计算机应用 ›› 2009, Vol. 29 ›› Issue (12): 3178-3181.

• 信息安全 • 上一篇    下一篇

基于可拓集的信息安全风险评估

肖敏1,范士喜2,柴蓉3,杨富平4   

  1. 1. 重庆邮电大学计算机科学与技术学院
    2. 北京印刷学院
    3.
    4. 重庆邮电大学
  • 收稿日期:2009-06-26 修回日期:2009-08-08 发布日期:2009-12-10 出版日期:2009-12-01
  • 通讯作者: 范士喜
  • 基金资助:
    城市震害单元化应急管理机制与动态可视化救助仿真研究

Information security risk assessment method based on extensible set

  • Received:2009-06-26 Revised:2009-08-08 Online:2009-12-10 Published:2009-12-01

摘要: 针对信息安全风险评估中风险要素关系复杂、评价因素难以准确度量的问题,以威胁为中心组织风险要素、建立风险评估模型并实现基于可拓集的风险评价方法。此模型应用资产、弱点和控制措施对威胁发生可能性和后果进行评估,并呈现系统风险的层次结构。基于此模型,可拓集方法将评价因素的定性表达区间化并利用区间关联函数实现定性向定量的转化,然后根据定量的风险关联度向量对系统风险做出定性的判决,从而实现系统风险的定性与定量相结合的评估。具体的实例分析表明了此方法的可行性和有效性。

关键词: 信息安全, 风险评估, 可拓集, 关联函数

Abstract: In the process of information security risk assessment, there are complex relationships between risk elements and it is also difficult to accurately measure risk evaluation factors. The paper proposed a risk assessment model which took threat as a center to organize risk elements and a risk evaluation method based on extensible set. The model displayed a hierarchical structure for system risk, in which the possibility and consequences of threat were evaluated by three risk factors - asset, vulnerability and control measure. Based on this model, the extensible set method translated qualitative determination into quantitative result by mapping qualitative expression to interval and using interval dependent function and made a qualitative judgment according to a quantitative risk-correlation vector, and therefore, could combine quantitative and qualitative methods to evaluate system risk. A specific example illustrates that the method is feasible and effective.

Key words: information security, risk evaluation, extensible set, dependent function