CN109840688B - Security assessment method and device for electric mobile terminal - Google Patents
Security assessment method and device for electric mobile terminal Download PDFInfo
- Publication number
- CN109840688B CN109840688B CN201811617283.9A CN201811617283A CN109840688B CN 109840688 B CN109840688 B CN 109840688B CN 201811617283 A CN201811617283 A CN 201811617283A CN 109840688 B CN109840688 B CN 109840688B
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- security
- power mobile
- threat
- index
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 238000011156 evaluation Methods 0.000 claims abstract description 46
- 239000011159 matrix material Substances 0.000 claims description 12
- 238000012545 processing Methods 0.000 claims description 7
- 238000012163 sequencing technique Methods 0.000 claims description 3
- 238000004590 computer program Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 7
- 238000004458 analytical method Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 230000008447 perception Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000006872 improvement Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
Landscapes
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to a method and a device for evaluating the safety of an electric mobile terminal, comprising the following steps: acquiring the security index of the electric power mobile terminal by using the threat index of the security threat of the electric power mobile terminal; and carrying out safety evaluation on the electric power mobile terminal by utilizing the safety index of the electric power mobile terminal. According to the technical scheme provided by the invention, the safety index of the electric power mobile terminal is utilized to carry out safety evaluation on the electric power mobile terminal, so that the negative influence caused by safety threat of the electric power mobile terminal is reduced, the possibility of potential problems is reduced, and the safe and stable operation of the electric power mobile terminal is ensured.
Description
Technical Field
The invention relates to the field of mobile application safety, in particular to a method and a device for evaluating safety of an electric power mobile terminal.
Background
Along with the rapid promotion of the power grid informatization process, the electric mobile service is also developed at a high speed, and the real-time flow and sharing of service information are realized. Currently, some mobile applications are classified into an intranet mobile operation class, an extranet mobile collaboration class, and an internet mobile service class. The intranet mobile operation type mainly comprises operation and maintenance repair, marketing operation, material inventory and the like; the external network mobile collaboration class mainly comprises external network mobile services which do not relate to company trade secrets, such as enterprise trust, PMS2.0 external network mobile operation and the like; the internet mobile service class mainly comprises 95598 internet business such as national net mall, electric power transaction, financial insurance and the like.
The widespread use of these mobile applications in the grid area brings great convenience to our work while also introducing a significant amount of information security risks. Recently, the attack technology and threat mode for the electric mobile terminal are layered endlessly, and the security threat faced by the mobile terminal user is increased, so that the security threat analysis and assessment for the electric mobile terminal system is necessary.
However, the existing evaluation for mobile terminals has the following disadvantages: the electric power mobile terminal stores more contents such as personal privacy, enterprise sensitive information and the like, and has a complicated hierarchical relationship among elements of terminal security risks, so that the relationship among single asset, single threat value and comprehensive threat value is not comprehensive; lack of reasonable safety evaluation indexes of the electric mobile terminal, and no corresponding safety threat and evaluation indexes exist; lacking analysis of the operational scenario for the power mobile terminal, an effective security protection policy cannot be formulated from the perspective of security risk handling.
Disclosure of Invention
Aiming at the defects of the prior art, the invention aims to provide a security assessment method and a device for an electric power mobile terminal based on an analytic hierarchy process, which acquire the security index of the electric power mobile terminal by utilizing the threat index of the security threat of the electric power mobile terminal, and the safety index of the power mobile terminal is utilized to carry out safety evaluation on the power mobile terminal, so that the negative influence caused by the safety threat of the power mobile terminal is reduced, the possibility of potential problems is reduced, and the safe and stable operation of the power mobile terminal is ensured.
The invention aims at adopting the following technical scheme:
In a method of power mobile terminal security assessment, the improvement comprising:
acquiring the security index of the electric power mobile terminal by using the threat index of the security threat of the electric power mobile terminal;
and carrying out safety evaluation on the electric power mobile terminal by utilizing the safety index of the electric power mobile terminal.
