Research on Risk Assessment for Security System Based on Effectiveness Evaluation Theory

被引:0
|
作者
Zheng, Yujie [1 ]
机构
[1] GuangXi Econ Management Cadre Coll, Sch Comp, Nanning 530007, Peoples R China
关键词
security system; risk assessment; effectiveness evaluation theory; protection capability;
D O I
10.1109/ICCSIT.2010.5564938
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the development of security system information degree and protection capability format, it is important to evaluate its effectiveness precisely to prevention and control of social order based on these changes. According to the operational characteristics of security system, protection format is divided into personal protection, physical protection, and electronic protection. Effectiveness evaluation theory is used to measure how the risks were in each protection capability format. Meanwhile a method is put forward to evaluate security system effectiveness, then the conclusion is clear that security system risk is not directly proportional to protection capability, but the speed raising process of "fast-slow-down-stable 0".
引用
收藏
页码:196 / 199
页数:4
相关论文
共 50 条
  • [21] Assessment of the Effectiveness of an Information Security System
    Zegzhda, D. P.
    Saurenko, T. N.
    Anisimov, V. G.
    Anisimov, E. G.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2023, 57 (08) : 855 - 861
  • [22] Assessment of the Effectiveness of an Information Security System
    D. P. Zegzhda
    T. N. Saurenko
    V. G. Anisimov
    E. G. Anisimov
    Automatic Control and Computer Sciences, 2023, 57 : 855 - 861
  • [23] A Study on the Assessment of Power System Security Risk based on Grey Clustering and Maximum Entropy Theory
    Peng, Peng
    Mi Chuanmin
    Liu Sifeng
    Jing, Tao
    2016 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2016, : 3002 - 3007
  • [24] Network Security Evaluation Research Based on Rough Set Theory
    Wang, Xuren
    He, Famei
    Wang, Yanli
    Yuan, Xiaohong
    2011 AASRI CONFERENCE ON APPLIED INFORMATION TECHNOLOGY (AASRI-AIT 2011), VOL 1, 2011, : 302 - 304
  • [25] Research on Network Security Risk Assessment Based on Group Consistency
    Liu Xiang-qin
    Chen Xia
    2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 3, PROCEEDINGS, 2009, : 425 - 428
  • [26] The Research of Information Security Risk Assessment Method Based on AHP
    Xu, Ning
    Zhao, DongMei
    SPORTS MATERIALS, MODELLING AND SIMULATION, 2011, 187 : 575 - 580
  • [27] Research on Assessment Model of Information System Security Based on Various Security Factors
    林梦泉
    朱赟
    王强民
    李建华
    JournalofShanghaiJiaotongUniversity, 2007, (03) : 405 - 409
  • [28] The Information Security Risk Assessment Based on Fuzzy Comprehensive Evaluation
    Li Guohong
    Cai Yongkai
    PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS A-C, 2008, : 2027 - 2031
  • [29] Research on Information Security Risk Evaluation of Cloud Storage System Based on BP-GA
    Kong, Yanfeng
    Jia, LianXing
    Zhang, Jiang
    PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE ON ADVANCED DESIGN AND MANUFACTURING ENGINEERING (ICADME 2017), 2017, 136 : 115 - 118
  • [30] Research on Fuzzy Evaluation for Port Security and Risk Based on AHP
    Zhang, Shukui
    Lu, Ziai
    ADVANCES IN CIVIL ENGINEERING, PTS 1-4, 2011, 90-93 : 2759 - 2764