Font Size: a A A

Study On Information Security Risk Assessment Mode Of Product Life-Cycle

Posted on:2016-03-15Degree:MasterType:Thesis
Country:ChinaCandidate:S T LiuFull Text:PDF
GTID:2181330467980923Subject:Safety science and engineering
Abstract/Summary:PDF Full Text Request
With the development of the society, various products have become the essential elementin people’s life. Products were the core competitiveness of enterprises, once the importantinformation that is relevant is damaged or leaked out, it would cause huge losses to theenterprise. So ensuring the security of the products information is vital for the survival anddevelopment of the enterprises. Product information runs through the productlife-cycle, characterized by dynamic, distribution, heterogeneity and so on. In the assessmentof product information security risk, it is a must to conduct in view of the product life-cycle,and put forward the corresponding control measures at the same time. Only in this way canwe prevent the product information from being damaged or leaked effectively.Firstly, this paper introduced the related concepts, classified product information, andanalyzed the characteristics of the product information. At the same time, there was anintroduce about the related content of product information security risk, product informationsecurity risk assessment and the methods that were used in this paper. Secondly, this paperanalyzed the relationship between the three elements of information security risk, namely, theassets, threats and vulnerabilities, and then identified the product information assets, threats,vulnerabilities and the existing safety control measures respectively. Thirdly, established therisk assessment mode of information security in product life-cycle, identified the key assetsand established a tracking in product life-cycle of the information related to the key assets,built threat scenarios of the key assets; then evaluated the key assets of product information,the threats and the vulnerabilities respectively, confirmed the effectiveness of the existingsafety control measures, and determined the risk value at last. Finally, an application examplewas given to validate the feasibility and effectiveness of the risk assessment mode ofinformation security in product life-cycle.
Keywords/Search Tags:product life-cycle, information security, risk assessment, key asset, threat, vulnerability
PDF Full Text Request
Related items