  • [24] Theory and methods of information security risk assessment
    Min, Jinghua
    Zhang, Jianjun
    [J]. Qinghua Daxue Xuebao/Journal of Tsinghua University, 2010, 50 (SUPPL. 1): : 1554 - 1559
  • [25] Risk assessment model of information security SVRAMIS
    [J]. Wu, D. (jump_wude@163.com), 2013, Science Press (40):
  • [26] Taxonomy of information security risk assessment (ISRA)
    Shameli-Sendi, Alireza
    Aghababaei-Barzegar, Rouzbeh
    Cheriet, Mohamed
    [J]. COMPUTERS & SECURITY, 2016, 57 : 14 - 30
  • [27] On the role of the Facilitator in information security risk assessment
    Coles-Kemp, Lizzie
    Overill, Richard E.
    [J]. JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2007, 3 (02): : 143 - 148
  • [28] Risk assessment of human error in information security
    Cheng, Xiang-Yun
    Wang, Ying-Mei
    Xu, Zi-Ling
    [J]. PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 3573 - +
  • [29] A Study of Information Security Evaluation and Risk Assessment
    Li, Jingyi
    Chao, Shiwei
    Huo, Minxia
    [J]. 2015 FIFTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2015, : 1909 - 1912
  • [30] Information security risk assessment, aggregation, and mitigation
    Lenstra, A
    Voss, T
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 391 - 401