Research on Risk Assessment for Security System Based on Effectiveness Evaluation Theory

被引:0
|
作者
Zheng, Yujie [1 ]
机构
[1] GuangXi Econ Management Cadre Coll, Sch Comp, Nanning 530007, Peoples R China
关键词
security system; risk assessment; effectiveness evaluation theory; protection capability;
D O I
10.1109/ICCSIT.2010.5564938
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the development of security system information degree and protection capability format, it is important to evaluate its effectiveness precisely to prevention and control of social order based on these changes. According to the operational characteristics of security system, protection format is divided into personal protection, physical protection, and electronic protection. Effectiveness evaluation theory is used to measure how the risks were in each protection capability format. Meanwhile a method is put forward to evaluate security system effectiveness, then the conclusion is clear that security system risk is not directly proportional to protection capability, but the speed raising process of "fast-slow-down-stable 0".
引用
收藏
页码:196 / 199
页数:4
相关论文
共 50 条
  • [31] Research on the Security Risk Assessment System for Regional Complex Power Grid
    Yan, Faqi
    Yin, Xianggen
    Wang, Yang
    Li, Jinhui
    Yang, Wen
    Xu, Biao
    Jian, Cheng
    2015 5TH INTERNATIONAL CONFERENCE ON ELECTRIC UTILITY DEREGULATION AND RESTRUCTURING AND POWER TECHNOLOGIES (DRPT 2015), 2015, : 1 - 4
  • [32] Research on the Quantitative Methods of Classified Information System Security Risk Assessment
    Zhang, Kang
    Shao, Liping
    LISS 2014, 2015, : 571 - 575
  • [33] Research on information system risk analysis and security situation assessment method
    Wang, Sheng
    Zhang, LinHao
    Zhang, Jie
    Tang, Yong
    Liang, YunHui
    Journal of Physics: Conference Series, 2021, 1792 (01):
  • [34] Security Region Based Dynamic Security Risk Assessment of Power Transmission System
    Wang, Dongtao
    Yu, Yixin
    MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 2687 - +
  • [35] Research on technology for IT system security assessment based on Markov chain
    Li Hetian
    Liu Yun
    He Dequan
    2006 8TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-4, 2006, : 2563 - +
  • [36] Protection Intensity Evaluation for a Security System Based on Entropy Theory
    Lv, Haitao
    Hu, Ruimin
    Chen, Jun
    He, Zheng
    Chen, Shihong
    ENTROPY, 2013, 15 (07): : 2766 - 2787
  • [37] Information Security Risk Assessment Based on Artificial Immune Danger Theory
    Zhuang, Yi
    Li, Xiaorong
    Xu, Bin
    Zhou, Bo
    2009 FOURTH INTERNATIONAL MULTI-CONFERENCE ON COMPUTING IN THE GLOBAL INFORMATION TECHNOLOGY (ICCGI 2009), 2009, : 169 - 174
  • [38] Grey Evaluation Method on Security Risk Assessment of Power Information System
    Liu, Ren
    Niu, Dongxiao
    APPLIED MECHANICS AND MECHANICAL ENGINEERING, PTS 1-3, 2010, 29-32 : 2157 - 2163
  • [39] The model of information security risk assessment based on advanced evidence theory
    Qing H.
    Qingsheng X.
    Shaobo L.
    International Journal of System Assurance Engineering and Management, 2017, 8 (Suppl 3) : 2030 - 2035
  • [40] Research of Information Security Risk Prediction based on Grey Theory and ANP
    Yu, Qian
    Shen, Yongjun
    PROCEEDINGS OF 2016 IEEE ADVANCED INFORMATION MANAGEMENT, COMMUNICATES, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IMCEC 2016), 2016, : 107 - 113