Preferably, before the threat index of the security threat of the power mobile terminal is used to obtain the security index of the power mobile terminal, the method includes:
Determining a loss amount dimensionless treatment value v i,j of a j-th result caused by an i-th security threat of the power mobile terminal according to the following formula:
In the above formula, i epsilon [1, N ], N is the total category of security threat of the power mobile terminal, j epsilon [1, M ], k epsilon [1, M ], M is the total category of consequences caused by the security threat of the power mobile terminal; v i,j is the amount of loss of the j-th outcome caused by the i-th security threat of the power mobile terminal, The loss maximum value of the consequences caused by the ith security threat of the power mobile terminal;
The threat index T i of the ith security threat of the power mobile terminal is determined according to the following formula:
In the above formula, W j is the weight of the j-th outcome caused by the security threat of the power mobile terminal, and P i is the probability of the i-th security threat of the power mobile terminal.
Preferably, the acquiring the security index of the power mobile terminal by using the threat index of the security threat of the power mobile terminal includes:
s1, selecting a security threat of the power mobile terminal corresponding to a threat index larger than or equal to a security threshold;
S2, acquiring a weight coefficient of a category to which a security assessment index influenced by the security threat of the power mobile terminal belongs by using the threat index of the security threat of the power mobile terminal;
S3, acquiring the safety index of the electric power mobile terminal by using the weight coefficient of the category to which the safety evaluation index influenced by the safety threat of the electric power mobile terminal belongs.
Further, the step S2 includes:
S2-1, determining a threat index Z a of a class a to which a security assessment index influenced by security threat of the power mobile terminal belongs according to the following formula:
In the above formula, a epsilon [1, A ], A is the total category of the category to which the security assessment index influenced by the security threat of the power mobile terminal belongs; b epsilon [1, B a],Ba is the total number of the security assessment indexes influenced by the security threat of the power mobile terminal in the class a to which the security assessment indexes influenced by the security threat of the power mobile terminal belong; t a,b is the threat index of the security threat of the power mobile terminal corresponding to the security assessment index influenced by the security threat of the b-th power mobile terminal in the class a to which the security assessment index influenced by the security threat of the power mobile terminal belongs;
S2-2, sorting the categories of the security assessment indexes influenced by the security threats of the power mobile terminal according to the threat indexes of the categories of the security assessment indexes influenced by the security threats of the power mobile terminal in order from large to small, and obtaining a category sequence of the security assessment indexes influenced by the security threats of the power mobile terminal;
S2-3, determining a weight coefficient Y d of a class d of a security assessment index influenced by the security threat of the power mobile terminal in a class sequence of the security assessment index influenced by the security threat of the power mobile terminal according to the following formula:
in the above description, r d is the importance of the class d to which the security assessment index influenced by the security threat of the power mobile terminal belongs in the class sequence to which the security assessment index influenced by the security threat of the power mobile terminal belongs, D E [1, D ], D is the maximum value of the sequence numbers of the classes of the security assessment indexes influenced by the security threats of the power mobile terminals in the class sequences of the security assessment indexes influenced by the security threats of the power mobile terminals.
Specifically, the step S3 includes:
The matrix G is set as follows:
G=[Y1,Y2,···,Yd,···,YD]
The safety index S of the power mobile terminal is determined according to the following formula:
S=G·β
in the above formula, beta is a vulnerability coefficient matrix, wherein, Beta d is the vulnerability coefficient of the class d to which the security assessment index affected by the security threat of the power mobile terminal belongs.
Preferably, the security index of the power mobile terminal is proportional to the security of the power mobile terminal.
In an electrical mobile terminal security assessment apparatus, the improvement comprising:
The acquisition unit is used for acquiring the security index of the power mobile terminal by using the threat index of the security threat of the power mobile terminal;
and the evaluation unit is used for carrying out safety evaluation on the electric power mobile terminal by utilizing the safety index of the electric power mobile terminal.
Preferably, the device further comprises:
The first determining unit is configured to determine, according to the following equation, a loss non-dimensionality processing value v i,j of a j-th outcome caused by an i-th security threat of the electric power mobile terminal:
In the above formula, i epsilon [1, N ], N is the total category of security threat of the power mobile terminal, j epsilon [1, M ], k epsilon [1, M ], M is the total category of consequences caused by the security threat of the power mobile terminal; v i,j is the amount of loss of the j-th outcome caused by the i-th security threat of the power mobile terminal, The loss maximum value of the consequences caused by the ith security threat of the power mobile terminal;
A second determining unit, configured to determine a threat index T i of an ith security threat of the power mobile terminal according to the following formula:
In the above formula, W j is the weight of the j-th outcome caused by the security threat of the power mobile terminal, and P i is the probability of the i-th security threat of the power mobile terminal.
