defgf96tj
Dołączył: 14 Lis 2010
Posty: 862
Przeczytał: 0 tematów
Ostrzeżeń: 0/5 Skąd: England
|
Wysłany: Wto 9:35, 07 Gru 2010 Temat postu: ugg boots sale Information Security Risk Assessmen |
|
|
Information Security Risk Assessment Standards
Timeout (itocount () .60000)} window. onload = checkCount () functionconvert () / / calculate the current time and the time difference between the start of the examination {vathourstart; return (countdown); / / returns the rest of the time} 4 Conclusion With the continuous expansion and Intranet Intranet technology and the further development of Web database technology, the future development of the MIS server-side Web-based application development, this is the inevitable trend of development of MIS. Now, with the development of the campus network and improvement of Web-based examination system development and the development will become a necessity, will be brought to the examination of the computer software, a new technological revolution. References: [1] in China. INTRANET-based Management Information System. Management information systems, 1999.3. [2] PAN W, Jia beads. WindowsNT-based computer knowledge and Block test network using paperless. 2003. [3] Hong-Hai Wang. Cookie and user information. Computer age, 2,001.12. [Author] Hai Wang (1978), male,[link widoczny dla zalogowanych], Han nationality,[link widoczny dla zalogowanych], Xintai City, Shandong Province, Shandong Institute of Economics Lecturer, School of Information Management. Research: E-commerce, enterprise information. ● I ● ● ii ● i ● ii ● ii ● ● ● ii ● ● ● ii ● ● ● ii ● ● 1 ● ib ● ● ● i ● ● ● ● ◆ ii ● ● ● I ● ii ● ● iI ● I ● ● ● ● '● ● ● ● Ii (on the next page 70) standard principles of risk calculation is given to illustrate the following formal paradigm: risk value = R (A, T, V) = R (L (T , V), F (1a, Va)) where, R said the security risk calculation functions; A said assets; T Table threat; V that vulnerability; Ia role in the incident, said security value of the assets; Va said that the severity of vulnerability; L Table threatened use of the vulnerability of assets likely lead to security incidents; F after the incident, said security losses incurred. (7) risk assessment documentation: the formation of the risk assessment process the documentation, including risk assessment report. \and other international popular information security risk assessment methodology, the organization of domestic enterprises more than a dozen experts in the preparation of completion, is currently in the country to carry out information security risk assessment and in accordance with the only major reference to national standards. 4 summarizes this paper: CC,[link widoczny dla zalogowanych], GB/T18336,[link widoczny dla zalogowanych], BS7799, SSE-CMM, ISO/IECTR13335, GAO / AIMD a 99-139, NISTSP800-30IT system of risk management guidelines, OCTE method, AS/NZS4360, \Guide \References: [¨ GB/T18336-2001 Information Technology Security Technology Information Technology Security Evaluation Criteria (idtISO/IEC15408: 1999) [2] ISO/IEC17799: 2005Informationtechnology-securitytechniques-Codeofpracticeforinformationsecuritymanagement [3] ISO/IEC27001: 2005Informationtechnology-Securitytechniques- Informationsecuritymanagementsystems-Requirements [4] Information Security Risk Assessment Guide (Exposure Draft) [5] Section fly management consulting firm,[link widoczny dla zalogowanych], compiled the information security risk assessment. Beijing: Standards Press of China [6] information security standards and legal regulations Beijing: China Information Security Evaluation and Certification Center (Received date :2007-02-02)
More articles related to topics:
[link widoczny dla zalogowanych]
tory burch outlet Wireless sensor network node loc
[link widoczny dla zalogowanych]
Post został pochwalony 0 razy
|
|