{"title":"事业单位信息安全评估模型研究","authors":"Feng Hua, Wei Wei-min, Kong Zhi-wei, Yang Shuo","doi":"10.1109/ISPACS.2017.8266482","DOIUrl":null,"url":null,"abstract":"With the continuous increase of network threats, the state public institutions must carry out risk assessment methods to ensure and improve the information security of public institutions; security system must be consistent with the construction of national information security policies and requirements. The study found that China's public institutions in the information security risk assessment, there are still non-standard assessment criteria, evaluation methods, poor operability and other issues. This paper studies the model based on the level of protection and risk assessment, and puts forward the model based on the level of risk assessment and the risk assessment model. The model is based on the level of risk assessment and the risk assessment model. The evaluation model puts forward the construction process of the security system based on the information security risk assessment.","PeriodicalId":166414,"journal":{"name":"2017 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Research on information security evaluation model of public institution\",\"authors\":\"Feng Hua, Wei Wei-min, Kong Zhi-wei, Yang Shuo\",\"doi\":\"10.1109/ISPACS.2017.8266482\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the continuous increase of network threats, the state public institutions must carry out risk assessment methods to ensure and improve the information security of public institutions; security system must be consistent with the construction of national information security policies and requirements. The study found that China's public institutions in the information security risk assessment, there are still non-standard assessment criteria, evaluation methods, poor operability and other issues. This paper studies the model based on the level of protection and risk assessment, and puts forward the model based on the level of risk assessment and the risk assessment model. The model is based on the level of risk assessment and the risk assessment model. The evaluation model puts forward the construction process of the security system based on the information security risk assessment.\",\"PeriodicalId\":166414,\"journal\":{\"name\":\"2017 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISPACS.2017.8266482\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISPACS.2017.8266482","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research on information security evaluation model of public institution
With the continuous increase of network threats, the state public institutions must carry out risk assessment methods to ensure and improve the information security of public institutions; security system must be consistent with the construction of national information security policies and requirements. The study found that China's public institutions in the information security risk assessment, there are still non-standard assessment criteria, evaluation methods, poor operability and other issues. This paper studies the model based on the level of protection and risk assessment, and puts forward the model based on the level of risk assessment and the risk assessment model. The model is based on the level of risk assessment and the risk assessment model. The evaluation model puts forward the construction process of the security system based on the information security risk assessment.