Information Security Risk Management Model for Big Data

被引:1
|
作者
Yang, Min [1 ]
机构
[1] Chongqing City Vocat Coll, Chongqing 402160, Peoples R China
关键词
All Open Access; Gold;
D O I
10.1155/2022/3383251
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the current society of rapid expansion of information, big data have achieved vigorous development in all walks of life, considerably promoting data transmission and information sharing. Meanwhile, individuals are becoming increasingly reliant on big data and the Internet, but at the same time, the threat of information security posed by big data is becoming increasingly visible. As a result, how to protect the information security of big data has piqued the interest of both government and businesses. The essence of information security management is risk management, which is closely related to each other. Therefore, this study focuses on the following two aspects of research work. On the one hand, most existing risk management models merely describe risk management in the abstract from a macro-level, and they lack research on risk assessment, making them ineffective. This research builds a novel information security risk management model on the basis of existing risk management models based on the concept of multidimensional risk management. To achieve multidimensional dynamic management of big data risks and to keep them within an acceptable range as much as possible, the model is divided into five levels and two dimensions. On the other hand, this research also optimizes and improves the fuzzy mathematical analysis method and proposes a fuzzy comprehensive assessment method as the core algorithm for the risk assessment layer in the model. As a post-event risk assessment method, the advantage of this method is that it can comprehensively consider factors affecting risk and can quantify some assessment factors in the real network to achieve an effective combination of qualitative and quantitative, thereby providing a basis for decision-making in risk analysis and risk control. Finally, the effectiveness of the risk model in the real application is verified by example analysis, and it is intended that the study work would provide assistance and assurance for big data information security management.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] Information Security in Big Data: Privacy and Data Mining
    Xu, Lei
    Jiang, Chunxiao
    Wang, Jian
    Yuan, Jian
    Ren, Yong
    IEEE ACCESS, 2014, 2 : 1149 - 1176
  • [32] Research on the security technology of big data information
    Zhu, Hong
    Xu, Zheng
    Huang, Yingzhen
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND MANAGEMENT INNOVATION, 2015, 28 : 1041 - 1044
  • [33] The Information Security Risk Management
    Semin, Valeriy G.
    Shmakova, Elena G.
    Los, Lexei B.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE QUALITY MANAGEMENT,TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&QM&IS), 2017, : 106 - 109
  • [34] Information security and risk management
    Bodin, Lawrence D.
    Gordon, Lawrence A.
    Loeb, Martin P.
    COMMUNICATIONS OF THE ACM, 2008, 51 (04) : 64 - 68
  • [35] Research on Information Security in Big Data Era
    Zhou, Linqi
    Gu, Weihong
    Huang, Cheng
    Huang, Aijun
    Bai, Yongbin
    6TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION (CDMMS 2018), 2018, 1967
  • [36] Research on Enterprise Financial Accounting Information Security Model Based on Big Data
    Zhong, Ran
    Zhang, Qianying
    Zhao, Yachao
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [37] Risk Management Model of Information Security in IC Manufacturing Industry
    Dai, Weihui
    Zhu, Qi
    Wang, Chunshi
    Zeng, Yujiao
    JOURNAL OF COMPUTERS, 2012, 7 (02) : 317 - 324
  • [38] INTEGRATED INCIDENT MANAGEMENT MODEL FOR DATA PRIVACY AND INFORMATION SECURITY
    Dombora, Sandor
    XIV INTERNATIONAL MAY CONFERENCE ON STRATEGIC MANAGEMENT, VOL XIV, ISSUE (1) (2018), 2018, 14 (01): : 319 - 328
  • [39] Big Data: A Security Compliance Model
    Gupta, Archana
    Verma, Ajita
    Kalra, Parul
    Kumar, Lokesh
    2014 CONFERENCE ON IT IN BUSINESS, INDUSTRY AND GOVERNMENT (CSIBIG), 2014,
  • [40] Information Security Monitoring and Management Method Based on Big Data in the Internet of Things Environment
    Liang, Wuchao
    Li, Wenning
    Feng, Lili
    IEEE ACCESS, 2021, 9 : 39798 - 39812