{"title":"Information Security Risk Assessment Based on Analytic Hierarchy Process and Fuzzy Comprehensive","authors":"X. Long, Qi Yong, Qianmu Li","doi":"10.1109/ICRMEM.2008.71","DOIUrl":null,"url":null,"abstract":"Starting with the theory and research status on the information security risk assessment, this paper puts forward information security risk evaluation method based on analytic hierarchy process and fuzzy comprehensive evaluation, and solves the difficulty of the qualitative index and quantitative evaluation in the risk assessment process. Finally, it gives examples to prove that this method can be well applied to information security risk assessment.","PeriodicalId":430801,"journal":{"name":"2008 International Conference on Risk Management & Engineering Management","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Conference on Risk Management & Engineering Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRMEM.2008.71","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
Starting with the theory and research status on the information security risk assessment, this paper puts forward information security risk evaluation method based on analytic hierarchy process and fuzzy comprehensive evaluation, and solves the difficulty of the qualitative index and quantitative evaluation in the risk assessment process. Finally, it gives examples to prove that this method can be well applied to information security risk assessment.