{"title":"基于CORAS框架的信息安全风险评估方法","authors":"Qi Yong, X. Long, Li Qian-mu","doi":"10.1109/CSSE.2008.1001","DOIUrl":null,"url":null,"abstract":"This paper first carry out the summary to the information security risk assessment's present situation and the correlation criterion, then introduced in detail to the risk which possibly exists carry out the quantification based on the CORAS frame's information security risk assessment method and using the analytic hierarchy process, finally uses on-line Electronic bank system's example, proved this method to be possible very well suitable in the information security risk assessment.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"107 1","pages":"571-574"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Information Security Risk Assessment Method Based on CORAS Frame\",\"authors\":\"Qi Yong, X. Long, Li Qian-mu\",\"doi\":\"10.1109/CSSE.2008.1001\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper first carry out the summary to the information security risk assessment's present situation and the correlation criterion, then introduced in detail to the risk which possibly exists carry out the quantification based on the CORAS frame's information security risk assessment method and using the analytic hierarchy process, finally uses on-line Electronic bank system's example, proved this method to be possible very well suitable in the information security risk assessment.\",\"PeriodicalId\":6460,\"journal\":{\"name\":\"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)\",\"volume\":\"107 1\",\"pages\":\"571-574\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-12-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSSE.2008.1001\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSSE.2008.1001","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Information Security Risk Assessment Method Based on CORAS Frame
This paper first carry out the summary to the information security risk assessment's present situation and the correlation criterion, then introduced in detail to the risk which possibly exists carry out the quantification based on the CORAS frame's information security risk assessment method and using the analytic hierarchy process, finally uses on-line Electronic bank system's example, proved this method to be possible very well suitable in the information security risk assessment.