网络与信息安全学报 (Apr 2019)

Security evaluation method for confidential and stable complex systems

  • ZUO Jinxin, GUO Ziyu, LI Jin, LU Yueming,
  • ZHANG Jie

DOI
https://doi.org/10.11959/j.issn.2096-109x.2019017
Journal volume & issue
Vol. 5, no. 2
pp. 58 – 65

Abstract

Read online

Confidential and stable complex systems are characterized by high confidentiality requirements, continuous and stable operation requirements, and complex network structure, but existing evaluation models has a single dimension of security objectives and lack the correlation analysis among indicators. In view of this, a comprehensive security evaluation model based on the correlation analysis of indicators is proposed and eight security objectives covering confidentiality, availability, controllability, identifiability, personnel organization, risk management, enterprise grading and sustainability at three levels of product, system and service have been established. Taking the confidentiality of the smart medical IoT as an example, a sorting and weight confirmation algorithm based on index correlation is constructed, and the fuzzy comprehensive evaluation method is used to evaluate the selected system.

Keywords