Risk Assessment of Power Information Risk Security Based on Risk Matrix

被引:0
|
作者
Wang Xu [1 ]
Chen Tao [1 ]
Wang Yujie [2 ]
Guo Qinrui [1 ]
Teng Yangxin [1 ]
机构
[1] State Grid Xinjiang Elect Power Res Inst, Urumqi, Peoples R China
[2] State Grid Urumqi Power Co, Urumqi, Peoples R China
基金
中国国家自然科学基金;
关键词
information security risk risk matrix; Borda count; analytical hierarchy process;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of information, power information security risk management has become more and more important. Based on the analysis of the eight information security risk factors, the author assess intiirm Mimi security risk with the risk matrix method which conceives an assessment model processed by expert 2-dimension matrix, Borda sequence and analytical hierarchy process. An example application shows the total risk level and figure out the biggest risk factor. The research results illustrate the validity and rationality of the above model as well as it will be of much use in improving power information security risk management.
引用
收藏
页码:1494 / 1498
页数:5
相关论文
共 50 条
  • [41] A Method for Information Security Risk Assessment Based on the Dynamic Bayesian Network
    Wang, Jiao
    Fan, Kefeng
    Mo, Wei
    Xu, Dongyang
    [J]. PROCEEDINGS 2016 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS NANA 2016, 2016, : 279 - 283
  • [42] Study on risk assessment of information security based on cloud computing model
    Wu, Guo-Hua
    Liu, Yu-Cheng
    Qi, Kai-Kai
    Wang, Peng
    Xu, Jian-Da
    [J]. Proceedings of the 2016 International Conference on Engineering and Advanced Technology, 2016, 82 : 91 - 95
  • [43] A novel fuzzy risk matrix based risk assessment approach
    Can, Gulin Feryal
    Toktas, Pelin
    [J]. KYBERNETES, 2018, 47 (09) : 1721 - 1751
  • [44] Risk communication, risk perception and information security
    Pattinson, M
    Anderson, G
    [J]. Security Management, Integrity, and Internal Control in Information Systems, 2005, 193 : 175 - 184
  • [45] Collective information structuremodel for information security risk assessment (ISRA)
    University Tun Hussein Onn Malaysia , Johor, Malaysia
    不详
    不详
    [J]. J. Syst. Inf. Technol., 2 (193-219):
  • [46] Overview of Enterprise Information Needs in Information Security Risk Assessment
    Korman, Matus
    Ekstedt, Mathias
    Sommestad, Teodor
    Hallberg, Jonas
    Bengtsson, Johan
    [J]. PROCEEDINGS OF THE 2014 IEEE 18TH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE (EDOC 2014), 2014, : 42 - 51
  • [47] Automation security - Risk assessment - Methods for risk assessment
    Runde, Markus
    Speth, Walter
    Steffen, Thomas
    Thiel, Christoph
    [J]. ATP EDITION, 2016, (1-2): : 48 - 55
  • [48] Risk Based Static Security Assessment in a Practical Interconnected Power System
    Marsadek, M.
    Mohamed, A.
    Nizam, M.
    Norpiah, Z. M.
    [J]. 2008 IEEE 2ND INTERNATIONAL POWER AND ENERGY CONFERENCE: PECON, VOLS 1-3, 2008, : 1613 - 1616
  • [49] Review of static risk-based security assessment in power system
    Bhuiyan, Md Zakirul Alam
    Anders, George J.
    Philhower, Jason
    Du, Songhuai
    [J]. IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2019, 4 (03) : 233 - 239
  • [50] Risk theory based on-line power system security assessment
    Bi, Tianshu
    Qin, Xiaohui
    He, Renmu
    Yang, Qixun
    [J]. 2008 THIRD INTERNATIONAL CONFERENCE ON ELECTRIC UTILITY DEREGULATION AND RESTRUCTURING AND POWER TECHNOLOGIES, VOLS 1-6, 2008, : 704 - 708