Risk Assessment on the Development and Utilization of Government Housing Information Resources

Author(s):  
Xiaoqing Cui ◽  
Qinlei Li ◽  
Yanfang Gao
Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


2011 ◽  
Vol 105-107 ◽  
pp. 1073-1076
Author(s):  
Jin Jun Yuan ◽  
Quan Yi Huang ◽  
Hong Yong Yuan

Event-based emergency handling is a high-efficiency decision process of the choice of emergency information resources, the acquisition of emergency knowledge, and the optimizing arrangement of emergency information resources through the logical relationships between emergencies and related emergency information resources. With the development of emergency rescue theory and computer science and technology, the realization of emergency management informatization and intellectualization is of far reaching importance, on the basis of the establishment of event-oriented handling logical relationships, the construction of emergency management platform, the unified management of emergency information resources and the on-line emergency handling. Centered on emergencies, this paper discusses the respective corresponding relationships of emergency and emergency information resources, emergency knowledge, emergency response plans, paradigm cases, relative laws and a series of decision actions on emergency handling, risk assessment and risk analysis etc. It also illustrates the functions and meanings of the correspondence configuration.


2003 ◽  
Vol 17 (2) ◽  
pp. 51-70 ◽  
Author(s):  
Akhilesh Chandra ◽  
Thomas G. Calderon

This paper discusses theoretical and practical issues related to the use of a biometric-enabled security layer in accounting systems aimed at enhancing user authentication and reducing control risk. Originating in criminology, biometric technology has matured over the years with applications in diverse disciplines. However, its use in business and accounting is still in its infancy, and many issues about its role in information systems security are unresolved. The paper proposes an access decision framework that draws from the strategy and risk assessment literature to model processes where biometrics might be used to reduce control risk. Despite its potential strengths, biometric technology is not a panacea and represents one element in a portfolio of security mechanisms needed to protect information resources. The paper discusses challenges in implementing biometric technology and identifies avenues for future research.


Sign in / Sign up

Export Citation Format

Share Document