期刊文献+

信息安全风险综合评价指标体系构建和评价方法 被引量:9

Comprehensive Evaluation Index System and Method for Information Security Risk
在线阅读 下载PDF
导出
摘要 信息安全风险评估是组织信息安全的基础和前提,是信息安全领域的前沿课题之一。本文参考国内外相关评价标准,从多层次、多角度构建一套全面反映信息安全风险的评价指标体系。文中分别用层次分析法确定风险评价指标权重,用不确定性推理方法D-S证据理论融合各专家的评价意见,整合后得出综合评价结果。本研究所提供的应用实例可供各组织信息安全风险评价实践参考。 Information security risk assessment is the foundation and the precondition of information security of organization, and is one of the front subjects in information security field. In this paper, with the research of world and domestic standards, we develop a multi-hierarchy and multi-attribute index system of information security risk evalu-ation. The fundamental concepts we have adopted include the analytic hierarchy process (AHP) and D-S Evidence theory. The AHP method is used to assess the preference rating of index. Through the D - S evidence uncertain reasoning method, we obtain the final score using the information fusion of different experts. This paper takes an application example, to provide organization the best practice of information seeurity risk evaluation.
出处 《现代情报》 北大核心 2008年第5期65-69,共5页 Journal of Modern Information
关键词 信息安全 评价指标体系 层次分析法 D-S证据理论 information security evaluation index system analytic hierarchy process D - S evidence theory
作者简介 程建华(1968-),女,公务员,研究方向:情报学理论,发表论文3篇。 靖继鹏(1942-),男,教授,博士生导师,研究方向:情报理论与应用。
  • 相关文献

参考文献9

二级参考文献21

  • 1Basel Committe4e on Banking Supervision. Overview of the New Basel Capital Accord. Switzerland,2003:98-120-122.
  • 2卡罗尔·亚历山大.商业银行操作风险.北京:中国金融出版社,2005,309-311.
  • 3WeberS FA.Modified analytic hierarchy process for automated manufacturing decision[J] .Interface, 1993,23(4): 115.
  • 4BEVAN N. Measuring usability as quality of use[J].lonrnal of Software Oualitv. 1995,(4):115.
  • 5United States General Accounting Office, Accounting and Information Management Division. Information Security Risk Assessment[Z]. Augest 1999.
  • 6National Institute of Standards and Technology. Special Publications 800-30, Risk Management Guide(DRAFT)[Z]. June 2001.
  • 7BUTLER S A, FISCHBECK P. Multi-Attribute Risk Assessment, Technical Report CMD-CS-01-169[R]. December 2001.
  • 8BUTLER S A. Security Attribute Evaluation Method: A Cost-Benefit Approach[Z]. Computer Science. Department, 2001.
  • 9PELTIER T R. Information Security Risk Analysis[Z]. Rothstein Associates Inc, 2001.
  • 10张金槐 唐雪梅.Bayes方法[M].长沙:国防科技大学出版社,1989..

共引文献345

同被引文献95

引证文献9

二级引证文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部