Preferably, the acquiring unit includes:
The selection module is used for selecting the security threat of the power mobile terminal corresponding to the threat index which is larger than or equal to the security threshold;
The first acquisition module is used for acquiring a weight coefficient of a category to which a security assessment index influenced by the security threat of the power mobile terminal belongs by utilizing the threat index of the security threat of the power mobile terminal;
and the second acquisition module is used for acquiring the safety index of the electric power mobile terminal by utilizing the weight coefficient of the category to which the safety evaluation index influenced by the safety threat of the electric power mobile terminal belongs.
Further, the first acquisition module includes:
The first determining submodule is used for determining a threat index Z a of a class a to which a security assessment index influenced by security threat of the power mobile terminal belongs according to the following formula:
In the above formula, a epsilon [1, A ], A is the total category of the category to which the security assessment index influenced by the security threat of the power mobile terminal belongs; b epsilon [1, B a],Ba is the total number of the security assessment indexes influenced by the security threat of the power mobile terminal in the class a to which the security assessment indexes influenced by the security threat of the power mobile terminal belong; t a,b is the threat index of the security threat of the power mobile terminal corresponding to the security assessment index influenced by the security threat of the b-th power mobile terminal in the class a to which the security assessment index influenced by the security threat of the power mobile terminal belongs;
The first acquisition sub-module is used for sequencing the categories of the security assessment indexes influenced by the security threats of the power mobile terminal according to the threat indexes of the categories of the security assessment indexes influenced by the security threats of the power mobile terminal in order from large to small to acquire a category sequence of the security assessment indexes influenced by the security threats of the power mobile terminal;
the second determining submodule is used for determining a weight coefficient Y d of a class d to which the security evaluation index influenced by the security threat of the power mobile terminal in the class sequence to which the security evaluation index influenced by the security threat of the power mobile terminal belongs according to the following steps:
in the above description, r d is the importance of the class d to which the security assessment index influenced by the security threat of the power mobile terminal belongs in the class sequence to which the security assessment index influenced by the security threat of the power mobile terminal belongs, D E [1, D ], D is the maximum value of the sequence numbers of the classes of the security assessment indexes influenced by the security threats of the power mobile terminals in the class sequences of the security assessment indexes influenced by the security threats of the power mobile terminals.
Specifically, the second obtaining module includes:
the setting submodule is used for setting a matrix G according to the following formula:
G=[Y1,Y2,···,Yd,···,YD]
the third determining submodule is used for determining the safety index S of the power mobile terminal according to the following formula:
S=G·β
in the above formula, beta is a vulnerability coefficient matrix, wherein, Beta d is the vulnerability coefficient of the class d to which the security assessment index affected by the security threat of the power mobile terminal belongs.
Preferably, the security index of the power mobile terminal is proportional to the security of the power mobile terminal.
Compared with the closest prior art, the invention has the following beneficial effects:
According to the technical scheme provided by the invention, the threat index of the security threat of the power mobile terminal is utilized to obtain the security index of the power mobile terminal, the security index of the power mobile terminal is utilized to carry out security assessment on the power mobile terminal, corresponding security measures can be adopted according to the assessment result, targeted deployment is carried out, negative influence caused by the security threat of the power mobile terminal is reduced, the possibility of occurrence of potential problems is reduced, and the safe and stable operation of the power mobile terminal is ensured.
Drawings
Fig. 1 is a flow chart of a security assessment method for an electric mobile terminal according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a security assessment device for an electric mobile terminal according to an embodiment of the present invention.
Detailed Description
The following describes the embodiments of the present invention in further detail with reference to the drawings.
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The invention provides a security assessment method of an electric power mobile terminal, as shown in fig. 1, comprising the following steps:
acquiring the security index of the electric power mobile terminal by using the threat index of the security threat of the electric power mobile terminal;
and carrying out safety evaluation on the electric power mobile terminal by utilizing the safety index of the electric power mobile terminal.
