Check patentability & draft patents in minutes with Patsnap Eureka AI!

Enterprise information system safety evaluation model based on boundary shell comprehensive strength

An enterprise information system and security evaluation technology, which is applied in the field of enterprise information system security evaluation model based on the comprehensive strength of the shell, can solve the problems that are not considered, affect the accuracy and validity of research results, and involve different scopes. Improve the safety level and promote the effect of good development

Pending Publication Date: 2021-01-01
HANGZHOU DIANZI UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

H.Cholez et al. proposed a maturity model of enterprise information system security to realize the measurement of information system security of small and medium-sized enterprises, but did not consider the impact of regional factors on enterprise information system security
The evaluation methods used in the existing literature have their own emphasis, and the selected evaluation indicators cover different sizes, which affects the accuracy and effectiveness of the research results to a certain extent.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enterprise information system safety evaluation model based on boundary shell comprehensive strength
  • Enterprise information system safety evaluation model based on boundary shell comprehensive strength
  • Enterprise information system safety evaluation model based on boundary shell comprehensive strength

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] This embodiment provides an enterprise information system security evaluation model based on the comprehensive strength of Jieke, such as figure 1 shown, including:

[0033] The first building block 11 is used to build a three-layer shell protection system according to the protection stage of the enterprise information system;

[0034] The determination module 12 is used to determine the weight of each evaluation index in the three-layer boundary shell protection system by using the principal component analysis and the comprehensive strength of the boundary shell according to the constructed three-layer boundary shell protection system;

[0035] The second construction module 13 is used to construct a multi-dimensional enterprise information system security evaluation model by using the fuzzy comprehensive evaluation method according to the determined weights of each evaluation index.

[0036] The comprehensive strength of Jieke:

[0037] System theory regards the wor...

Embodiment 2

[0091] An enterprise information system security evaluation model based on the comprehensive strength of Jieke provided in this embodiment is different from Embodiment 1 in that:

[0092] This embodiment is described with specific examples.

[0093] In the questionnaire design process, the research dimension will also affect the security quality of the enterprise information system. Therefore, it is necessary to study the difference in the comprehensive strength of the enterprise information system in different industries, scales and geographical locations. The values ​​of PD, RA, and MU are obtained after partial primary weighting by formula (7), and then secondary weighting is performed to obtain the comprehensive strength of the enterprise information system in three dimensions of industry, scale, and region, as shown in Tables 5, 6, and 7.

[0094]

[0095] Table 5 Global and local weighting method to calculate the influence of industry on the comprehensive strength of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an enterprise information system safety evaluation model based on boundary shell comprehensive strength, and the model comprises: a first construction module which is used forconstructing a three-layer boundary shell protection system according to a protection stage of an enterprise information system; a determination module which is used for determining the weight of eachevaluation index in the three-layer boundary shell protection system by utilizing principal component analysis and boundary shell comprehensive strength according to the constructed three-layer boundary shell protection system; and a second construction module which is used for constructing a multi-dimensional enterprise information system safety evaluation model by using a fuzzy comprehensive evaluation method according to the determined weights of the evaluation indexes. According to the invention, the safety of the enterprise information system can be evaluated more comprehensively, and the credibility and effectiveness of research results can be enhanced.

Description

technical field [0001] The invention relates to the technical field of enterprise information system security, in particular to an enterprise information system security evaluation model based on the comprehensive strength of Jieke. Background technique [0002] IBM Security and Ponemon Institute jointly released the Global 2017 Data Breach Cost Survey Report, pointing out that the average scale of data breach incidents (the number of lost or stolen records) in many industries and large-scale enterprises increased by 1.8% compared with previous years, and information security has become an important aspect of enterprise production and production. The key elements of development, research on enterprise information system security has certain theoretical value and practical significance. [0003] The rapid development of new high-end technologies such as big data, cloud computing, artificial intelligence, and mobile Internet of Things has accelerated the dissemination of infor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06G06K9/62G06N7/02
CPCG06Q10/0635G06Q10/06393G06N7/02G06F18/2135
Inventor 王志会丁祥海辛日晟王元楷
Owner HANGZHOU DIANZI UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More