Affiliation:
1. China University of Mining and Technology (Beijing)
2. Tsing Hua University Library
3. Research Institute of Petroleum Exploration and Development
4. Research Institute of Petroleum Exploration and Development-Northwest
Abstract
Current information security risk assessment models usually focus on the security problems of information system and its environment, however they ignore data changes and the accompanying risks in the whole production process. Aiming at the problems above, the paper analyzes the risks of oil and gas production management system during the different stages of data generation, transmission, processing, storage and demonstration, then proposes a set of data risk assessment model and method focusing on data security. The data risk assessment model provides a new way to prevent intrusion, protect data and safeguard information system’s integrity, availability and security.
Publisher
Trans Tech Publications, Ltd.
Reference11 articles.
1. Chen Xiuzhen , Zheng Qinghua , Guan Xiaohong , et. Al. Study on Evaluation for Security Situation of Networked Systems[J ] . J ournal of Xi'an J iaotong Universi t y , 2004 , 38 (4) : 404-408 (Ch).
2. Feng Dengguo , Zhang Yang , Zhang Yuqing. Survey of Information Security Risk Assessment [J ]. J ournal of China Institute of Communications , 2004 , 25 (7) : 10-18 (Ch).
3. Aagedal J O, Den Braber F, et al. Model-based Risk Assessment to Improve Enterprise Security[ C] . Proceedings of the 6th International, Enterprise Distributed Object Computing Conference, EDOC'02, 2002 . 51 -62.
4. National Institute of Standards and Technology. Special Publications 800-30, Risk Management Guide (DRAFT). June (2008).
5. Gary McGraw. Managing Software Security Risks[ J] . IEEE Computer, 2002, 35( 4) : 99-101.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献