Font Size: a A A

Dynamic Information Based On Fuzzy Probability Risk Assessment Model

Posted on:2010-01-23Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y LiuFull Text:PDF
GTID:2199360275962650Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
With computer and network technology rapidly developing, information technology accelerates and deepens the process of information society and grows organization and information system's relationship. However, information systems in organizations improve the sharing of information resources and operational efficiency at the same time; it also brings about information security issues. Therefore, comprehensive and systematic information on the organizations information systems security risk assessment, as the information system construction and safety management foundation, an extremely important practical significance, and the relevant safety standards, security risk assessment models, assessment methodologies, as well as the corresponding assessment tool development, has become the practice of current theory and research hot spots.This paper's researching background is Shandong Province Office of Education National Student Loan Management Information System. The developments of information security and risk assessment ,researching background , security-related and risk theory concepts and methods related to conduct are deeply researched based on the information security and risk assessment calculating model . Main contents as follows:(1) Presents a probability based on fuzzy risk analysis methodBayesian probabilistic risk analysis model can be an effective solution in the process of risk to quantify uncertainties, including risk of loss probability and uncertainty, for the effective implementation of risk management to provide a basis. At improving its coarse grain size calculated value of the risk analysis arising from the uncertainty of measurement results based on a probability interval based on fuzzy assessment model, improve the accuracy of the results of the analysis and risk assessment of the effective sexual.(2) The use of evolutionary algorithms to optimize the risk assessment modelProcess for assessing likelihood value, set up an information security risk analysis of fuzzy multi-objective optimization model and solving the model framework, the use of evolutionary algorithms to optimize the risk assessment model; the algorithm based on fuzzy constraint operator handle, small Habitat outstanding technical and operational solutions to ensure that the process of nurturing the diversity of know, know to speed up the convergence process. Finally give the solution set in the model to solve the most satisfactory security program fuzzy multi-attribute decision-making method. Information system security assessment based on the overall framework, you can finally solving a decision to integrate all the security advice, give full consideration to a number of policy objectives will be able to control information security risks at an acceptable scope of an ideal security program.(3) Design and implementation of a probability based on fuzzy dynamic model of risk assessment information. Experimental results show that the modules be able to timely and reasonable analysis of the risk of the threat system and in accordance with different threat level in response to early warning, reduce the risk of threats, to achieve the design goals.At present, there are many shortcomings and deficiencies in this research, but there is still much work which can be extended in the future. Information security and risk assessment model have to be further developed and improved. However, there are a lot of security models developed and the risk assessment models are not. The current assessment methods do not have a strong adaptability. China has put forward the security system to protect information systems, research and put forward risk assessment method and models for information security, so development of risk assessment will be of great significance.
Keywords/Search Tags:Information Security, Risk Assessment, Risk Analysis Calculation Model
PDF Full Text Request
Related items