Font Size: a A A

Research And Realization Of Information Security Evaluation Based On Fuzzy Integrated Estimation

Posted on:2009-03-23Degree:MasterType:Thesis
Country:ChinaCandidate:L ChenFull Text:PDF
GTID:2178360272963972Subject:Safety Technology and Engineering
Abstract/Summary:PDF Full Text Request
Information system security is becoming more and more important because a great deal of secret information which comes from government organizations, financial and economic departments, educational institutions, and military organs, flows into information system. How to protect the system and how to value the system security have become the focus of governments, organizations and PC users. This paper, systematically and completely, realizes the transformations of fuzzy integrated estimation from theory to model in the estimation of information security.The paper specifically analyzes the characteristics of the evaluation, realizes the transformation from the mode to the system with the fuzzy integrated estimation and gives the corresponding weights by AHP. At the same time, the paper gives the detailed analysis in working out the subjections, estimation matrixes and the weithts of the indexes. Also, the paper points out some sortcomings about the problems above, and provides theoretical analyses and corresponding conceptions to these problems, at last it gives the conceive about the improvement. Finally, this paper, scientifically and completely realizes the core system by demand analysis, outline design, specific design, software test and maintenance from the view of software engineering.The system, based on the integrated development environment Visual Studio 2005, uses the popular enterprise-development plan to manage data of system organizations by SQL Server 2000 and ACCESS in .NET Framework, and set up the development of Web application by ADO.NET and ASP.NET 2.0.In brief, the research achievement of this paper is practically and theoretically important, and makes a crucial step from theory to practice in the estimation of information system security. Therefore, managers of this system have a complete model to rely on, and a software environment to use.
Keywords/Search Tags:estimation of information system security, fuzzy integrated estimation, analytical hierarchy process, .NET Framework
PDF Full Text Request
Related items