Font Size: a A A

Design And Research Of The Safety Assessment System Based On Host Security Layer

Posted on:2015-03-15Degree:MasterType:Thesis
Country:ChinaCandidate:J P QingFull Text:PDF
GTID:2298330422476238Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In daily life, the network technology has penetrated into all round,information leak occurred frequently, people’s personal and propertysafety meet with great harm. So information protection has become aproblem to be solved in all walks of life. And safety risk assessment as animportant part of information security, it is great significance for users tounderstand the security status of the information system. But because ofthe process is complex and cycle is long in the security risk assessment, itis severely hampered the process of the security risk assessment forindustry. Therefore, it is a hot spot in the future study of risk assessmentservices to targeted develop an automation、modular system of the safetyrisk assessment.After researching the third of the host security level protectionbased on Windows Server2003platform,analyzing safety requirementsof the host security layer,a evaluation system of host security based onthe host security layer was designed. Firstly, through studying the factorsof safety evaluation on the host security layer, a tree recursive structuremodel of three layers has been built. Secondly, after quantifing by expertscoring based on y the tree recursive structure model of three layer, thehost safety comprehensive evaluation value was calculated by using Fuzzy hierarchy comprehensive evaluation, and the feasibility of thealgorithm is verified with an instance. Lastly, the evaluation system basedon host layer under the support of the algorithm was designed, whileevery each module function of the system were introduced andimplemented. Design of this system is mainly wants to reduce thedifficulty of the safety risk assessment, to improve the efficiency of thesafety risk assessment, even it is easier to provide data support forsecurity administrator or workers to understand the current security levelof host information system, and to reduce the cost of safety riskmanagement.
Keywords/Search Tags:evaluation elements of host security layer, structure model ofsafety assessment elements, AHP, FAHP
PDF Full Text Request
Related items