期刊文献+

资产关联拓扑结构的信息系统安全评估模型

Risk Assessment of Information System Based on the Topology Structure of Assets′ Connections
下载PDF
导出
摘要 提出了基于资产关联拓扑结构的信息系统安全评估模型。以资产关联拓扑结构图为原型表示资产间的关联,量化计算判定各资产间关联以及关联性对整个信息系统风险的影响。该信息系统安全评估模型改进了传统的信息系统风险评估方法,添加资产关联性作为评估过程中的重要信息,实现了量化的信息安全评估。最后给出实例验证了模型对传统评估方法的改进。 This paper presents a new risk assessment model for measuring the security risk level of information systems. This model uses the topology structure of the correlations among system assets. It quantitatively computes the correlation extents and decides the influence of these correlations on the evaluated system. This risk assessment model improves the traditional security risk assessment model. By adding assets correlation as an important element to the process of risk assessment. It has achieved the quantitative risk assessment. Finally, an example of this risk assessment model is presented to show that this new model is better than the traditional ones.
出处 《华东理工大学学报(自然科学版)》 CAS CSCD 北大核心 2009年第3期447-451,共5页 Journal of East China University of Science and Technology
关键词 风险评估 资产关联 拓扑结构 定量评估 攻击路线 risk assessment assets' connections topology structure quantitative computation attacking route
  • 相关文献

参考文献11

二级参考文献21

  • 1张永铮,云晓春,胡铭曾.基于特权提升的多维量化属性弱点分类法的研究[J].通信学报,2004,25(7):107-114. 被引量:35
  • 2IEC 1025.Fault tree analysis(FTA).1990 被引量:1
  • 3Bouti A,Ait Kadi D.A state-of-the-art review of FMEA/FMECA[J].International Journal of reliability,quality and safety engineering,1994; 1:515~543 被引量:1
  • 4Albets Christopher J,Dorofee Audrey J.OCTAVE Method Implementation Guide[M].v2.0 Pittsburgh,PA:Software Engineering Institute,Carnegie Mellon University,2001 被引量:1
  • 5Barber B,Davey J.The use of the CCTA risk analysis and management methodology CRAMM[C].In:Proc MEDINFO92,North Holland,1992:1589~1593 被引量:1
  • 6ISO/IEC 27001.Information technology-Security techniques-Information security management systems-Requirements.2005 被引量:1
  • 7ISO/IEC 13335-3.Information technology-Security techniquesGuidelines for the management of IT security-Part 3:Techniques for the management of IT security.1997 被引量:1
  • 8Ritchey R,Ammann P.Using model checking to analyze network vulnerabilities//Proceedings of the IEEE Symposium on Security and Privacy.Oakland,California,2000:156-165 被引量:1
  • 9Mayer A,Wool A,Ziskind E.Fang:A firewall analysis engine//Proceedings of the IEEE Symposium on Security and Privacy.Oakland,California,2000:177-187 被引量:1
  • 10Ritchey R,O'Berry B,Noel S.Representing TCP/IP connectivity for topological analysis of network security//Proceedings of the 18th Annual Computer Security Applications Conference.Las Vegas,Nevada,2002:25-31 被引量:1

共引文献120

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部