Research on Information Security Scheme Decision-Making of Internet Banking

Article Preview

Abstract:

Based on information security single item estimation and good enough security theory, decision-making of Internet banking security control proposal is researched in this paper. Internet banking security control decision-making should be executed through asset single item estimation and whole integration estimation this two layers separately. Substitutive of security proposal is discussed, which show that three steps of integration estimation should be cost option, technology feasibility option and security scheme merit rating. On the basis of cost option, technology feasibility option of security choice scheme is executed based on P2DR security theory and optimization option of security scheme is realized using fuzzy comprehensive evaluation model of improved layer analysis method.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 268-270)

Pages:

2133-2138

Citation:

Online since:

July 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Pufeng Wu, Chenhu Zhang. Good enough security is the best security. Proceedings of the International Colloquium on information Fusion 2007, Xian Jiaotong University Press , August, 2007. IEEE.

Google Scholar

[2] Jia Bing. Enterprise information security risk analysis and control[D]. Xi'an: Northwestern Polytechnical University, (2006).

Google Scholar

[3] Luo Jie. Computer Network risk analysis and management[D]. He Fei University of Science and Technology of China, (2002).

Google Scholar

[4] People's Bank of China. Computer information system security technoligical rules of banking[M]. Bei Jing: Electronic Industry Press, (2001).

Google Scholar

[5] Jing JuLiang, Wei YiMing, DingJing. Fuzzy comprehensive estimation model based on enhanced layer analysis method[J]. Journal of Hydraulic Engineering, 2004, (3): 65-71.

Google Scholar