Information Security Risk Assessment on Complex Information System

Article Preview

Abstract:

Risk assessment is the key and core technologies ensuring IT system security. Based on the comprehensive analysis to complex information systems, this paper first summarizes the typical characters of complex information systems and then gives new risk factors that complex system need to face. Furthermore, a new risk assessment method is proposed to evaluate the complex information systems. The method takes full account of the effect of complexity of complex information systems in each process of risk assessment, and utilizes multi-level risk views to carry out in-depth analysis to the risk of complex system.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 765-767)

Pages:

1481-1485

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Feng Dengguo, Zhangyang, Zhang yuqing. Survey of information security risk assessment. Joumal on Communications, 2004, 25(7): 10-18.

Google Scholar

[2] Zhang Li, Peng Jianfen, Du Yuge, Wang Qing. Survey of information security risk assesment . VARA2012, pp.699-707, 2012. 12.

Google Scholar

[3] T. L. Saaty. The Analytic Hierarchy Process. New York: McGraw-Hill. (1980).

Google Scholar

[4] LU Zhenbang, Zhou Bo. Hierarchical Risk Assessment Based on Shapley Entropies and Choquet Integrals. Journal of Beijing University of Posts and Telecommunications, Vol. 32, NO. 6, 83-87, (2009).

Google Scholar

[5] FU Yu, wu Xiao ping. An Approach for Information Systems Security Risk Assessment on Fuzzy Set and Entropy-Weigh. ACTA ELECTTRONICA SINICA, V01. 38, No. 7, Ju1. (2010).

Google Scholar

[6] WANG Xiaozhen , LU Zhi gang. Algorithm of Information Security Risk Evaluation Based on OCTAVE and Grey System. Journal of Beijing University of Posts and Telecommunications, Vol. 32 , NO. 5, (2009).

Google Scholar

[7] Liu Huan, ZHAO Gang. practical risk assessment based on multiple fuzzy comprehensive evaluation and entropy weight. VARA2012, pp.262-274, 2012. 12.

Google Scholar

[8] Shafer G, A mathematical theory of evidence[M], Princeton, NJ: Princeton University Press, (1976).

Google Scholar

[9] CAO Ju-ying, ZHAO Yue-long. Novel method for information security risk assessment based on Dempste-Shafer evidence reasoning. Computer Engineering and Applications, 2009, 45(11): 129-131.

Google Scholar

[10] Lili Sun. An Information Systems Security Risk Assessment Model under Dempster-Shafer Theory of Belief Functions. Journal of Management Information Systems, Vol. 22, No. 4, 2006: 109-142.

DOI: 10.2753/mis0742-1222220405

Google Scholar

[11] Li HeTian, Liu Yun, He Dequan. Security Risk Evaluation of IT System Based on Markov Chains. Journal of the china railway society. 2007, 29(2): 50-53.

Google Scholar

[12] C.E. Bonafede, P. Giudici. Bayesian Networks for enterprise risk assessment. Physica A: Statistical Mechanics and its Applications, Volume 382, Issue l, l August 2007, 22-28.

DOI: 10.1016/j.physa.2007.02.065

Google Scholar

[13] Niu Honghui, Shang Yanling. Research on risk assessment model of information security based on particle swarm algorithm—RBF neural network. IEEE Proceedings of 2010 Second Pacific Asia Conference on Circuits Communications and System, IEEE Compater Society Press, 2010: 479-482.

DOI: 10.1109/paccs.2010.5626881

Google Scholar