Font Size: a A A

Study On Fourth Party Logistics Information System Security Risk Assessment

Posted on:2011-07-22Degree:MasterType:Thesis
Country:ChinaCandidate:M L ShiFull Text:PDF
GTID:2189360305984883Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
One of the strategies of development of the fourth party logistics is that the information technology should be enhanced, and through the information platform to integrate the relevant types of resources. Thus, the information system is very important for the forth party logistics. But every information system has security risks. Only through information system security risk assessment that we can know the security condition of the information system, then the effective measures can be taken promptly, to ensure the smooth operation of information system. As the complexity and integration of the forth party logistics information system are very strong, the link between risk factors set can not be ignore. To do the forth party logistics information systems security risk assessment, there are some tasks:1,Combine the situation of the forth party logistics information system, through analysis and study, using the ANP to calculate the index weight, and using the fuzzy comprehensive evaluation to evaluate the security level of the forth party logistics information system; 2,Analyzes and summarizes the characteristics of the forth party logistics information system, and do risks identification, and studies the security risks, then select the important risk factors to establish the forth party logistics information system security assessment index system, and based on the analytic network process and the fuzzy comprehensive evaluation to evaluate the assessment model;3,Take one forth party logistics information system as an example, using the index system and the assessment model to do security risks assessment, explaining the whole process of risk assessment, analysis the situation of the entire information system security risks, achieving the good application.
Keywords/Search Tags:the forth party logistics (4PL), information system security risk assessment, the analytic network process(ANP), the fuzzy comprehensive evaluation
PDF Full Text Request
Related items