期刊文献+

信息安全风险评估要素量化方法 被引量:2

A Quantified Method for Risk Assessment Elements of Information Security
原文传递
导出
摘要 信息安全风险评估是保障信息系统安全的重要手段之一,也是信息系统安全体系建设的前提和基础。文中在分析信息安全风险评估要素和评估过程的基础上,结合实际经验针对定量风险评估讨论了定量风险评估要素的量化规则、量化方法和风险计算方法,该方法在定量风险评估过程中具有科学性、合理性和实用性特点。 Information security risk assessment is a method for improving security of information system, and a basis and condition for constructing security architecture of information system. Based on analysis of the elements and the process of information security risk assessment and according to some risk assessment experience, this paper discusses some quantificational rules, quantification methods and computing formula of quantified risk assessment. This risk assessment is scientific, and practical.
出处 《信息安全与通信保密》 2009年第8期209-213,共5页 Information Security and Communications Privacy
基金 国家自然科学基金资助项目(10871222) 广州市教育局科技计划项目(08C068).
关键词 信息安全 资产 风险评估 量化法 information security asset risk assessment quantifying
  • 相关文献

参考文献7

  • 1周权.网络系统安全风险评估研究.计算机科学,2007,34(7):317-319.
  • 2Anita Vorster, Les Labuschagne. A Framework for Different Information Security Risk Comparing Analysis Methodologies[C]//Anita Vorster, Les Labuschagne. Proceedings of the 2005 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries. White River, South Africa:South African Institute for Computer Scientists and Information Technologists, [s. l.]:Anita Vorster, 2005: 95-103.
  • 3冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:312
  • 4GB/T20984-2007,信息安全技术信息 系统的风险评估规范[S].
  • 5周权.基于代数方法的信息安全风险评估管理模型[J].通信技术,2008,41(7):193-195. 被引量:6
  • 6通用弱点评价体系(CVSS)简介[EB/OL].(2006-02-08)[2009-5-17].http://www.xfocus.net/atticles/200602/850.html.
  • 7程晓峰,赵禹.脆弱性检测工具研究[J].通信技术,2009,42(4):151-153. 被引量:2

二级参考文献16

  • 1周权.网络系统安全风险评估研究.计算机科学,2007,34(7):317-319.
  • 2Ingo ClaBen, Hartmut Ehrig, Dietmav Wolz. Specification Techniques and Tools for Software Development: the ACT Approach[M].Volume 1 AMAST Series in Computing, Inc. River Edge, NJ: World Scientific Publishing Co.,Nov. 1993:91-98.
  • 3Joseph A. Goguen, Grant Malcolm. Software Engineering with OBJ: Algebraic Specification in Action(ADVANCES IN FORMAL METHODS Volume 2)[M]. Boston: Kluwer Academic Publishers, April 2000: 45-48.
  • 4Mohamed Hamdi, Noureddine Boudriga. Computer and Network Security Risk Management: Theory, Challenges and Countermeasures[J]. International Journal of Communication Systems, 2005,18 (08):763 - 793.
  • 5Mohamed Hamdi, Noureddine Boudriga. Algebraic Specification of Network Security Risk Management[C]. Proceedings of the 2003ACM workshop on Formal methods in security engineering FMSE '03, Washington: ACM, October 2003:52-60.
  • 6Wei T.Yue,Metin Cakanyldirim, Young U. Ryu, Dengpan Liu. Network Externalities , Layered Protection and IT Security Risk Management[J]. Decision Support System, 2007,44(01):1-16.
  • 7Robert Richardson CSI 2007 Computer Crime and Security Survey [2008.1].
  • 8http:// www. insecure, org/ [2007.6].
  • 9http://www. nessus, org/ [2007.8]
  • 10http://www. xfocus, net [2007.8].

共引文献318

同被引文献11

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部