Further, before the threat index of the security threat of the power mobile terminal is used to obtain the security index of the power mobile terminal, the method includes:
Determining a loss amount dimensionless treatment value v i,j of a j-th result caused by an i-th security threat of the power mobile terminal according to the following formula:
In the above formula, i epsilon [1, N ], N is the total category of security threat of the power mobile terminal, j epsilon [1, M ], k epsilon [1, M ], M is the total category of consequences caused by the security threat of the power mobile terminal; v i,j is the amount of loss of the j-th outcome caused by the i-th security threat of the power mobile terminal, The loss maximum value of the consequences caused by the ith security threat of the power mobile terminal;
The threat index T i of the ith security threat of the power mobile terminal is determined according to the following formula:
In the above formula, W j is the weight of the j-th outcome caused by the security threat of the power mobile terminal, and P i is the probability of the i-th security threat of the power mobile terminal.
For example, the consequences of a security threat for a power mobile terminal may be: failure to perform critical operations, loss of productivity, loss of revenue, damage to public reputation, and jeopardy to public safety.
Further, the acquiring the security index of the power mobile terminal by using the threat index of the security threat of the power mobile terminal includes:
s1, selecting a security threat of the power mobile terminal corresponding to a threat index larger than or equal to a security threshold;
S2, acquiring a weight coefficient of a category to which a security assessment index influenced by the security threat of the power mobile terminal belongs by using the threat index of the security threat of the power mobile terminal;
S3, acquiring the safety index of the electric power mobile terminal by using the weight coefficient of the category to which the safety evaluation index influenced by the safety threat of the electric power mobile terminal belongs.
Specifically, the step S2 includes:
S2-1, determining a threat index Z a of a class a to which a security assessment index influenced by security threat of the power mobile terminal belongs according to the following formula:
In the above formula, a epsilon [1, A ], A is the total category of the category to which the security assessment index influenced by the security threat of the power mobile terminal belongs; b epsilon [1, B a],Ba is the total number of the security assessment indexes influenced by the security threat of the power mobile terminal in the class a to which the security assessment indexes influenced by the security threat of the power mobile terminal belong; t a,b is the threat index of the security threat of the power mobile terminal corresponding to the security assessment index influenced by the security threat of the b-th power mobile terminal in the class a to which the security assessment index influenced by the security threat of the power mobile terminal belongs;
for example, the security evaluation analysis table of the electric mobile terminal shown in table 1 enumerates a part of security threats of the electric mobile terminal, security evaluation indexes affected by the security threats of the electric mobile terminal, and types of security evaluation indexes affected by the security threats of the electric mobile terminal, threat indexes of the security threats of the electric mobile terminal and threat indexes of the types of security evaluation indexes affected by the security threats of the electric mobile terminal, which are obtained by the above method.
Table 1 safety evaluation analysis table of electric power mobile terminal
S2-2, sorting the categories of the security assessment indexes influenced by the security threats of the power mobile terminal according to the threat indexes of the categories of the security assessment indexes influenced by the security threats of the power mobile terminal in order from large to small, and obtaining a category sequence of the security assessment indexes influenced by the security threats of the power mobile terminal;
S2-3, determining a weight coefficient Y d of a class d of a security assessment index influenced by the security threat of the power mobile terminal in a class sequence of the security assessment index influenced by the security threat of the power mobile terminal according to the following formula:
in the above description, r d is the importance of the class d to which the security assessment index influenced by the security threat of the power mobile terminal belongs in the class sequence to which the security assessment index influenced by the security threat of the power mobile terminal belongs, D E [1, D ], D is the maximum value of the sequence numbers of the classes of the security assessment indexes influenced by the security threats of the power mobile terminals in the class sequences of the security assessment indexes influenced by the security threats of the power mobile terminals.
Further, the security index of the power mobile terminal is proportional to the security of the power mobile terminal.
For example, using the above method, it is possible to: the weight coefficients of the category hardware class, the network class, the system class, the application class, the data class, the perception class and the management class, which are affected by the security threat of the electric power mobile terminal in table 1, are 0.1097, 0.1975, 0.1975, 0.1975, 0.1097, 0.1097 and 0.0784 respectively;
specifically, the step S3 includes:
The matrix G is set as follows:
G=[Y1,Y2,···,Yd,···,YD]
For example, G= [0.1097,0.1975,0.1975,0.1975,0.1097,0.1097,0.0784]
The safety index S of the power mobile terminal is determined according to the following formula:
S=G·β
in the above formula, beta is a vulnerability coefficient matrix, wherein, Beta d is the vulnerability coefficient of the class d to which the security assessment index affected by the security threat of the power mobile terminal belongs.
