供電企業(yè)信息安全風(fēng)險(xiǎn)評(píng)估研究
[Abstract]:With the application and development of information system in power supply enterprises, the automation and information process of power supply enterprises are greatly promoted, and many information security problems are gradually emerging. And then cause economic loss or adverse social impact on enterprises. Therefore, how to carry out scientific and reasonable information security risk assessment in power supply enterprises and improve their information security level has aroused great concern. This paper takes the information security risk assessment of power supply enterprises as the research object. On the basis of deeply studying the reference standards, models and methods of information security risk assessment, and referring to the evaluation standard GB/T20984-2007, the information security risk assessment specification of information security technology, This paper presents a fuzzy information security risk assessment method and model based on interval number judgment matrix. The information security risk assessment model proposed in this paper is divided into two stages: information security event identification and information security risk assessment. Identifying information security events is to identify the threat to enterprise assets, the vulnerability that may be exploited, and the impact on which assets are affected. This paper classifies and values the assets, vulnerabilities and threats faced by enterprises according to the evaluation criteria in Information Security Technology Information Security risk Assessment Specification. The information security events that may occur in an enterprise are determined by analyzing their interrelation. Considering the fuzziness and uncertainty of information in the process of information security risk assessment, the interval number judgment matrix is introduced on the basis of constructing the hierarchical structure of information security risk assessment. Combined with fuzzy theory, the information security risk of enterprises is evaluated. Finally, the information security event identification method proposed in this paper and the information security risk assessment model are applied to the information security risk assessment of A power supply enterprise.
【學(xué)位授予單位】:華北電力大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2013
【分類(lèi)號(hào)】:F270.7;F426.61
【參考文獻(xiàn)】
相關(guān)期刊論文 前10條
1 潘平;楊平;何朝霞;;基于多屬性層次分析的信息安全風(fēng)險(xiǎn)評(píng)估方法[J];信息安全與技術(shù);2011年11期
2 劉換;趙剛;;人工智能在信息安全風(fēng)險(xiǎn)評(píng)估中的應(yīng)用[J];北京信息科技大學(xué)學(xué)報(bào)(自然科學(xué)版);2012年04期
3 王甲生;付鈺;吳曉平;;基于改進(jìn)FAHP法的信息系統(tǒng)安全風(fēng)險(xiǎn)評(píng)估[J];火力與指揮控制;2011年04期
4 龍百元;王東;謝冬青;萬(wàn)里平;;基于區(qū)間判斷矩陣的層次化風(fēng)險(xiǎn)評(píng)估方法[J];計(jì)算機(jī)工程與應(yīng)用;2008年10期
5 唐作其;陳選文;戴海濤;郭峰;;多屬性群決策理論信息安全風(fēng)險(xiǎn)評(píng)估方法研究[J];計(jì)算機(jī)工程與應(yīng)用;2011年15期
6 吳葉科;宋如順;陳波;;基于梯形模糊AHP的信息安全風(fēng)險(xiǎn)綜合評(píng)估[J];計(jì)算機(jī)工程與應(yīng)用;2011年34期
7 吳葉科;宋如順;陳波;;基于博弈論的綜合賦權(quán)法的信息安全風(fēng)險(xiǎn)評(píng)估[J];計(jì)算機(jī)工程與科學(xué);2011年05期
8 牛紅惠;劉凌霞;;神經(jīng)網(wǎng)絡(luò)在信息安全風(fēng)險(xiǎn)評(píng)估中應(yīng)用研究[J];計(jì)算機(jī)仿真;2011年06期
9 申時(shí)凱;佘玉梅;;模糊神經(jīng)網(wǎng)絡(luò)在信息安全風(fēng)險(xiǎn)評(píng)估中的應(yīng)用[J];計(jì)算機(jī)仿真;2011年10期
10 吳葉科;宋如順;陳波;;梯形模糊數(shù)的信息安全風(fēng)險(xiǎn)群決策評(píng)估方法[J];南京師范大學(xué)學(xué)報(bào)(工程技術(shù)版);2011年01期
相關(guān)碩士學(xué)位論文 前3條
1 王歡歡;基于分區(qū)的信息安全風(fēng)險(xiǎn)評(píng)估研究[D];天津財(cái)經(jīng)大學(xué);2011年
2 商福強(qiáng);保險(xiǎn)企業(yè)ERP信息安全風(fēng)險(xiǎn)評(píng)估方法研究[D];沈陽(yáng)航空工業(yè)學(xué)院;2010年
3 劉晶;模糊綜合評(píng)價(jià)法在信息安全風(fēng)險(xiǎn)評(píng)估領(lǐng)域的研究及應(yīng)用[D];中國(guó)地質(zhì)大學(xué)(北京);2010年
,本文編號(hào):2351027
本文鏈接:http://sikaile.net/guanlilunwen/shengchanguanlilunwen/2351027.html