Skip to main navigation Skip to search Skip to main content

An information security risk assessment method based on conduct effect and dynamic threat

  • Hong Qiao
  • , Jianwei Tian
  • , Zheng Tian
  • , Wenhui Qi
  • , Xi Li
  • , Hongyu Zhu
  • , Shengsheng Chen
  • State Grid Corporation of China

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

Traditional Information Security Risk Assessment method did not consider the dynamic characteristic and risk conduct effect among assets, which makes the assessment result inaccurately. To solve this problem, this paper proposes a novel Information Security Risk Assessment method based on Conduct effect and Dynamic threat (ISRACD). ISRACD adopts DTC (Dynamic Threat Calculation) method to calculate threat degree more objectively. Besides, ISRACD proposes ACEC (Asset Conduct Effect Calculation) method to describe the conduct effect among assets and quantify the conduct value. Based on the two methods, ISRACD can obtain the security level more precisely.

Original languageEnglish
Title of host publicationICSESS 2017 - Proceedings of 2017 IEEE 8th International Conference on Software Engineering and Service Science
EditorsLi Wenzheng, M. Surendra Prasad Babu, Lei Xiaohui
PublisherIEEE Computer Society
Pages782-786
Number of pages5
ISBN (Electronic)9781538645703
DOIs
StatePublished - 2 Jul 2017
Externally publishedYes
Event8th IEEE International Conference on Software Engineering and Service Science, ICSESS 2017 - Beijing, China
Duration: 24 Nov 201726 Nov 2017

Publication series

NameProceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS
Volume2017-November
ISSN (Print)2327-0586
ISSN (Electronic)2327-0594

Conference

Conference8th IEEE International Conference on Software Engineering and Service Science, ICSESS 2017
Country/TerritoryChina
CityBeijing
Period24/11/1726/11/17

Keywords

  • Dynamic Threat
  • Information Security Risk Assessment
  • risk conduct effect

Fingerprint

Dive into the research topics of 'An information security risk assessment method based on conduct effect and dynamic threat'. Together they form a unique fingerprint.

Cite this