Masahiko Shimazu, Atsushi Kanai, Shigeki Tanimoto, Hiroyuki Sato
{"title":"作为安全领域的动态风险评估模型","authors":"Masahiko Shimazu, Atsushi Kanai, Shigeki Tanimoto, Hiroyuki Sato","doi":"10.1109/GCCE.2015.7398641","DOIUrl":null,"url":null,"abstract":"Generally, high security information management leads to high confidentiality. However, high confidentiality causes low availability. Therefore, we think availability can be increased by choosing the appropriate security level depending on the changing risk. Thus, this paper proposes a risk evaluation model in which risk is quantitatively evaluated using the value of information, protection level, and threat level.","PeriodicalId":363743,"journal":{"name":"2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Dynamic risk evaluation model as a security field\",\"authors\":\"Masahiko Shimazu, Atsushi Kanai, Shigeki Tanimoto, Hiroyuki Sato\",\"doi\":\"10.1109/GCCE.2015.7398641\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Generally, high security information management leads to high confidentiality. However, high confidentiality causes low availability. Therefore, we think availability can be increased by choosing the appropriate security level depending on the changing risk. Thus, this paper proposes a risk evaluation model in which risk is quantitatively evaluated using the value of information, protection level, and threat level.\",\"PeriodicalId\":363743,\"journal\":{\"name\":\"2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)\",\"volume\":\"83 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/GCCE.2015.7398641\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GCCE.2015.7398641","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Generally, high security information management leads to high confidentiality. However, high confidentiality causes low availability. Therefore, we think availability can be increased by choosing the appropriate security level depending on the changing risk. Thus, this paper proposes a risk evaluation model in which risk is quantitatively evaluated using the value of information, protection level, and threat level.