风险分析与控制

A. Chiriac, S. Mocanu, Andrei Lacatusu
{"title":"风险分析与控制","authors":"A. Chiriac, S. Mocanu, Andrei Lacatusu","doi":"10.1109/CSCS.2019.00102","DOIUrl":null,"url":null,"abstract":"At this moment, the online environment is viewed with a lot of reluctance both because of security controversies and the lack of e-business solutions. The emergence of new types of risks and their developments generate increasingly complex needs in the field of risk management, as well as implications for their management. The intricacy of risk management has increased with the complexity and number of risks requiring a different approach for each category and the pursuit of the uncertainties that may arise in the system. In this paper, we are exemplifying solutions for some of the most common risk categories of a computer system such as flood attacks, access to protected data, unauthorized operations and others. A practical solution for checking and passing digital identity dedicated to critical data protection is presented. Along with a proper management of risks derived from design and implementation this may prove to be an effective way to reduce or even eliminate most risks that may come from data accessing from old and deprecated systems.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Risk Analysis and Control\",\"authors\":\"A. Chiriac, S. Mocanu, Andrei Lacatusu\",\"doi\":\"10.1109/CSCS.2019.00102\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"At this moment, the online environment is viewed with a lot of reluctance both because of security controversies and the lack of e-business solutions. The emergence of new types of risks and their developments generate increasingly complex needs in the field of risk management, as well as implications for their management. The intricacy of risk management has increased with the complexity and number of risks requiring a different approach for each category and the pursuit of the uncertainties that may arise in the system. In this paper, we are exemplifying solutions for some of the most common risk categories of a computer system such as flood attacks, access to protected data, unauthorized operations and others. A practical solution for checking and passing digital identity dedicated to critical data protection is presented. Along with a proper management of risks derived from design and implementation this may prove to be an effective way to reduce or even eliminate most risks that may come from data accessing from old and deprecated systems.\",\"PeriodicalId\":352411,\"journal\":{\"name\":\"2019 22nd International Conference on Control Systems and Computer Science (CSCS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 22nd International Conference on Control Systems and Computer Science (CSCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSCS.2019.00102\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSCS.2019.00102","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

目前,由于安全性争议和缺乏电子商务解决方案,人们对在线环境的看法非常不情愿。新类型风险的出现及其发展在风险管理领域产生了日益复杂的需要,并对其管理产生了影响。风险管理的复杂性随着风险的复杂性和数量的增加而增加,需要对每个类别采取不同的方法,并追求系统中可能出现的不确定性。在本文中,我们举例说明了计算机系统中一些最常见的风险类别的解决方案,例如洪水攻击、对受保护数据的访问、未经授权的操作等。提出了一种用于关键数据保护的数字身份校验和传递的实用解决方案。再加上对源自设计和实现的风险进行适当的管理,这可能是一种有效的方法,可以减少甚至消除来自旧系统和已弃用系统的数据访问可能带来的大多数风险。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Risk Analysis and Control
At this moment, the online environment is viewed with a lot of reluctance both because of security controversies and the lack of e-business solutions. The emergence of new types of risks and their developments generate increasingly complex needs in the field of risk management, as well as implications for their management. The intricacy of risk management has increased with the complexity and number of risks requiring a different approach for each category and the pursuit of the uncertainties that may arise in the system. In this paper, we are exemplifying solutions for some of the most common risk categories of a computer system such as flood attacks, access to protected data, unauthorized operations and others. A practical solution for checking and passing digital identity dedicated to critical data protection is presented. Along with a proper management of risks derived from design and implementation this may prove to be an effective way to reduce or even eliminate most risks that may come from data accessing from old and deprecated systems.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信