A Synthesized Risk Evaluation Model of Information Security

被引:1
|
作者
Zhao Jinhui [1 ]
Wen Chao [1 ]
Qian Xu [1 ]
Zhang Juncai [1 ]
机构
[1] China Univ Min & Technol, Sch Mech Elect & Informat Engn, Beijing, Peoples R China
来源
2009 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, VOL I, PROCEEDINGS | 2009年
关键词
Information security; Risk evaluation; relative membership degrees; relative difference function;
D O I
10.1109/AICI.2009.384
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information security evaluation has become an important part of information management. The methods of safety evaluation impact the veracity and objectivity of the results, and also impact the overall capacity of information management in enterprises. Based on the thought of variable fuzzy set, a novel risk evaluation model is proposed. This model can scientifically and reasonably determine the membership degrees and the relative difference function of information security indexes at level interval. And by varying its parameters and evaluating indexes the model can adapt to different actual situations. As an example, this proposed model is used to evaluate a concrete sample to describe the evaluation process. The case studies show that the evaluation results are practical, and the model is scientific and effective which provides dependable evidences for information management.
引用
收藏
页码:305 / 308
页数:4
相关论文
共 50 条
  • [21] General risk assessment model for information system security
    Chi, Yue
    Zhang, Yong-Zheng
    Yun, Xiao-Chun
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2005, 37 (SUPPL. 1): : 192 - 194
  • [22] A situation awareness model for information security risk management
    Webb, Jeb
    Ahmad, Atif
    Maynard, Sean B.
    Shanks, Graeme
    COMPUTERS & SECURITY, 2014, 44 : 1 - 15
  • [23] A Security Risk Evaluation Model for Mashup Application
    Chen Yanchun
    Wang Xingpeng
    2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL 1, PROCEEDINGS, 2009, : 212 - 215
  • [24] Fuzzy OWA Model for Information Security Risk Management
    Imamverdiev, Ya. N.
    Derakshande, S. A.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2011, 45 (01) : 20 - 28
  • [25] Assets Dependencies Model in Information Security Risk Management
    Breier, Jakub
    Schindler, Frank
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 405 - 412
  • [26] Quantitative Evaluation Model for Information Security Risk of Wireless Communication Networks Under Big Data
    Jiang, Bin-bin
    ADVANCED HYBRID INFORMATION PROCESSING, ADHIP 2019, PT I, 2019, 301 : 458 - 468
  • [27] Information security risk analysis model based on entropy
    Tang, Y. L.
    Xu, G. A.
    Niu, Y. X.
    Yang, Y. X.
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 4, 2008, : 1146 - 1150
  • [28] Information Security Risk Management Model for Big Data
    Yang, Min
    ADVANCES IN MULTIMEDIA, 2022, 2022
  • [29] A Quantitative Model for Information-Security Risk Management
    Bojanc, Rok
    Jerman-Blazic, Borka
    ENGINEERING MANAGEMENT JOURNAL, 2013, 25 (02) : 25 - 37
  • [30] A Novel Security Risk Assessment Model for Information System
    Lv, Huiying
    2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 282 - 287