期刊文献+

海洋网络信息安全评估的指标选取和风险评估 被引量:2

INDEX SELECTION AND RISK EVALUATION IN OCEANIC NETWORK INFORMATION SECURITY ASSESSMENT
在线阅读 下载PDF
导出
摘要 海洋网络的特点决定了其在网络安全评估时的特殊性。根据文件《信息安全技术信息系统安全等级保护基本要求》,对某地海洋局的风险评估要素进行分层,并根据专家打分确定各层评估要素的权重和评估矩阵,最后得出该网络系统总体的安全情况。由于各地海洋业务的一致性和相似性,该评估模型可以通用到其他海洋局网络评估中。 The characteristics of the oceanic network determine its particularity in network security assessment.According to a standard,titled as "Information Security Technology:Information System Security Level Protection Fundamental Requirements",the paper divides an oceanic administration's risk assessment factors into layers.Then according to experts' scorings,it determines the weight of assessment factors and assessment matrix for each layer.Finally it obtains the security condition of the whole network system.Due to the consistency and similarity of oceanic businesses in different places,the assessment model can be applied to network assessments for other oceanic administrations.
出处 《计算机应用与软件》 CSCD 北大核心 2012年第4期118-120,136,共4页 Computer Applications and Software
基金 上海市海洋公共服务信息安全体系研究(沪海科2010-02)
关键词 海洋网络 网络安全 评估要素 Oceanic network Network security Evaluation factors
  • 相关文献

参考文献4

二级参考文献23

  • 1肖龙,戴宗坤.信息系统风险的多级模糊综合评判模型[J].四川大学学报(工程科学版),2004,36(5):98-102. 被引量:35
  • 2胡伟,李铁克,崔建双.基于模糊层次分析法的信息安全风险评估[J].网络安全技术与应用,2005(6):32-35. 被引量:10
  • 3陈王廷.决策分析[M].科学出版社,1987..
  • 4[1]Rommelfanger HJ.Multicriteria Decision Making Using Fuzzy Logic [C].In:Proceedings of the Conference on the North American Fuzzy Information Processing Society, 1998: 360~364
  • 5[2]Hanseong S,Poonghyun S.A Software Safety Evaluation Method Based on Fuzzy Colored Petri Nets[C].In:Proceedings of International Conference on Fuzzy Systems, 1999; (2): 830~834
  • 6[3]Antonakopoulos T, Agavanakis K.CASE Tools Evaluation: An Automatic Process Based on Fuzzy Sets Theory[C].In:Proceedings of Sixth IEEE International Workshop on Rapid System Prototyping, 1995:140~146
  • 7[4]Cannavacciuolo A,Capaldo G.A Fuzzy Model of the Evaluation Process[C].In:Proceedings of the Fifth IEEE International Conference on Fuzzy Systems, 1996; (2) :828~834
  • 8[5]Copigneaux F,Martin S.Software Security Evaluation Based on a Topdown McCall-like Approach[C].In:Proceedings of the Fourth Conference on Aerospace Computer Security Applications, 1988:414~418
  • 9[6]Garrabrants WM,Ellis AW.CERTS :A Comparative Evaluation Methodfor Risk Management Methodologies and Tools[C].In:Proceedings of the Sixth Annual Computer Security Applications Conference,1990:251~257
  • 10NIST NCSC-TG-005.Trusted Network Interpretation(TNI) of the TCSEC(Red Book)[S].[S.l.]:NIST NCSC-TG-005,1987.

共引文献83

同被引文献10

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部