Information system risk assessment method and apparatus

An information system and risk assessment technology, applied in the field of information system risk assessment methods and devices, can solve the lack of asset group security operation and maintenance center risk assessment methods, and does not give the security operation and maintenance center vulnerability value, threat value, and risk value Calculation methods and other issues to achieve the effect of risk early warning

Inactive Publication Date: 2017-05-24
NSFOCUS INFORMATION TECHNOLOGY CO LTD +1
View PDF4 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Since the specification only introduces the basic process and principle of single asset risk analysis, that is, how to identify and assign values ​​to the three major elements (assets, vulnerabilities, threats), and use multiplication or matrix methods to calculate the risk value, there is no Given the calculation methods for the vulnerability value, threat value, and risk value of the asset group composed of a single asset and the entire security operation and maintenance center, the existing technology lacks a risk assessment method for the asset group and the entire security operation and maintenance center

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information system risk assessment method and apparatus
  • Information system risk assessment method and apparatus
  • Information system risk assessment method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some embodiments of the present invention, rather than all embodiments . Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0024] see figure 2 As shown, the embodiment of the present invention provides a schematic flow chart of an information system risk assessment method, and the specific implementation method includes:

[0025] Step S101, determining the value of each basic risk element of each assessment object in the information system, and each risk basic element includes at least three basic elements: asset, threat, and vulnerability.

[0026] Step S10...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an information system risk assessment method and apparatus. The method comprises the following steps: determining values of basic risk elements of each assessment object in aninformation system, wherein the basic risk elements at least comprise three basic elements, namely assets, threats and vulnerability; for any basic risk element of any security domain in the information system, using the values of the basic risk elements of the assessment objects in the security domain as model factors, performing calculation by using a preset probability calculation model to obtain the values of the basic risk elements of the assessment objects in the security domain, wherein the weight value corresponding to the maximum value of the basic risk elements of the assessment objects in the security domain is the maximum; and performing calculation according to the above method to obtain the value of each basic risk element in the security domain, and figuring out the risk value of the security domain by using a risk assessment algorithm according to the value of each basic risk element in the security domain. A method for performing accurate risk assessment method on asset units and an entire security operation and maintenance center is provided.

Description

technical field [0001] The invention relates to the field of network security, in particular to an information system risk assessment method and device. Background technique [0002] Information system risk assessment is to use scientific methods and means from the perspective of risk management to systematically analyze the threats faced by information systems and their existing vulnerabilities, and to assess the degree of harm that may be caused by security incidents. Targeted protection countermeasures and rectification measures against threats provide a scientific basis for preventing and resolving information security risks, controlling risks at an acceptable level, and maximizing information security. [0003] The current national standard GB / T 20984-2007 information system risk assessment specification introduces the three basic elements involved in risk analysis: assets, threats, and vulnerabilities. Each element has its own attribute. The attribute of asset is asse...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/10H04L63/20
Inventor 赵粤征肖岩军李瀛贠珊
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products