By Topic

A Novel Security Risk Assessment Method of Enterprise Information System Based on the Correlation of Equipments

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Yong Liu ; Northeastern Univ., Shenyang, China ; Qi Lin ; Kun Meng ; Zhi Min Tian

Many risk assessment approaches evaluate the security by considering the status of equipments in the system separately, while the infrastructure of the system, which also has impact on assessing the system risk, is not taken into consideration properly. In this paper we propose a novel risk assessment method which considers the correlation of the equipments in the evaluated system. Where the risk of every equipment is divided into the individual one and the impact of other equipments. By setting vulnerability-threat conjunction matrix of the equipments, we give an approach which is facilitate to calculate the impact of other equipments. In the end of the paper, we propose an example to explain the correctness and efficiency of the proposed method.

Published in:

Information Science and Engineering (ICISE), 2009 1st International Conference on

Date of Conference:

26-28 Dec. 2009