Risk Assessment of Power Information Risk Security Based on Risk Matrix

被引:0
|
作者
Wang Xu [1 ]
Chen Tao [1 ]
Wang Yujie [2 ]
Guo Qinrui [1 ]
Teng Yangxin [1 ]
机构
[1] State Grid Xinjiang Elect Power Res Inst, Urumqi, Peoples R China
[2] State Grid Urumqi Power Co, Urumqi, Peoples R China
基金
中国国家自然科学基金;
关键词
information security risk risk matrix; Borda count; analytical hierarchy process;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of information, power information security risk management has become more and more important. Based on the analysis of the eight information security risk factors, the author assess intiirm Mimi security risk with the risk matrix method which conceives an assessment model processed by expert 2-dimension matrix, Borda sequence and analytical hierarchy process. An example application shows the total risk level and figure out the biggest risk factor. The research results illustrate the validity and rationality of the above model as well as it will be of much use in improving power information security risk management.
引用
收藏
页码:1494 / 1498
页数:5
相关论文
共 50 条
  • [31] On the role of the Facilitator in information security risk assessment
    Lizzie Coles-Kemp
    Richard E. Overill
    [J]. Journal in Computer Virology, 2007, 3 (2): : 143 - 148
  • [32] Electric power information system security risk assessment based on fuzzy rating multilevel analysis
    Wang, Chen
    [J]. 2013 2ND INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION AND MEASUREMENT, SENSOR NETWORK AND AUTOMATION (IMSNA), 2013, : 771 - 774
  • [33] Security Region Based Dynamic Security Risk Assessment of Power Transmission System
    Wang, Dongtao
    Yu, Yixin
    [J]. MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 2687 - +
  • [34] Risk based voltage security assessment
    Wan, H
    McCalley, JD
    Vittal, V
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2000, 15 (04) : 1247 - 1254
  • [35] A Method of Risk Assessment of Information Security Based on Artificial Neural Network
    Zhao, D. M.
    Liu, J. X.
    Zu, J. X.
    [J]. ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 1, 2008, : 246 - 252
  • [36] Gray Relational Analysis based Method for Information Security Risk Assessment
    Zhou, Li
    Zhou, Yanhui
    [J]. PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1086 - 1089
  • [37] Risk assessment of complex information system security based on threat propagation
    [J]. Shi, Z. (shizz@ics.ict.ac.cn), 1600, Tsinghua University (54):
  • [38] Dynamic Assessment and VaR-based Quantification of Information Security Risk
    Qi, Wenjing
    Liu, Xue
    Zhang, Jian
    Yuan, Weihua
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 145 - 148
  • [39] Information Security Risk Assessment Based on Artificial Immune Danger Theory
    Zhuang, Yi
    Li, Xiaorong
    Xu, Bin
    Zhou, Bo
    [J]. 2009 FOURTH INTERNATIONAL MULTI-CONFERENCE ON COMPUTING IN THE GLOBAL INFORMATION TECHNOLOGY (ICCGI 2009), 2009, : 169 - 174
  • [40] The model of information security risk assessment based on advanced evidence theory
    Qing H.
    Qingsheng X.
    Shaobo L.
    [J]. International Journal of System Assurance Engineering and Management, 2017, 8 (Suppl 3) : 2030 - 2035