Research on Risk Assessment for Security System Based on Effectiveness Evaluation Theory

被引:0
|
作者
Zheng, Yujie [1 ]
机构
[1] GuangXi Econ Management Cadre Coll, Sch Comp, Nanning 530007, Peoples R China
关键词
security system; risk assessment; effectiveness evaluation theory; protection capability;
D O I
10.1109/ICCSIT.2010.5564938
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the development of security system information degree and protection capability format, it is important to evaluate its effectiveness precisely to prevention and control of social order based on these changes. According to the operational characteristics of security system, protection format is divided into personal protection, physical protection, and electronic protection. Effectiveness evaluation theory is used to measure how the risks were in each protection capability format. Meanwhile a method is put forward to evaluate security system effectiveness, then the conclusion is clear that security system risk is not directly proportional to protection capability, but the speed raising process of "fast-slow-down-stable 0".
引用
收藏
页码:196 / 199
页数:4
相关论文
共 50 条
  • [41] Research on the evaluation of security risk for e-government information system
    Liu, Ming-Sheng
    Sun, Shu-Jin
    Yin, Xiao-Hua
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 1404 - +
  • [42] Research of Information Security Risk Management Based on Statistical Learning Theory
    Zhao Li
    Wu Yongchun
    Wu Xuexia
    2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 436 - 438
  • [43] Research on the Assessment of China's Energy Security Risk and Grey Model Based Early Warning System
    Wang Shuzhen
    Wei Hua
    He Jingfeng
    ADVANCES IN MANAGEMENT OF TECHNOLOGY, PT 2, 2009, : 468 - +
  • [44] Information System Security Risk Evaluation Model Based on Improved Dempster-Shafer Evidence Theory
    Liu, Yan-hua
    Miao, Wei
    INTERNATIONAL CONFERENCE ON CONTROL AND AUTOMATION (ICCA 2016), 2016, : 422 - 427
  • [45] Research on Network Security Risk Assessment Method Based on Bayesian Reasoning
    Li, Xiangna
    Li, Mengao
    Wang, Hui
    PROCEEDINGS OF 2019 IEEE 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC 2019), 2019, : 102 - 108
  • [46] Research on airspace security risk assessment technology based on knowledge Graph
    Yang, Ying
    Huang, Chenghao
    Zhang, Hongbo
    Feng, Chaohui
    Wang, Zhisen
    Cui, Zhe
    2021 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C 2021), 2021, : 980 - 986
  • [47] Housing Policy Effectiveness Evaluation Based on the Grey System Theory
    Zhang, Lili
    Yang, Xiaodong
    PROCEEDINGS OF 2012 INTERNATIONAL CONFERENCE ON CONSTRUCTION & REAL ESTATE MANAGEMENT, VOLS 1 AND 2, 2012, : 701 - 704
  • [48] Risk assessment method based on business process-oriented asset evaluation for information system security
    Eom, Jung-Ho
    Park, Seon-Ho
    Han, Young-Ju
    Chung, Tai-Myoung
    COMPUTATIONAL SCIENCE - ICCS 2007, PT 3, PROCEEDINGS, 2007, 4489 : 1024 - +
  • [49] Research on Business Risk Assessment Model of City Commercial Banks Based on Grey System Theory
    Ren, Shuming
    Wang, Dandan
    Wang, Hongjing
    APPLIED INFORMATICS AND COMMUNICATION, PT 5, 2011, 228 : 30 - 37
  • [50] Research of Credit Risk Assessment System and Model Based on Neural Network and Rough Set Theory
    Li Xiaohuan
    Liu Tieying
    Wen Mianrong
    ADVANCES IN MANAGEMENT OF TECHNOLOGY, PT 1, 2009, : 79 - +