Risk Analysis of Information System Security Based on the Evidence Distance

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The configuration of the information system security policy is directly related to the security risks faced by the information assets. The security policy configuration required by the computer level protection ensures the optimal minimum configuration under the corresponding security level. Based on the information entropy theory, this paper defines the corresponding evidence distance, and obtains relevant evidence through threat, security policy configuration, system vulnerability investigation, and calculates the evidence distance of vulnerability being threatened according to the definition, thus realizing the measurement of system risk. With example analysis, the results prove that this method conducts effective risk evaluation model for information system intuitively and reliably, avoids the threat caused by subjective measurement, and shows performance benefits compared with existing solutions. It is not only theoretically but also practically feasible to realize the scientific analysis of security risk for the information system.

Cite

CITATION STYLE

APA

LingHu, J., Pan, P., & Du, Y. (2020). Risk Analysis of Information System Security Based on the Evidence Distance. In Lecture Notes in Electrical Engineering (Vol. 582, pp. 347–358). Springer. https://doi.org/10.1007/978-981-15-0474-7_33

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free