期刊文献+

信息安全管理中的传导风险防范方法研究 被引量:2

ON PREVENTION METHOD OF TRANSMISSION RISK IN INFORMATION SECURITY MANAGEMENT
下载PDF
导出
摘要 风险评估和风险控制措施是信息安全管理体系(ISMS)中的重要环节,而风险控制措施的引入可能引发新的潜在风险(传导风险),对如何防范传导风险进行了阐述,提出了基于PDCA改进模型的传导风险防范策略。 Risk assessment and risk control are the most important parts in Information Security Management System (ISMS). In some conditions, the introduction of risk control measures may cause new potential risk, which is called transmission risk in the article. This paper carries out on how to avoid the transmission risk and proposed the prevention strategy for it based on a modified PDCA Model.
出处 《计算机应用与软件》 CSCD 2010年第8期97-99,122,共4页 Computer Applications and Software
基金 国家高技术研究发展计划项目(2007AA010401)
关键词 ISMS 风险评估 风险控制措施 传导风险 PDCA 残余风险 ISMS Risk assessment Risk control measure Transmission risk PDCA Residual risk
  • 相关文献

参考文献6

  • 1ISO/IEC 27001:2005 Information technology-security techniques Information security management system-requirements. 被引量:1
  • 2ISO/IEC 27002:2005 Information technology-Security techniques-Code of practice for information security management. 被引量:1
  • 3ISO/IEC TR13335-3:1998 Information technology-Guidelines for the management of IT Security-Part 3:Techniques for the management of IT Security[S]. 被引量:1
  • 4王巍 杨根兴.一种改进的信息安全风险评估算法.计算机工程,2008,:368-370. 被引量:1
  • 5张建军,孟亚平主编..信息安全风险评估探索与实践[M].北京:中国标准出版社,2005:206.
  • 6张永铮,方滨兴,迟悦,云晓春.用于评估网络信息系统的风险传播模型[J].软件学报,2007,18(1):137-145. 被引量:76

二级参考文献2

共引文献75

同被引文献12

  • 1Boeing Company.The e-Enabled Advantage[EB].(2009-04-24). http ://www.boeing.com/commercial/aviationservices. 被引量:1
  • 2Federal Aviation Administration.14 CFR Part 25.Special Condi- tions:Boeing Model 787-8 Airplane;Systems and Data Net- works Security-Isolation or Protection from Unauthorized Passenger Domain Systems Access[R].USA:Federal Register, 2007. 被引量:1
  • 3Federal Aviation Administration.14 CFR Part 25.Special Condi- tions:Boeing Model 787-8 Airplane;Systems and Data Net- works Security-Protection of Airplane Systems and Data Net- works From Unauthorized External Access[R].USA: Federal Register, 2007. 被引量:1
  • 4Liao N, Li F, Song Y.Research on real-time network security risk assessment and forecast[C]//International Conference on Intelligent Computation Technology and Automation(ICICTA), Changsha, China, 2010,3 : 84-87. 被引量:1
  • 5Ben Mahmoud M S, Larrieu N.Pirovano A.A risk propagation base quantitative assessment methodology for network secu- rity[C]//Conference on Network and Information Systems Security(SAR-SSI) ,La Rochelle,France,2011 : 1-9. 被引量:1
  • 6ISO/IEC.Information technology-Security techniques Informa- tion security risk management.ISO/IEC 27005[R].USA:ISO/ IEC, 2011. 被引量:1
  • 7RTCA.Airworthiness Security PrOcess Specification.DO-326[R]. USA:RTCA,2010. 被引量:1
  • 8赵冬梅,刘金星,马建峰.基于改进小波神经网络的信息安全风险评估[J].计算机科学,2010,37(2):90-93. 被引量:21
  • 9吕俊杰,王元卓.信息安全风险模糊群决策评估方法[J].计算机工程与应用,2010,46(12):17-20. 被引量:11
  • 10包雷,钱存华.考虑漏洞间相关作用的风险评估方法[J].计算机工程与应用,2010,46(12):91-93. 被引量:1

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部