• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Bin, Xie Feng, Chen Zhong. A Business Oriented Risk Assessment Model[J]. Journal of Computer Research and Development, 2011, 48(9): 1634-642.
Citation: Li Bin, Xie Feng, Chen Zhong. A Business Oriented Risk Assessment Model[J]. Journal of Computer Research and Development, 2011, 48(9): 1634-642.

A Business Oriented Risk Assessment Model

More Information
  • Published Date: September 14, 2011
  • Traditional information security risk assessment emphasizes the loss of asset, but ignores the effect of the risk on business. This paper proposes a business oriented risk assessment model BoRAM. On the basis of the business security requirements, the proposed model introduces three basic security goals (i.e. confidentiality, integrity and availability) into the process of the risk assessment, and further measures the risk according to the effect on business process. In the proposed model, the asset is not only severed as a basic evaluation element as same as the role in the traditional risk assessment models, but also is served as the support of the business. The risk of the asset, the risk of the business process, and the risk of the business are analyzed hierarchically. In order to measure these risks, all the risk elements are generalized and analyzed by attribute-oriented induction (AOI) as well as cluster algorithm. Furthermore, the Markov model is also introduced into the business to describe the transfer between business processes. Finally, the model is experimented in a typical Internet-bank business. Theoretical analysis and experimental results show that the proposed model can evaluate the business risk instead of traditional asset risk on the basis of confidentiality, integrity and availability of business, which is just the goal of the business security requirements.
  • Related Articles

    [1]Jiao Pengfei, Chen Shuxin, Guo Xuan, He Dongxiao, Liu Dong. Survey on Graph Neural Ordinary Differential Equations[J]. Journal of Computer Research and Development, 2024, 61(8): 2045-2066. DOI: 10.7544/issn1000-1239.202440192
    [2]Han Songshen, Guo Songhui, Xu Kaiyong, Yang Bo, Yu Miao. Perturbation Analysis of the Vital Region in Speech Adversarial Example Based on Frame Structure[J]. Journal of Computer Research and Development, 2024, 61(3): 685-700. DOI: 10.7544/issn1000-1239.202221034
    [3]Shen Yijie, Li Liangcheng, Liu Ziwei, Liu Tiantian, Luo Hao, Shen Ting, Lin Feng, Ren Kui. Stealthy Attack Towards Speaker Recognition Based on One-“Audio Pixel” Perturbation[J]. Journal of Computer Research and Development, 2021, 58(11): 2350-2363. DOI: 10.7544/issn1000-1239.2021.20210632
    [4]Meng Yinfeng, Liang Jiye. Linear Regularized Functional Logistic Model[J]. Journal of Computer Research and Development, 2020, 57(8): 1617-1626. DOI: 10.7544/issn1000-1239.2020.20200496
    [5]Feng Da, Zhou Fucai, Wang Qiang, Wu Qiyu. Efficient Verifiable Outsourcing of Solving Large-Scale Linear Equations with Low Storage Overhead[J]. Journal of Computer Research and Development, 2019, 56(5): 1123-1131. DOI: 10.7544/issn1000-1239.2019.20180191
    [6]WuTao, JinJianguo, WeiMingjun. A Hash Function Algorithm Based on Variable Parameter Cascade Chaos[J]. Journal of Computer Research and Development, 2016, 53(3): 674-681. DOI: 10.7544/issn1000-1239.2016.20148155
    [7]Cui Zhen, Shan Shiguang, Chen Xilin. Structured Sparse Linear Discriminant Analysis[J]. Journal of Computer Research and Development, 2014, 51(10): 2295-2301. DOI: 10.7544/issn1000-1239.2014.20130188
    [8]Feng Lin, Liu Shenglan, Zhang Jing, and Wang Huibing. Robust Activation Function of Extreme Learning Machine and Linear Dimensionality Reduction in High-Dimensional Data[J]. Journal of Computer Research and Development, 2014, 51(6): 1331-1340.
    [9]Li Shengmei, Cheng Buqi, Gao Xingyu, Qiao Lin, Tang Zhizhong. A Method on Analyzing Performance Sensitivity of Applications Based on Partial Derivatives of Non-linear Regression Equation[J]. Journal of Computer Research and Development, 2010, 47(9): 1654-1662.
    [10]Wu Jiying and Ruan Qiuqi. A Curvature-Driven Image Inpainting Model Based on Helmholtz Vorticity Equation[J]. Journal of Computer Research and Development, 2007, 44(5): 860-866.

Catalog

    Article views (1703) PDF downloads (1045) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return