RESEARCH ON INFORMATION SECURITY EVALUATION MODEL OF PUBLIC INSTITUTION

被引:0
|
作者
Feng Hua [1 ]
Wei Weimin [1 ]
Kong Zhiwei [1 ]
Yang Shuo [1 ]
机构
[1] Shanghai Univ Elect Power, Coll Comp Sci & Technol, Shanghai 20090, Peoples R China
关键词
Information Security; Risk Assessment; Risk Value;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the continuous increase of network threats, the state public institutions must carry out risk assessment methods to ensure and improve the information security of public institutions; security system must be consistent with the construction of national information security policies and requirements. The study found that China's public institutions in the information security risk assessment, there are still non-standard assessment criteria, evaluation methods, poor operability and other issues. This paper studies the model based on the level of protection and risk assessment, and puts forward the model based on the level of risk assessment and the risk assessment model. The model is based on the level of risk assessment and the risk assessment model. The evaluation model puts forward the construction process of the security system based on the information security risk assessment.
引用
收藏
页码:247 / 250
页数:4
相关论文
共 50 条
  • [31] Research on Information Security Assurance Model of Telecommunication Network
    Zhao, Ling
    Xu, Hong-ke
    Qian, Chao
    [J]. 2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL VIII, 2010, : 184 - 187
  • [32] Research of WeChat Public Number's Security of Power Information System
    Gao Peng
    Shi Cong-cong
    Fan Jie
    [J]. PROCEEDINGS OF THE 2015 JOINT INTERNATIONAL MECHANICAL, ELECTRONIC AND INFORMATION TECHNOLOGY CONFERENCE (JIMET 2015), 2015, 10 : 1026 - 1030
  • [33] Information Security Readiness of Government Institution in Indonesia
    Kautsarina
    Gautama, Hasyim
    [J]. 2014 2ND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2014,
  • [34] A security evaluation model and toolkit for enterprise information systems
    Yan, Q.
    [J]. FRONTIERS IN ENTERPRISE INTEGRATION, 2008, : 27 - 32
  • [35] AN EVALUATION MODEL OF INFORMATION SECURITY MANAGEMENT OF MEDICAL STAFF
    Liao, Kuo-Hsiung
    Chueh, Hao-En
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (11): : 7865 - 7873
  • [36] A multifaceted, evaluation of the reference model of information assurance & security
    Cherdantseva, Yulia
    Hilton, Jeremy
    Rana, Omer
    Ivins, Wendy
    [J]. COMPUTERS & SECURITY, 2016, 63 : 45 - 66
  • [37] Research on Assessment Model of Information System Security Based on Various Security Factors
    林梦泉
    朱赟
    王强民
    李建华
    [J]. Journal of Shanghai Jiaotong University(Science), 2007, (03) : 405 - 409
  • [38] Research on Security Evaluation of Modern Information Service Industry in China
    Li Menggang
    Chen Fenfei
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (07): : 383 - 391
  • [39] A Preliminary Study for the Research Model of Educational Action in Public Security
    Yin, Wei-wei
    [J]. INTERNATIONAL CONFERENCE ON SOCIAL, EDUCATION AND MANAGEMENT ENGINEERING (SEME 2014), 2014, : 502 - 505
  • [40] Evaluation of the Risk and Security Overlay of ArchiMate to model Information System Security Risks
    Mayer, Nicolas
    Feltus, Christophe
    [J]. PROCEEDINGS OF THE 2017 IEEE 21ST INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS AND DEMONSTRATIONS (EDOCW 2017), 2017, : 106 - 116