{"title":"A security risk assessment method of website based on threat analysis combined with AHP and entropy weight","authors":"Zhiquan Lai, Yongjun Shen, Guidong Zhang","doi":"10.1109/ICSESS.2016.7883113","DOIUrl":null,"url":null,"abstract":"In the field of information security, risk assessment is the core of the risk management and control. This paper proposes a security risk assessment method based on threat analysis combined with AHP and entropy weight. This method has features that are suitable for website such as practical, easy operative and independent. And the AHP and entropy weight make the evaluation results more objective. This paper gives the calculation model of the method and the main procedures of risk assessment. Finally, take a website as an example to verify the rationality and effectiveness of this method.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSESS.2016.7883113","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
In the field of information security, risk assessment is the core of the risk management and control. This paper proposes a security risk assessment method based on threat analysis combined with AHP and entropy weight. This method has features that are suitable for website such as practical, easy operative and independent. And the AHP and entropy weight make the evaluation results more objective. This paper gives the calculation model of the method and the main procedures of risk assessment. Finally, take a website as an example to verify the rationality and effectiveness of this method.