For example, if the vulnerability coefficients of the hardware class, the network class, the system class, the application class, the data class, the perception class and the management class, which are the classes of the security evaluation index influenced by the security threat of the power mobile terminal, are 2, 6, 4, 2, 7, 5 and 1 respectively, which are obtained by using the fuzzy comprehensive evaluation method
Finally, obtaining a safety index S= 3.9842 of the power mobile terminal;
if the safety index of the power mobile terminal belongs to a first threshold range, the safety evaluation result of the power mobile terminal is poor;
if the safety index of the power mobile terminal belongs to a second threshold range, the safety evaluation result of the power mobile terminal is poor;
if the safety index of the power mobile terminal belongs to a third threshold range, the safety evaluation result of the power mobile terminal is general;
if the safety index of the power mobile terminal belongs to a fourth threshold range, the safety evaluation result of the power mobile terminal is good;
And if the safety index of the power mobile terminal belongs to the fifth threshold range, the safety evaluation result of the power mobile terminal is excellent.
For example: if the safety index of the power mobile terminal belongs to [0,3 ], the safety evaluation result of the power mobile terminal is poor;
if the safety index of the power mobile terminal belongs to [3,6 ], the safety evaluation result of the power mobile terminal is poor;
if the safety index of the power mobile terminal belongs to [6,7 ], the safety evaluation result of the power mobile terminal is general;
if the safety index of the power mobile terminal belongs to [7,9 ], the safety evaluation result of the power mobile terminal is good;
If the security index of the power mobile terminal belongs to [9,10 ], the security evaluation result of the power mobile terminal is excellent.
Since the security index s= 3.9842 of the power mobile terminal, the security evaluation result of the power mobile terminal is poor.
The embodiment provided by the invention divides the safety index of the power mobile terminal into hardware class, network class, system class, application class, data class, perception class and management class, covers the two aspects of self safety and safety management and control of the power mobile terminal, and can also aim at the characteristics of data sensitivity, business key and the like of the power mobile terminal.
The invention also provides a safety evaluation device of the electric power mobile terminal, as shown in fig. 2, the device comprises:
The acquisition unit is used for acquiring the security index of the power mobile terminal by using the threat index of the security threat of the power mobile terminal;
and the evaluation unit is used for carrying out safety evaluation on the electric power mobile terminal by utilizing the safety index of the electric power mobile terminal.
Further, the device further comprises:
The first determining unit is configured to determine, according to the following equation, a loss non-dimensionality processing value v i,j of a j-th outcome caused by an i-th security threat of the electric power mobile terminal:
In the above formula, i epsilon [1, N ], N is the total category of security threat of the power mobile terminal, j epsilon [1, M ], k epsilon [1, M ], M is the total category of consequences caused by the security threat of the power mobile terminal; v i,j is the amount of loss of the j-th outcome caused by the i-th security threat of the power mobile terminal, The loss maximum value of the consequences caused by the ith security threat of the power mobile terminal;
A second determining unit, configured to determine a threat index T i of an ith security threat of the power mobile terminal according to the following formula:
In the above formula, W j is the weight of the j-th outcome caused by the security threat of the power mobile terminal, and P i is the probability of the i-th security threat of the power mobile terminal.
Further, the acquisition unit includes:
The selection module is used for selecting the security threat of the power mobile terminal corresponding to the threat index which is larger than or equal to the security threshold;
The first acquisition module is used for acquiring a weight coefficient of a category to which a security assessment index influenced by the security threat of the power mobile terminal belongs by utilizing the threat index of the security threat of the power mobile terminal;
and the second acquisition module is used for acquiring the safety index of the electric power mobile terminal by utilizing the weight coefficient of the category to which the safety evaluation index influenced by the safety threat of the electric power mobile terminal belongs.
