Research about Information Security Risk Assessment of Oil and Gas Production Management System

Article Preview

Abstract:

Current information security risk assessment models usually focus on the security problems of information system and its environment, however they ignore data changes and the accompanying risks in the whole production process. Aiming at the problems above, the paper analyzes the risks of oil and gas production management system during the different stages of data generation, transmission, processing, storage and demonstration, then proposes a set of data risk assessment model and method focusing on data security. The data risk assessment model provides a new way to prevent intrusion, protect data and safeguard information system’s integrity, availability and security.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 631-632)

Pages:

1390-1396

Citation:

Online since:

January 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Chen Xiuzhen , Zheng Qinghua , Guan Xiaohong , et. Al. Study on Evaluation for Security Situation of Networked Systems[J ] . J ournal of Xi'an J iaotong Universi t y , 2004 , 38 (4) : 404-408 (Ch).

Google Scholar

[2] Feng Dengguo , Zhang Yang , Zhang Yuqing. Survey of Information Security Risk Assessment [J ]. J ournal of China Institute of Communications , 2004 , 25 (7) : 10-18 (Ch).

Google Scholar

[3] Aagedal J O, Den Braber F, et al. Model-based Risk Assessment to Improve Enterprise Security[ C] . Proceedings of the 6th International, Enterprise Distributed Object Computing Conference, EDOC'02, 2002 . 51 -62.

DOI: 10.1109/edoc.2002.1137696

Google Scholar

[4] National Institute of Standards and Technology. Special Publications 800-30, Risk Management Guide (DRAFT). June (2008).

Google Scholar

[5] Gary McGraw. Managing Software Security Risks[ J] . IEEE Computer, 2002, 35( 4) : 99-101.

Google Scholar

[6] Gary McGraw. Software Security[ J] . Security & Privacy Magazine, IEEE, 2004, 2 ( 2) : 80 - 83.

Google Scholar

[7] Hu Yong, Fang Yong, Xiao Long. Research about engineering method of information system risk analysis, 2006, 32(13): 29-31.

Google Scholar

[8] BUTLER S A, FISCHBECK P. Multi-Attribute Risk Assessment, Technical Report CMD-CS-01-169. December (2005).

Google Scholar

[9] BUTLER S A. Security Attribute Evaluation Method: A Cost-Benefit Approach. Computer Science. Department, (2008).

Google Scholar

[10] Martel S. A New Model for Computer Network Security Risk Analysis[D]. Ottawa, Ontario: Department of Systems and Computer Engineering, Carleton University, (2002).

Google Scholar

[11] Pfleeger C P. Creating and Implementing a Security Strategy[J]. Cutter Consortium, 2001, 4(3).

Google Scholar