Font Size: a A A

The Research On Risk Assessment Of High Security Level Information System

Posted on:2022-05-30Degree:DoctorType:Dissertation
Country:ChinaCandidate:B KongFull Text:PDF
GTID:1488306467475944Subject:Information management
Abstract/Summary:PDF Full Text Request
With the rapid development of the information society,information systems have been widely applied to various fields.At the same time,many high-security information systems have been deployed in key areas such as party and government organs and military units.Information systems play an important role in supporting,guaranteeing,serving,and supervising.Once security risks are discovered,they will have a serious impact on national security and interests,and even social stability.Ensuring the safe,stable and reliable operation of the high security level information system has become a problem that cannot be ignored.Therefore,the risk assessment of the high security level information system has become the research focus and difficulty.Information system risk assessment depends on the degree of importance of the information system in national security,economic construction,and social life,and the degree of harm to national security,social order,public interest,and the legitimate rights and interests of citizens,legal persons,and other organizations.Low to high is divided into five levels of security protection[1].The research object of this paper is high security level information system,especially the third level,fourth level and fifth level information system.This paper systematically studies the theory and methods of information system risk assessment.According to the relevant national laws,regulations and standards,combined with the characteristics of high security level information system,it integrates more than ten years of risk assessment experience and cases,and optimizes the evaluation index system and evaluation.The model improves the specific operational steps of each stage of the evaluation process,ensures the credibility and practicability of the risk assessment results,and proposes practical and feasible recommendations for the security protection and management of high security level information systems,which is in-depth and efficient.It provides strong support for the risk assessment of high security level information systems,and provides a key basis for the relevant national administrative departments to make decisions on the management of high security level information systems.The main research contents and results are as follows:(1)Optimized the risk assessment model of high security level information systemAccording to the characteristics of high security level information system and protection requirements,risk assessment indicators were selected and a multi-level indicator system was constructed.Then based on the index system,the game theory is introduced into the risk assessment,and the evaluator's defense method and the attacker's attack method are used as the basis of the offensive and defensive game.By constructing the offensive and defensive game model,the evaluators and attackers are analyzed during the offensive and defensive process.The gains and expenses incurred,combined with the security level of the high security level information system,calculate the risk value of the information system,making the risk assessment process more scientific and reasonable.(2)Proposed a high security level information system risk assessment model based on application virtualization technologyStarting from the virtualization architecture,the vulnerability and the introduced security threats of the virtualized system in the high security level network environment are comprehensively analyzed.Based on the traditional matrix method,the order value method and the analytic hierarchy process are integrated.The information security risk model of the matrix quantifies the analysis results,introduces a reasonable weight distribution strategy,and obtains the quantitative security assessment results of the virtualized system in the high security level network environment,which is the quantification of the virtualized system in the high security level network environment.The safety assessment provides a strong reference[2].(3)Proposed a risk assessment model for network interconnection environmentThe security protection technology and existing security problems adopted by network interconnection are analyzed.Based on the high security level information system risk assessment and the virtualized system risk assessment,the high security level information system and high security level information system are studied.The risk assessment of interconnection,such as virtualization system,high security level information system and industrial control system,proposes a risk assessment model under different interconnections,which greatly improves the risk control capability of the network interconnection environment.(4)Design and implement a high security level information system risk assessment systemBased on the optimized and improved high security level information system risk assessment index system and risk assessment model,the prototype system of high security level information system risk assessment was designed and implemented.The key evaluation items were used to quantify the frequency of deduction of different key evaluation items.The key evaluation items of frequent deductions and their corresponding security risks are located.Through the multi-dimensional effective network features,the prediction of similar network security risks is realized.In addition,based on the collected data,starting from the common evaluation problems,the methods of statistical analysis are used to analyze the causes of these evaluation problems,and provide theoretical support for guiding the work of the evaluators and simplifying the business volume of the evaluators.In addition,according to the risk level and the degree of influence,the risk control area is divided and the corresponding risk control strategy is formulated.
Keywords/Search Tags:High security level information system, risk assessment, virtualization technology, risk control
PDF Full Text Request
Related items