| 1. | The method of information security risk assessment using bayesian networks 基于贝叶斯网络的信息安全风险评估方法 |
| 2. | Design of security risk assessment tools for information system security based on web 的信息系统安全风险评估工具的设计 |
| 3. | Fuzzy multi - criteria decision making method of information security risks assessment 舰艇消防系统生命力模糊综合评估方法研究 |
| 4. | This document acts as a supplementary document to it security guidelines to give an introduction to a generic reference model for it security risk assessment and security audit 这是《资讯科技保安指引》的补充文件,概述适用于保安风险评估及审计的参考模型。 |
| 5. | This paper focus on the application of the information security management standard - bs7799 to information security risk assessment and a whole set of designing scheme is provided , which is finally implemented in software form 本文重点研究如何将信息安全管理标准bs7799应用到信息安全风险评估中,提供了整套的设计方案,并最终用软件实现。 |
| 6. | With the development of internet , the issue of website security becomes more and more serious and comes to social attention . the website security risk assessment is important in the course of website security construction 随着internet的发展,网站安全问题日益严重,引起了全社会的广泛关注,而网站安全风险评估则在网站安全建设过程中具有重要的地位。 |
| 7. | The achievements and new ideas in this paper are as follows : significance of research and development of the assessment tools of information security risk is analyzed , the relation between information security and information security risk assessment is discussed , the familiar risk assessment standards and risk assessment tools are introduced 成果及新见解如下:分析了信息安全风险评估工具的研究和开发意义,讨论了信息安全与信息安全风险评估的关系,介绍了常见的风险评估标准和当前常见的风险评估工具。 |
| 8. | This thesis based on the task study deals with design and realization of cc criteria security risk assessment system first presents the concepts and statuses of information security and risk assessment . it then expounds risk assessment ' s two main parts , criteria and process & methods . and it discusses deeply in the theory research results of the task prophase include cc criteria and cc evaluation process & methods , especially in cc ' s main idea , the applications of cc , work of the three phases in cc evaluation process and the applications of the cem documents together with cc in evaluation phase used in this security risk assessment system 本文以基于cc标准的风险评估系统的设计和开发课题为背景,首先对信息安全及风险评估的相关概念及现状做了介绍,其次详细的阐述了风险评估概念及两个重要组成? ?标准体系以及评估的过程和方法,然后总结了评估系统在设计时所涉及到的课题前期理论研究成果包括cc评估标准以及cc评估过程和方法等内容,特别是对cc标准的核心思想、 cc标准的具体应用、 cc评估过程三个阶段的工作以及cc标准的伴随文档cem作为评估方法依据在执行评估阶段的具体应用等方面做了深入研究和详细论述,并指出这些理论依据当前存在的不足,本文最后以前面的理论研究成果为依据,阐述了cc评估系统的组成部分以及总体的设计方案,并对已完成的实现部分做了介绍。 |