The configuration of the information system security policy is directly related to the security risks faced by the information assets. The security policy configuration required by the computer level protection ensures the optimal minimum configuration under the corresponding security level. Based on the information entropy theory, this paper defines the corresponding evidence distance, and obtains relevant evidence through threat, security policy configuration, system vulnerability investigation, and calculates the evidence distance of vulnerability being threatened according to the definition, thus realizing the measurement of system risk. With example analysis, the results prove that this method conducts effective risk evaluation model for information system intuitively and reliably, avoids the threat caused by subjective measurement, and shows performance benefits compared with existing solutions. It is not only theoretically but also practically feasible to realize the scientific analysis of security risk for the information system.
CITATION STYLE
LingHu, J., Pan, P., & Du, Y. (2020). Risk Analysis of Information System Security Based on the Evidence Distance. In Lecture Notes in Electrical Engineering (Vol. 582, pp. 347–358). Springer. https://doi.org/10.1007/978-981-15-0474-7_33
Mendeley helps you to discover research relevant for your work.