Detailed Description
The invention is further described with reference to the following examples.
Referring to fig. 1, an information security risk management system of this embodiment includes an information acquisition module 1, an information analysis module 2, a risk assessment module 3, a risk prediction module 4, and a risk control module 5, where the information acquisition module 1 is configured to acquire basic information in an information network, the information analysis module 2 is configured to perform preliminary analysis on the acquired basic information to complete risk identification, and send data obtained by the analysis to the risk assessment module 3, the risk assessment module 3 performs information security risk assessment on the information network to generate a historical information security risk assessment result, the risk prediction module 4 is configured to analyze a historical information security risk assessment result, find a time rule of information security risk development, and predict a future information security risk, and the risk control module 5 adjusts a security policy according to a prediction result obtained by the risk prediction module 4, and carrying out safety precaution.
The embodiment provides an information security risk management system, which realizes effective prevention of information security risks by acquiring historical information security risk assessment results and predicting future information security risks.
Preferably, the information analysis module 2 includes a threat identification module, a vulnerability identification module and an effectiveness identification module, the threat identification module is used for determining a threat source of the threat information network, the vulnerability identification module is used for determining a vulnerability of the information network, and the effectiveness identification module is used for determining the effectiveness of a security measure taken for the vulnerability;
the threat identification module is used for determining a threat source of the threat information network, and specifically comprises the following steps:
determining threat sources of the information network as data leakage, virus intrusion and unauthorized access;
determining a first security risk value from a threat source of the information network:
in the formula, F1Representing a first security risk value, i representing a certain threat of data leakage, virus intrusion and unauthorized access, biRepresenting the probability of the occurrence of the ith threat, ciIndicating the degree of impact of the ith threat on information security, diIndicating an uncontrollable degree of the ith threat;
b isiIs determined by the following formula: bi=ai1+ai2;
In the formula, ai1An attack capability metric representing the ith threat, ai2The attack complexity measurement value of the ith threat is represented, the attack capability measurement value and the attack complexity measurement value of the ith threat are scores of the expert on the attack capability and the attack complexity of the ith threat, and the attack capability and the attack complexity increase along with the increase and the increase of the scores;
c is mentionediIs determined by the following formula: c. Ci=ai3+ai4;
In the formula, ai3An integrity impact metric value, a, representing the ith threati2The integrity influence metric value and the availability influence metric value of the ith threat represent the scores of the integrity influence and the availability influence of the expert on the information network brought by the ith threat, and the higher the score is, the greater the influence of the threat on the integrity and the availability of the information network is represented;
d isiIs determined by the following formula: di=ai5+ai6;
In the formula, ai5A measure of the covert detectability of the information network, a, representing the presence of the ith threati6The method comprises the steps that a defense capability metric value of an information network when the ith threat appears is represented, the concealment detection capability metric value and the defense capability metric value of the information network to the ith threat are scores of the concealment detection capability and the defense capability of an expert to the ith threat, and the higher the score is, the stronger the concealment detection capability and the defense capability of the information network are represented;
the vulnerability identification module is used for determining the vulnerability of the information network, and specifically comprises the following steps:
determining the vulnerabilities of the information network as technical vulnerabilities and management vulnerabilities;
determining a second security risk value according to the vulnerability of the information network:
F2=(p+q)2+2p+q
in the formula, F1Representing a second security risk value, p representing a metric of the severity of the technical vulnerability, q representing a metric of the severity of the management vulnerability, the metric of the severity of the technical vulnerability and the metric of the severity of the management vulnerability being obtained by expert scoring, the higher the score, the more severe the technical vulnerability and the management vulnerability are represented;
the validity identification module is used for determining validity of a security measure taken for the vulnerability, and specifically comprises the following steps:
determining a third security risk value based on the effectiveness of the security measures:
in the formula, F3Represents a third security risk value, k1Representing the effective times of the safety measures, and k representing the total times of taking the safety measures;
the preferred embodiment realizes the identification of the security risk of the information network, and particularly lays a foundation for subsequent risk assessment by determining the threat source threatening the information network, the loophole of the information network and the effectiveness of security measures taken aiming at the loophole and converting the threat source, the loophole and the effectiveness into corresponding security risk values.
Preferably, the risk assessment module 3 performs information security risk assessment on the information network to generate a historical information security risk assessment result, specifically:
determining a security risk assessment value according to the first security risk value, the second security risk value and the third security risk value:
G=2(F1+F2+F3)+ln(F1+F2+F3)
wherein G represents a safety risk assessment value; the larger the safety risk assessment value is, the larger the safety risk is; and taking the safety risk evaluation value as a historical safety evaluation result of the information network.
The preferred embodiment realizes the evaluation of historical security risk and lays a foundation for the subsequent security risk prediction.
From the above description of embodiments, it is clear for a person skilled in the art that the embodiments described herein can be implemented in hardware, software, firmware, middleware, code or any appropriate combination thereof. For a hardware implementation, a processor may be implemented in one or more of the following units: an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a processor, a controller, a microcontroller, a microprocessor, other electronic units designed to perform the functions described herein, or a combination thereof. For a software implementation, some or all of the procedures of an embodiment may be performed by a computer program instructing associated hardware. In practice, the program may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a computer. Computer-readable media can include, but is not limited to, RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
Finally, it should be noted that the above embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the protection scope of the present invention, although the present invention is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions can be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.