Unlock instant, AI-driven research and patent intelligence for your innovation.

Information system risk analysis and security situation assessment method

A technology of risk analysis and security situation, applied in the field of information security technology and big data, it can solve the problems of cumbersome assessment of information system risk and security situation, and achieve the effect of detailed risk analysis and situation assessment.

Pending Publication Date: 2022-03-22
STATE GRID SICHUAN ELECTRIC POWER CORP ELECTRIC POWER RES INST
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the complexity of the composition of the information system makes the assessment of its risk and security situation very cumbersome.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information system risk analysis and security situation assessment method
  • Information system risk analysis and security situation assessment method
  • Information system risk analysis and security situation assessment method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The application will be described in further detail below in conjunction with the accompanying drawings. It is necessary to point out that the following specific embodiments are only used to further illustrate the application, and cannot be interpreted as limiting the protection scope of the application. The above application content makes some non-essential improvements and adjustments to this application.

[0030] A method for risk analysis and security situation assessment of an information system, the steps comprising:

[0031] Step 1: Establish risk analysis and security situation evaluation index system;

[0032] Step 2: Calculate the evaluation indicators of risk analysis and security situation awareness, and use the analytic hierarchy process to determine the weight of each specific indicator;

[0033] Step 3: Calculate the utility value corresponding to each evaluation index according to the utility function, and then calculate the total evaluation value of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information system risk analysis and security situation evaluation method. The method comprises the following steps: step 1, establishing a risk analysis and security situation evaluation index system; 2, calculating various evaluation indexes of risk analysis and security situation awareness, and determining the weight of each specific index by using an analytic hierarchy process; and step 3, calculating a utility value corresponding to each evaluation index according to the utility function, and further calculating a total evaluation value of information system risk analysis and security situation to complete evaluation. Research of an information system risk analysis and security situation assessment method is an important direction for people to pay attention to information security in recent years. According to the invention, risk analysis and situation assessment of an information system are refined through equipment state assessment, attack behavior assessment, abnormal behavior assessment and system vulnerability assessment by means of an analytic hierarchy process.

Description

technical field [0001] The invention relates to the fields of information security technology and big data technology, in particular to a method for risk analysis and security situation assessment of an information system. Background technique [0002] With the increasing development and popularization of Internet technology and mobile communication technology, big data platforms are also facing network threats and data security issues. The amount of information exchange between big data platforms and users has been greatly increased, and data security and risk prevention in the field of big data platforms are more complicated than traditional networks. For example, the most common enterprise information system is the fundamental guarantee and important means of enterprise production and management, and the security of the information system is fundamental to the stable and reliable operation of the information system. [0003] The research on information system risk analys...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06G06Q50/26G06F17/16
CPCG06Q10/0635G06Q10/06393G06Q50/265G06F17/16
Inventor 张凌浩王胜唐勇梁晖辉柴继文吴民熊晓雯刘涛张颉唐超王海张菊玲向思屿
Owner STATE GRID SICHUAN ELECTRIC POWER CORP ELECTRIC POWER RES INST