Risk Evaluation Process Model of Information Security

被引:1
|
作者
Liu Jing [1 ]
机构
[1] Chinese Peoples Armed Police Force Acad, Fire Command Dept, Langfang, Peoples R China
关键词
Risk evaluation rocess model; information security; petri net; PETRI-NET MODELS; SYSTEMS;
D O I
10.1109/ICMTMA.2009.143
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The risk assessment applied in information technology is the information security risk evaluation. A modeling method of security system that is suitable to description results and restriction of information and to modeling form and control of distributed system is put forward based on the analysis of the concept of security system risk evaluation in the field of information security. A model of information security evaluation process has been built based on Petri net. The process is divided into several objects, such as assets identification, threats identification, vulnerability identification and existing security control measures identification etc. and make a detailed description to each object on Petri net theory.
引用
收藏
页码:321 / 324
页数:4
相关论文
共 50 条
  • [1] Study on security risk evaluation model, process and tools of information system
    Zheng, Pei
    Lai, KinKeung
    Zhang, Yirong
    [J]. PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON E-RISK MANAGEMENT (ICERM 2008), 2008, : 47 - +
  • [2] A Synthesized Risk Evaluation Model of Information Security
    Zhao Jinhui
    Wen Chao
    Qian Xu
    Zhang Juncai
    [J]. 2009 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, VOL I, PROCEEDINGS, 2009, : 305 - 308
  • [3] Evaluation of the Risk and Security Overlay of ArchiMate to model Information System Security Risks
    Mayer, Nicolas
    Feltus, Christophe
    [J]. PROCEEDINGS OF THE 2017 IEEE 21ST INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS AND DEMONSTRATIONS (EDOCW 2017), 2017, : 106 - 116
  • [4] Information security: Process evaluation and product evaluation
    Eloff, MM
    Von Solms, SH
    [J]. INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 11 - 18
  • [5] A Model to Assess the Maturity Level of the Risk Management Process in Information Security
    Mayer, Janice
    Fagundes, Leonardo Lemes
    [J]. 2009 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT - WORKSHOPS, 2009, : 61 - 70
  • [6] A New Evaluation Model for Information Security Risk Management of SCADA Systems
    Lin, Kuo-Sui
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL CYBER PHYSICAL SYSTEMS (ICPS 2019), 2019, : 757 - 762
  • [7] Evaluation Model for Computer Network Information Security Based on Analytic Hierarchy Process
    Xi Zhen-yuan
    Chen He
    Wang Xiang-zhong
    Sheng Jian-ling
    Fan Yu-tao
    [J]. 2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 3, PROCEEDINGS, 2009, : 186 - 189
  • [8] An Evaluation Model for Information Security of Android Application Based on Analytic Hierarchy Process
    Wan Yan
    Wang Guolin
    Feng Xiangyang
    [J]. 2016 WORLD AUTOMATION CONGRESS (WAC), 2016,
  • [9] Information security risk assessment model for risk management
    Wawrzyniak, Dariusz
    [J]. TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 21 - 30
  • [10] A novel security risk evaluation for information systems
    Gan, Zaobin
    Tang, Jiufei
    Wu, Ping
    Varadharajan, Vijay
    [J]. 2007 JAPAN-CHINA JOINT WORKSHOP ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, PROCEEDINGS, 2007, : 67 - +