信息安全研究 ›› 2018, Vol. 4 ›› Issue (10): 934-939.

• 风险评估专题 • 上一篇    下一篇

信息安全风险评估实施模型研究

张益,霍珊珊,刘美静   

  1. 信息产业信息安全测评中心
  • 收稿日期:2018-10-11 出版日期:2018-10-15 发布日期:2018-10-11
  • 通讯作者: 张益
  • 作者简介: 张益 硕士,高级工程师,主要研究方向为信息安全、安全评估技术等 霍珊珊 学士,工程师,主要研究方向为信息安全、安全评估技术等 刘美静 学士,工程师,主要研究方向为信息安全、安全评估技术等

Research on the Implementation Model of Information Security Risk Assessment

  • Received:2018-10-11 Online:2018-10-15 Published:2018-10-11

摘要: 信息风险评估是风险管理和控制的核心组成部分,但实施过程中存在一些问题.基于正在修订的国家标准,针对评估实施中的问题,提出了高阶信息安全风险评估、详细信息安全风险评估和先详细信息安全风险评估再高阶信息安全风险评估3种实施模型.通过3种模型的研究,探讨不同情况下如何更好地开展信息安全风险评估工作,并将标准修订核心内容落实到工作环节中.通过实际案例表明,3种模型能够有效解决当前评估对象受限、缺少针对业务层面的信息安全风险评估、缺少业务或组织整体风险评估的依据或方法等问题.3种模型能够有效地指导信息安全风险评估工作,满足从资产到业务、从个体到整体等不同方面的评估需求,为决策和实施安全措施提供可靠的依据.

关键词: 风险评估, 实施模型, 高阶信息安全风险评估, 详细信息安全风险评估, 业务信息

Abstract: Information risk assessment is the core component of risk management and control, but there are some problems in the process of implementation. Based on the revised national standards, this paper proposes three implementation models for the implementation of information security risk assessment, namely, High-level Information Security Risk Assessment Implementation Model. Detailed Information Security Risk Assessment Implementation Model, Detailed Information-High-level Information Security Risk Assessment Implementation Model. Through the study of three models, this paper discusses how to carry out the risk assessment of information security better under different circumstances, and puts the core content of the standard revision into the work. The actual cases show that the three models can effectively solve problems such as the limitations of current evaluation objects, the lack of information security risk assessment at the business level, and the lack of the basis or method for the overall risk assessment of the business or organization. The three models can effectively guide the information security risk assessment, meet the assessment needs from asset to business, from the individual to the whole, and provide a reliable basis for decision-making and implementation of security measures.

Key words: risk analysis, implementation model, high-level information security risk assessment, detailed information security risk assessment, business information security