scholarly journals A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data

2011 ◽  
Vol 187 ◽  
pp. 575-580 ◽  
Author(s):  
Ning Xu ◽  
Dong Mei Zhao

Information security risk assessment is one important part of the security engineering in information system. It has been the focus of the research in the world wide information security fields. This paper designs and realizes a new model of information security risk assessment based on AHP method. In this case, In order to estimate the network security risk by AHP method, firstly should identify the most related factors and establish the threaten identification Hierarchical Model and Vulnerability Identification Hierarchical Model for information security risks. Then, compare every two elements to determine the relative importance of each element. Finally, judge the comprehensive weight for each element. The study of the case shows that the method can be easily used to the risk assessment of the network security. The results are in accord with the reality.


Author(s):  
Ming Xiang He ◽  
Xin An

<p>Information security risk assessment was an important component of information systems security engineering and the selection of assessment method had a direct impact on the final results of the assessment. But there were too many elements in the process of information security risk assessment. How to find the optimal elements from many elements to simplify the calculation of risk value and provide a strong basis for taking relevant measures, which was a problem needed to be solved. In addition, the reliability of the risk assessment results could not be guaranteed only through a single qualitative or quantitative assessment method. By Analytic Hierarchy Process (AHP), the relative weight of elements related to information security risk could be calculated. Then the optimal indicators, which provided a strong basis for taking relevant measures, could be selected by sorting the weights of elements to reduce the number of indicators. Moreover, Analytic Hierarchy Process, a method of the combination of qualitative and quantitative assessment methods, could overcome the shortcomings of single qualitative or quantitative assessment method.</p>


2013 ◽  
Vol 756-759 ◽  
pp. 2542-2546
Author(s):  
Jian Hui Cheng ◽  
Ran Zhao ◽  
Cheng Jin

With the development of information technology, the network information security is closely linked with national security. In order to resist the harmful information to safeguard national security, Australian government enforces network security plan. Its network of legal norms and such practices as real-name system, national information security have a certain degree of enlightenment to China.


2014 ◽  
Vol 599-601 ◽  
pp. 1457-1460
Author(s):  
Xue Yong Wan ◽  
Liang Zhang ◽  
Wei Xu ◽  
Hong Hui Gong

Internet technology in the life to people bring convenient while, also is facing increasingly serious security threat from the network, many invaders one thousand ways to want to "see" to some concerned data or information, computer network information security is more and more attention. This article, from the perspective of the system vulnerability and network own existence safe hidden trouble, put forward to realize protection methods and strategies of network security.


2019 ◽  
Vol 267 ◽  
pp. 02013
Author(s):  
Xiaobo Ming ◽  
Ying Chen ◽  
Jinhua Guo

Computers are closely related to our life and work. We have entered an era in which computers are not available in all walks of life. Among them, many important documents and materials will be stored in the form of electronic files in the computer. However, computers are not absolutely safe, and cases of information theft occur from time to time. Most people usually keep information confidential in the form of encryption. How to avoid the problem of computer information security. Computer network security involves all aspects. To solve these problems, there are many levels of technology, such as cryptography technology, network security technology and so on. Our country has also done a lot of research on the security protection of computer network technology, and these research results have also achieved certain results in the actual construction of computer network. In order to ensure the normal operation of computer networks, ensure information security and prevent information leakage and theft, a special protection system has been established to ensure the security of computer network information by setting up computer detection, security assessment and other links. However, with the rapid development of science and technology, the updating of electronic products is faster and faster, and the challenge of Wechat for network security information is more severe. How to protect computer network information security needs to be solved urgently, this paper discusses this.


2020 ◽  
Vol 2 (3) ◽  
pp. 53
Author(s):  
Xiaofeng Ma ◽  
Norriza Hussin

<p>With the rapid development of computer network, the fully opened network has greatly changed people’s production and daily life and the traditional industries are no longer closed. However, there are also many network security problems. To deal with it, this article explores the computer applications based on management of network information security technology. It analyzes the main factors threatening network information security from the security problems caused by computer applications. Combining with the application practice, specific measures are put forward for reference.</p>


Sign in / Sign up

Export Citation Format

Share Document