Information system security risk assessment method
An information system, security risk technology, applied in transmission systems, digital transmission systems, security communication devices, etc., can solve problems such as failure to meet security risk assessment scenarios
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0094] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0095] S1: Build a dynamic security game model.
[0096] In the S1 step, the dynamic security game model of the information system is constructed, including:
[0097] Establish a dynamic security game model (S,A,P,ε,V) under the information system environment;
[0098] S represents the set of states in the information system, each state is the state that the network node may exist in the information system, and the state is the privileged state of the network entity in the information system, divided into no privilege, remote access privilege, local user Privileges and root privileges;
[0099] A represents the action set of the attacker and the defender in the information system, the attacker's action is the weakness information existing in the information system network, and the defender's action is the defense ac...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


