Enterprise information system safety evaluation model based on boundary shell comprehensive strength
An enterprise information system and security evaluation technology, which is applied in the field of enterprise information system security evaluation model based on the comprehensive strength of the shell, can solve the problems that are not considered, affect the accuracy and validity of research results, and involve different scopes. Improve the safety level and promote the effect of good development
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] This embodiment provides an enterprise information system security evaluation model based on the comprehensive strength of Jieke, such as figure 1 shown, including:
[0033] The first building block 11 is used to build a three-layer shell protection system according to the protection stage of the enterprise information system;
[0034] The determination module 12 is used to determine the weight of each evaluation index in the three-layer boundary shell protection system by using the principal component analysis and the comprehensive strength of the boundary shell according to the constructed three-layer boundary shell protection system;
[0035] The second construction module 13 is used to construct a multi-dimensional enterprise information system security evaluation model by using the fuzzy comprehensive evaluation method according to the determined weights of each evaluation index.
[0036] The comprehensive strength of Jieke:
[0037] System theory regards the wor...
Embodiment 2
[0091] An enterprise information system security evaluation model based on the comprehensive strength of Jieke provided in this embodiment is different from Embodiment 1 in that:
[0092] This embodiment is described with specific examples.
[0093] In the questionnaire design process, the research dimension will also affect the security quality of the enterprise information system. Therefore, it is necessary to study the difference in the comprehensive strength of the enterprise information system in different industries, scales and geographical locations. The values of PD, RA, and MU are obtained after partial primary weighting by formula (7), and then secondary weighting is performed to obtain the comprehensive strength of the enterprise information system in three dimensions of industry, scale, and region, as shown in Tables 5, 6, and 7.
[0094]
[0095] Table 5 Global and local weighting method to calculate the influence of industry on the comprehensive strength of ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



