With the rapid development of network technology, there inevitably exists some potential security problems while sharing resources in network. Network security issues have received particular attention while doing network research. Since the technique of network security assessment can detect potential vulnerabilities and give the security condition of network system, it has become one of the most important techniques to realize network security. This paper on the base of small and medium-sized network system, Raised a general assessment model and associated algorithm. to help achieve the automated risk assessment. Specific activities include the following:(1)Analysis the needs of small and medium-sized network system security, expounded the major security threat and the corresponding solutions of small and medium-sized networks sysytem. Then investigations on the development abroad for network security risk assessment status of criteria of both here andmade.(2) The common methods for network security risk assessment are introduced in the paper, Comparing and analysis these methods, one method is chosen for this small and medium-sized network sysytem. Through automation of network security risk assessment, obtained appraisal result which an entire direct-viewing user is easy to accept.(3) According to the network security requirements of small and medium-sized network system, raised a common network security risk assessment model for small and medium-sized network system, design and implement a kind of network security assessment prototype system. Particular designs for system functions, system structures, basic functional modules, and the logic relations between the modules are made and the functions of main modules are realized.(4) Finally, according to this network security assessment model,studied a practical algorithm for small and medium-sized network system particular, consummated the factors that network risk analysis methods should be considered. Risk management can be implemented by automatic principles. |