Security evaluation method for confidential and stable complex systems

Confidential and stable complex systems are characterized by high confidentiality requirements,continuous and stable operation requirements,and complex network structure,but existing evaluation models has a single dimension of security objectives and lack the correlation analysis among indicators.In...

Full description

Saved in:
Bibliographic Details
Main Authors: Jinxin ZUO, Ziyu GUO, Jin LI, Jie ZHANG, Yueming LU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2019-04-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2019017
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Confidential and stable complex systems are characterized by high confidentiality requirements,continuous and stable operation requirements,and complex network structure,but existing evaluation models has a single dimension of security objectives and lack the correlation analysis among indicators.In view of this,a comprehensive security evaluation model based on the correlation analysis of indicators is proposed and eight security objectives covering confidentiality,availability,controllability,identifiability,personnel organization,risk management,enterprise grading and sustainability at three levels of product,system and service have been established.Taking the confidentiality of the smart medical IoT as an example,a sorting and weight confirmation algorithm based on index correlation is constructed,and the fuzzy comprehensive evaluation method is used to evaluate the selected system.
ISSN:2096-109X