{"title":"基于云计算的信息安全风险评估研究","authors":"Shan Jiang","doi":"10.1145/3230348.3230404","DOIUrl":null,"url":null,"abstract":"Cloud computing services brings about the cost reduction and information convenience, however, its security issues have become increasingly prominent. As the construction foundation, the risk evaluation of information security plays an important role in the construction of management system of information security. The index system establishment of risk evaluation of information security is the premise and key of evaluation work. This paper summarizes the concept, process and methods of risk evaluation of information security. On the basis of these work, the index system of risk evaluation of information security with four rule layers and sixteen scheme layers is constructed. According to the method of analytic hierarchy process, this paper assigns the weight of each scheme layer and constructs a complete index system of risk evaluation of information security.","PeriodicalId":188878,"journal":{"name":"Proceedings of the 2018 1st International Conference on Internet and e-Business","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Research on Risk Evaluation of Information Security Based on Cloud Computer\",\"authors\":\"Shan Jiang\",\"doi\":\"10.1145/3230348.3230404\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing services brings about the cost reduction and information convenience, however, its security issues have become increasingly prominent. As the construction foundation, the risk evaluation of information security plays an important role in the construction of management system of information security. The index system establishment of risk evaluation of information security is the premise and key of evaluation work. This paper summarizes the concept, process and methods of risk evaluation of information security. On the basis of these work, the index system of risk evaluation of information security with four rule layers and sixteen scheme layers is constructed. According to the method of analytic hierarchy process, this paper assigns the weight of each scheme layer and constructs a complete index system of risk evaluation of information security.\",\"PeriodicalId\":188878,\"journal\":{\"name\":\"Proceedings of the 2018 1st International Conference on Internet and e-Business\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-04-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2018 1st International Conference on Internet and e-Business\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3230348.3230404\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2018 1st International Conference on Internet and e-Business","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3230348.3230404","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research on Risk Evaluation of Information Security Based on Cloud Computer
Cloud computing services brings about the cost reduction and information convenience, however, its security issues have become increasingly prominent. As the construction foundation, the risk evaluation of information security plays an important role in the construction of management system of information security. The index system establishment of risk evaluation of information security is the premise and key of evaluation work. This paper summarizes the concept, process and methods of risk evaluation of information security. On the basis of these work, the index system of risk evaluation of information security with four rule layers and sixteen scheme layers is constructed. According to the method of analytic hierarchy process, this paper assigns the weight of each scheme layer and constructs a complete index system of risk evaluation of information security.