Font Size: a A A

Information System Key Node Identification And Risk Analysis Based On Business Process Association Model

Posted on:2021-03-27Degree:MasterType:Thesis
Country:ChinaCandidate:G QinFull Text:PDF
GTID:2428330611968898Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In recent years,with the development of information systems and the popularization of intelligent business process,information systems are widely used in the business process.However,the business process is becoming more and more convenient.But it also affected by the security of information systems.At present,current research on system security is limited to the security analysis of a single system,without considering the correlation between multiple systems and unable to identify the key node in the business process.Therefore,it is of great significance to study the key node identification model in business process to protect the security of business process.Firstly,the research status of system security was summarized,and the multi-attribute decision-making methods and weighting methods involved in system security research were analyzed,and the commonly used key node identification models were analyzed,which laid the foundation for the subsequent establishment of key node identification model in business process.Secondly,a key node identification model based on business process association model was proposed.The model abstracted the business systems as nodes.According to the composition of the systems in the business process,the business process association tree and the business process association network were established to represent the relationship among business systems,and the association evaluation attribute matrix was obtained.The weighting method and the relative calculation method in the technique for order preference by similarity to an ideal solution(TOPSIS)were improved.The improved TOPSIS method was used to calculate the association evaluation attribute matrix to get the system importance coefficient.The key node was identified based on the importance coefficient in the business process.The security risks in the business process were analyzed,and the impact of information security incidents on the business systems on the continuity of the business process was evaluated.Finally,the simulation experiments were conducted to verify the effectiveness of the model in identifying the key node in the business process and evaluating business process security.The experimental results show that this model has high recognition accuracy,effectively reduces the time cost of the recognition process,and helps to effectively evaluate the risk and impact of the business systems on the business process.
Keywords/Search Tags:business process, association model, evaluation attributes, key node, continuity, risk analysis
PDF Full Text Request
Related items