{"title":"基于层次分析法和模糊综合的信息安全风险评估","authors":"X. Long, Qi Yong, Qianmu Li","doi":"10.1109/ICRMEM.2008.71","DOIUrl":null,"url":null,"abstract":"Starting with the theory and research status on the information security risk assessment, this paper puts forward information security risk evaluation method based on analytic hierarchy process and fuzzy comprehensive evaluation, and solves the difficulty of the qualitative index and quantitative evaluation in the risk assessment process. Finally, it gives examples to prove that this method can be well applied to information security risk assessment.","PeriodicalId":430801,"journal":{"name":"2008 International Conference on Risk Management & Engineering Management","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Information Security Risk Assessment Based on Analytic Hierarchy Process and Fuzzy Comprehensive\",\"authors\":\"X. Long, Qi Yong, Qianmu Li\",\"doi\":\"10.1109/ICRMEM.2008.71\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Starting with the theory and research status on the information security risk assessment, this paper puts forward information security risk evaluation method based on analytic hierarchy process and fuzzy comprehensive evaluation, and solves the difficulty of the qualitative index and quantitative evaluation in the risk assessment process. Finally, it gives examples to prove that this method can be well applied to information security risk assessment.\",\"PeriodicalId\":430801,\"journal\":{\"name\":\"2008 International Conference on Risk Management & Engineering Management\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-11-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 International Conference on Risk Management & Engineering Management\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRMEM.2008.71\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Conference on Risk Management & Engineering Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRMEM.2008.71","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Information Security Risk Assessment Based on Analytic Hierarchy Process and Fuzzy Comprehensive
Starting with the theory and research status on the information security risk assessment, this paper puts forward information security risk evaluation method based on analytic hierarchy process and fuzzy comprehensive evaluation, and solves the difficulty of the qualitative index and quantitative evaluation in the risk assessment process. Finally, it gives examples to prove that this method can be well applied to information security risk assessment.