RESEARCH ON INFORMATION SECURITY EVALUATION MODEL OF PUBLIC INSTITUTION

被引:0
|
作者
Feng Hua [1 ]
Wei Weimin [1 ]
Kong Zhiwei [1 ]
Yang Shuo [1 ]
机构
[1] Shanghai Univ Elect Power, Coll Comp Sci & Technol, Shanghai 20090, Peoples R China
关键词
Information Security; Risk Assessment; Risk Value;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the continuous increase of network threats, the state public institutions must carry out risk assessment methods to ensure and improve the information security of public institutions; security system must be consistent with the construction of national information security policies and requirements. The study found that China's public institutions in the information security risk assessment, there are still non-standard assessment criteria, evaluation methods, poor operability and other issues. This paper studies the model based on the level of protection and risk assessment, and puts forward the model based on the level of risk assessment and the risk assessment model. The model is based on the level of risk assessment and the risk assessment model. The evaluation model puts forward the construction process of the security system based on the information security risk assessment.
引用
收藏
页码:247 / 250
页数:4
相关论文
共 50 条
  • [1] Research on Teaching Evaluation Model of Public Security Information Management Course
    Hu, Liang
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY, 2016, 47 : 190 - 192
  • [2] INFORMATION SECURITY TREATMENT ANALYSIS ON A FEDERAL PUBLIC EDUCATION INSTITUTION
    Soares Souza, Jackson Gomes
    Arima, Carlos Hideo
    Belda, Francisco Rolfsen
    [J]. REVISTA IBERO-AMERICANA DE ESTUDOS EM EDUCACAO, 2020, 15 (03): : 1309 - 1321
  • [3] MANAGEMENT OF INFORMATION SECURITY RISKS IN A FEDERAL PUBLIC INSTITUTION: A CASE STUDY
    Soares Souza, Jackson Gomes
    Arima, Carlos Hideo
    Nogueira de Oliveira, Renata Maria
    Akabane, Getulio Kazue
    Galegale, Napoleao Verardi
    [J]. REVISTA ENIAC PESQUISA, 2016, 5 (02): : 240 - 256
  • [4] Research on comprehensive evaluation model of network security based on information entropy
    Zhang, Yi
    [J]. 2021 6TH INTERNATIONAL CONFERENCE ON SMART GRID AND ELECTRICAL AUTOMATION (ICSGEA 2021), 2021, : 401 - 404
  • [5] An active information security model research
    Zhuang, Y
    Liu, J
    Gu, JJ
    Wei, Q
    [J]. PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 282 - 286
  • [6] Research on information security model and security system design
    Huang, Yi-Min
    Ping, Ling-Di
    Pan, Xue-Zeng
    [J]. Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2001, 35 (06): : 603 - 607
  • [7] Research on the Synergetic Model of Collecting Early Warning Information on Public Security Incidents in China
    Zhu Xiao-ning
    Luo Min
    [J]. PROCEEDINGS OF 2015 INTERNATIONAL CONFERENCE ON PUBLIC ADMINISTRATION (11TH) VOL I, 2015, : 745 - 750
  • [8] Research of Information Security Quantitative Evaluation Method
    Zang Wenlong
    [J]. APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 369 - 372
  • [9] Research and application of information security evaluation in website
    Si, Chunjing
    [J]. INFORMATION TECHNOLOGY AND COMPUTER APPLICATION ENGINEERING, 2014, : 65 - 68
  • [10] A performance evaluation of information security training in public sector
    Park S.-K.
    Lee S.-H.
    Kim T.-Y.
    Jun H.-J.
    Kim T.-S.
    [J]. Journal of Computer Virology and Hacking Techniques, 2017, 13 (4) : 289 - 296