Specifically, the first obtaining module includes:
The first determining submodule is used for determining a threat index Z a of a class a to which a security assessment index influenced by security threat of the power mobile terminal belongs according to the following formula:
In the above formula, a epsilon [1, A ], A is the total category of the category to which the security assessment index influenced by the security threat of the power mobile terminal belongs; b epsilon [1, B a],Ba is the total number of the security assessment indexes influenced by the security threat of the power mobile terminal in the class a to which the security assessment indexes influenced by the security threat of the power mobile terminal belong; t a,b is the threat index of the security threat of the power mobile terminal corresponding to the security assessment index influenced by the security threat of the b-th power mobile terminal in the class a to which the security assessment index influenced by the security threat of the power mobile terminal belongs;
The first acquisition sub-module is used for sequencing the categories of the security assessment indexes influenced by the security threats of the power mobile terminal according to the threat indexes of the categories of the security assessment indexes influenced by the security threats of the power mobile terminal in order from large to small to acquire a category sequence of the security assessment indexes influenced by the security threats of the power mobile terminal;
the second determining submodule is used for determining a weight coefficient Y d of a class d to which the security evaluation index influenced by the security threat of the power mobile terminal in the class sequence to which the security evaluation index influenced by the security threat of the power mobile terminal belongs according to the following steps:
in the above description, r d is the importance of the class d to which the security assessment index influenced by the security threat of the power mobile terminal belongs in the class sequence to which the security assessment index influenced by the security threat of the power mobile terminal belongs, D E [1, D ], D is the maximum value of the sequence numbers of the classes of the security assessment indexes influenced by the security threats of the power mobile terminals in the class sequences of the security assessment indexes influenced by the security threats of the power mobile terminals.
Specifically, the second obtaining module includes:
the setting submodule is used for setting a matrix G according to the following formula:
G=[Y1,Y2,···,Yd,···,YD]
the third determining submodule is used for determining the safety index S of the power mobile terminal according to the following formula:
S=G·β
in the above formula, beta is a vulnerability coefficient matrix, wherein, Beta d is the vulnerability coefficient of the class d to which the security assessment index affected by the security threat of the power mobile terminal belongs.
Further, the security index of the power mobile terminal is proportional to the security of the power mobile terminal.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should be noted that: the above embodiments are only for illustrating the technical aspects of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the above embodiments, it should be understood by those of ordinary skill in the art that: modifications and equivalents may be made to the specific embodiments of the invention without departing from the spirit and scope of the invention, which is intended to be covered by the claims.
Claims (6)
1. A method for evaluating the security of an electric mobile terminal, the method comprising:
acquiring the security index of the electric power mobile terminal by using the threat index of the security threat of the electric power mobile terminal;
performing safety evaluation on the electric power mobile terminal by using the safety index of the electric power mobile terminal;
The method for acquiring the security index of the power mobile terminal by using the threat index of the security threat of the power mobile terminal comprises the following steps:
s1, selecting a security threat of the power mobile terminal corresponding to a threat index larger than or equal to a security threshold;
S2, acquiring a weight coefficient of a category to which a security assessment index influenced by the security threat of the power mobile terminal belongs by using the threat index of the security threat of the power mobile terminal;
s3, acquiring a security index of the electric power mobile terminal by using a weight coefficient of a category to which a security evaluation index influenced by the security threat of the electric power mobile terminal belongs;
the step S2 includes:
S2-1, determining a threat index Z a of a class a to which a security assessment index influenced by security threat of the power mobile terminal belongs according to the following formula:
In the above formula, a epsilon [1, A ], A is the total category of the category to which the security assessment index influenced by the security threat of the power mobile terminal belongs; b epsilon [1, B a],Ba is the total number of the security assessment indexes influenced by the security threat of the power mobile terminal in the class a to which the security assessment indexes influenced by the security threat of the power mobile terminal belong; t a,b is the threat index of the security threat of the power mobile terminal corresponding to the security assessment index influenced by the security threat of the b-th power mobile terminal in the class a to which the security assessment index influenced by the security threat of the power mobile terminal belongs;
S2-2, sorting the categories of the security assessment indexes influenced by the security threats of the power mobile terminal according to the threat indexes of the categories of the security assessment indexes influenced by the security threats of the power mobile terminal in order from large to small, and obtaining a category sequence of the security assessment indexes influenced by the security threats of the power mobile terminal;
S2-3, determining a weight coefficient Y d of a class d of a security assessment index influenced by the security threat of the power mobile terminal in a class sequence of the security assessment index influenced by the security threat of the power mobile terminal according to the following formula:
in the above description, r d is the importance of the class d to which the security assessment index influenced by the security threat of the power mobile terminal belongs in the class sequence to which the security assessment index influenced by the security threat of the power mobile terminal belongs, D is the maximum value of the sequence numbers of the classes of the security assessment indexes influenced by the security threats of the power mobile terminals in the class sequences of the security assessment indexes influenced by the security threats of the power mobile terminals;
the step S3 includes:
The matrix G is set as follows:
G=[Y1,Y2,···,Yd,···,YD]
The safety index S of the power mobile terminal is determined according to the following formula:
S=G·β
in the above formula, beta is a vulnerability coefficient matrix, wherein, Beta d is the vulnerability coefficient of the class d to which the security assessment index affected by the security threat of the power mobile terminal belongs.
