Information Security Risk Management Model for Big Data

被引:1
|
作者
Yang, Min [1 ]
机构
[1] Chongqing City Vocat Coll, Chongqing 402160, Peoples R China
关键词
All Open Access; Gold;
D O I
10.1155/2022/3383251
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the current society of rapid expansion of information, big data have achieved vigorous development in all walks of life, considerably promoting data transmission and information sharing. Meanwhile, individuals are becoming increasingly reliant on big data and the Internet, but at the same time, the threat of information security posed by big data is becoming increasingly visible. As a result, how to protect the information security of big data has piqued the interest of both government and businesses. The essence of information security management is risk management, which is closely related to each other. Therefore, this study focuses on the following two aspects of research work. On the one hand, most existing risk management models merely describe risk management in the abstract from a macro-level, and they lack research on risk assessment, making them ineffective. This research builds a novel information security risk management model on the basis of existing risk management models based on the concept of multidimensional risk management. To achieve multidimensional dynamic management of big data risks and to keep them within an acceptable range as much as possible, the model is divided into five levels and two dimensions. On the other hand, this research also optimizes and improves the fuzzy mathematical analysis method and proposes a fuzzy comprehensive assessment method as the core algorithm for the risk assessment layer in the model. As a post-event risk assessment method, the advantage of this method is that it can comprehensively consider factors affecting risk and can quantify some assessment factors in the real network to achieve an effective combination of qualitative and quantitative, thereby providing a basis for decision-making in risk analysis and risk control. Finally, the effectiveness of the risk model in the real application is verified by example analysis, and it is intended that the study work would provide assistance and assurance for big data information security management.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] Information Security in Big Data Mining
    Revathi, T.
    Sudharsana, V
    2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 2045 - 2049
  • [22] RETRACTED: Model Design of Big Data Information Security Management Based on the Internet of Things (Retracted Article)
    Yao, Jian
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [23] A Meta-analysis of Big Data Security: How the Government Formulates a Model of Public Information and Security Assurance into Big Data
    Nurmandi, Achmad
    Kurniawan, Danang
    Misran
    Salahudin
    HCI INTERNATIONAL 2021 - LATE BREAKING POSTERS, HCII 2021, PT II, 2021, 1499 : 472 - 479
  • [24] A situation awareness model for information security risk management
    Webb, Jeb
    Ahmad, Atif
    Maynard, Sean B.
    Shanks, Graeme
    COMPUTERS & SECURITY, 2014, 44 : 1 - 15
  • [25] Fuzzy OWA Model for Information Security Risk Management
    Imamverdiev, Ya. N.
    Derakshande, S. A.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2011, 45 (01) : 20 - 28
  • [26] Assets Dependencies Model in Information Security Risk Management
    Breier, Jakub
    Schindler, Frank
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 405 - 412
  • [27] A Quantitative Model for Information-Security Risk Management
    Bojanc, Rok
    Jerman-Blazic, Borka
    ENGINEERING MANAGEMENT JOURNAL, 2013, 25 (02) : 25 - 37
  • [28] An Information Security Risk Management Model for Smart Industries
    Sohrabi Safa, Nader
    Maple, Carsten
    Watson, Tim
    ADVANCES IN MANUFACTURING TECHNOLOGY XXXI, 2017, 6 : 257 - 262
  • [29] DATABASE ACCESS INFORMATION SECURITY MANAGEMENT SIMULATION UNDER BIG DATA PLATFORM
    Li, Zhaocui
    Wang, Dan
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (03): : 1841 - 1851
  • [30] DATABASE ACCESS INFORMATION SECURITY MANAGEMENT SIMULATION UNDER BIG DATA PLATFORM
    Li Z.
    Wang D.
    Scalable Computing, 2024, 25 (03): : 1841 - 1851