首页 | 本学科首页   官方微博 | 高级检索  
     

模糊评价在信息系统安全综合评测中的应用
引用本文:王海涛,郑君,杨子楠,刘宏志. 模糊评价在信息系统安全综合评测中的应用[J]. 计算机系统应用, 2012, 21(11): 7-10,160
作者姓名:王海涛  郑君  杨子楠  刘宏志
作者单位:[1]国家信息中心网络安全部,北京100045 [2]北京市工程咨询公司北京北咨信息工程咨询有限公司,北京100031 [3]中国软件评测中心北京赛迪信息工程监理有限公司,北京100048 [4]北京工商大学,北京100037
摘    要:随着我国信息化的快速发展,信息安全变的越来越重要,信息安全等级保护、信息安全风险评估和安全检查作为我国信息安全保障的重要手段和制度越来越被政府和各行各业重视.笔者通过积累多年的信息安全测评经验,以及结合金融行业和国税总局等多个全国联网大系统的风险评估、等级保护测评和安全检查三项整合工作的经验总结,提出在信息系统信息安全三合一整合的综合信息安全测评中采用基于模糊综合评价方法论,进行信息安全的综合评价具有实际的可操作性和指导意义.

关 键 词:信息安全  风险评估  安全等级保护  安全检查  模糊综合评价
收稿时间:2012-03-26
修稿时间:2012-05-22

Fuzzy Evaluation in the Comprehensive Review of the Information Systems Security
WANG Hai-Tao,ZHENG Jun,YANG Zi-Nan and LIU Hong-Zhi. Fuzzy Evaluation in the Comprehensive Review of the Information Systems Security[J]. Computer Systems& Applications, 2012, 21(11): 7-10,160
Authors:WANG Hai-Tao  ZHENG Jun  YANG Zi-Nan  LIU Hong-Zhi
Affiliation:4 I(State Information Center, Beijhag 100045, China) 2(Beijing Beizi Information Engineering Consulting Co. Ltd., Beijing 10003 l, China) 3(China Software Testing Center, Beijing 100048, China) 4(Beijing Technology and Business University, Beijing 100037, China)
Abstract:With the rapid development of Chinese information technology, information security becomes more and more important, the information level of security protection, risk assessment and security check as an important means of information security in China. Through the accumulation of years of information security evaluation experience, we combined with the risk assessment of the financial industry and the State Administration of Taxation of the national network system, grade protection evaluation and security check of three integrated work experience presented in the triple integration of information systems Information Security Information Security Evaluation, which operability and guidance based on fuzzy comprehensive evaluation methodology. Then we get fuzzy evaluation information security model.
Keywords:information security  risk assessment  level of security protection  security check  fuzzy comprehensive evaluation
本文献已被 维普 等数据库收录!
点击此处可从《计算机系统应用》浏览原始摘要信息
点击此处可从《计算机系统应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号