A Synthesized Risk Evaluation Model of Information Security

被引:1
|
作者
Zhao Jinhui [1 ]
Wen Chao [1 ]
Qian Xu [1 ]
Zhang Juncai [1 ]
机构
[1] China Univ Min & Technol, Sch Mech Elect & Informat Engn, Beijing, Peoples R China
关键词
Information security; Risk evaluation; relative membership degrees; relative difference function;
D O I
10.1109/AICI.2009.384
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information security evaluation has become an important part of information management. The methods of safety evaluation impact the veracity and objectivity of the results, and also impact the overall capacity of information management in enterprises. Based on the thought of variable fuzzy set, a novel risk evaluation model is proposed. This model can scientifically and reasonably determine the membership degrees and the relative difference function of information security indexes at level interval. And by varying its parameters and evaluating indexes the model can adapt to different actual situations. As an example, this proposed model is used to evaluate a concrete sample to describe the evaluation process. The case studies show that the evaluation results are practical, and the model is scientific and effective which provides dependable evidences for information management.
引用
收藏
页码:305 / 308
页数:4
相关论文
共 50 条
  • [1] Risk Evaluation Process Model of Information Security
    Liu Jing
    2009 INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION, VOL II, 2009, : 321 - 324
  • [2] A new information security risk evaluation model
    Lin, Zheng-Kui
    ICIC Express Letters, Part B: Applications, 2012, 3 (05): : 1179 - 1184
  • [3] Evaluation of the Risk and Security Overlay of ArchiMate to model Information System Security Risks
    Mayer, Nicolas
    Feltus, Christophe
    PROCEEDINGS OF THE 2017 IEEE 21ST INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS AND DEMONSTRATIONS (EDOCW 2017), 2017, : 106 - 116
  • [4] A New Evaluation Model for Information Security Risk Management of SCADA Systems
    Lin, Kuo-Sui
    2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL CYBER PHYSICAL SYSTEMS (ICPS 2019), 2019, : 757 - 762
  • [5] Study on security risk evaluation model, process and tools of information system
    Zheng, Pei
    Lai, KinKeung
    Zhang, Yirong
    PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON E-RISK MANAGEMENT (ICERM 2008), 2008, : 47 - +
  • [6] Information security risk assessment model for risk management
    Wawrzyniak, Dariusz
    TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 21 - 30
  • [7] A novel security risk evaluation for information systems
    Gan, Zaobin
    Tang, Jiufei
    Wu, Ping
    Varadharajan, Vijay
    2007 JAPAN-CHINA JOINT WORKSHOP ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, PROCEEDINGS, 2007, : 67 - +
  • [8] A Study of Information Security Evaluation and Risk Assessment
    Li, Jingyi
    Chao, Shiwei
    Huo, Minxia
    2015 FIFTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2015, : 1909 - 1912
  • [9] A security risk analysis model for information systems
    In, HP
    Kim, YG
    Lee, T
    Moon, CJ
    Jung, YJ
    Kim, I
    SYSTEMS MODELING AND SIMULATION: THEORY AND APPLICATIONS, 2005, 3398 : 505 - 513
  • [10] Risk assessment model of information security SVRAMIS
    Wu, D. (jump_wude@163.com), 2013, Science Press (40):