2. The method of claim 1, wherein the acquiring the security index of the power mobile terminal using the threat index of the security threat of the power mobile terminal comprises:
Determining a loss amount dimensionless treatment value v i,j of a j-th result caused by an i-th security threat of the power mobile terminal according to the following formula:
In the above formula, i epsilon [1, N ], N is the total category of security threat of the power mobile terminal, j epsilon [1, M ], k epsilon [1, M ], M is the total category of consequences caused by the security threat of the power mobile terminal; v i,j is the amount of loss of the j-th outcome caused by the i-th security threat of the power mobile terminal, The loss maximum value of the consequences caused by the ith security threat of the power mobile terminal;
The threat index T i of the ith security threat of the power mobile terminal is determined according to the following formula:
In the above formula, W j is the weight of the j-th outcome caused by the security threat of the power mobile terminal, and P i is the probability of the i-th security threat of the power mobile terminal.
3. The method of claim 1, wherein the security index of the power mobile terminal is proportional to the security of the power mobile terminal.
4. An electric mobile terminal security assessment apparatus, characterized in that the apparatus comprises:
The acquisition unit is used for acquiring the security index of the power mobile terminal by using the threat index of the security threat of the power mobile terminal;
The evaluation unit is used for carrying out safety evaluation on the electric power mobile terminal by utilizing the safety index of the electric power mobile terminal;
The acquisition unit includes:
The selection module is used for selecting the security threat of the power mobile terminal corresponding to the threat index which is larger than or equal to the security threshold;
The first acquisition module is used for acquiring a weight coefficient of a category to which a security assessment index influenced by the security threat of the power mobile terminal belongs by utilizing the threat index of the security threat of the power mobile terminal;
the second acquisition module is used for acquiring the safety index of the electric power mobile terminal by utilizing the weight coefficient of the category to which the safety evaluation index influenced by the safety threat of the electric power mobile terminal belongs;
The first acquisition module includes:
The first determining submodule is used for determining a threat index Z a of a class a to which a security assessment index influenced by security threat of the power mobile terminal belongs according to the following formula:
In the above formula, a epsilon [1, A ], A is the total category of the category to which the security assessment index influenced by the security threat of the power mobile terminal belongs; b epsilon [1, B a],Ba is the total number of the security assessment indexes influenced by the security threat of the power mobile terminal in the class a to which the security assessment indexes influenced by the security threat of the power mobile terminal belong; t a,b is the threat index of the security threat of the power mobile terminal corresponding to the security assessment index influenced by the security threat of the b-th power mobile terminal in the class a to which the security assessment index influenced by the security threat of the power mobile terminal belongs;
The first acquisition sub-module is used for sequencing the categories of the security assessment indexes influenced by the security threats of the power mobile terminal according to the threat indexes of the categories of the security assessment indexes influenced by the security threats of the power mobile terminal in order from large to small to acquire a category sequence of the security assessment indexes influenced by the security threats of the power mobile terminal;
the second determining submodule is used for determining a weight coefficient Y d of a class d to which the security evaluation index influenced by the security threat of the power mobile terminal in the class sequence to which the security evaluation index influenced by the security threat of the power mobile terminal belongs according to the following steps:
in the above description, r d is the importance of the class d to which the security assessment index influenced by the security threat of the power mobile terminal belongs in the class sequence to which the security assessment index influenced by the security threat of the power mobile terminal belongs, D is the maximum value of the sequence numbers of the classes of the security assessment indexes influenced by the security threats of the power mobile terminals in the class sequences of the security assessment indexes influenced by the security threats of the power mobile terminals;
the second acquisition module includes:
the setting submodule is used for setting a matrix G according to the following formula:
G=[Y1,Y2,···,Yd,···,YD]
the third determining submodule is used for determining the safety index S of the power mobile terminal according to the following formula:
S=G·β
in the above formula, beta is a vulnerability coefficient matrix, wherein, Beta d is the vulnerability coefficient of the class d to which the security assessment index affected by the security threat of the power mobile terminal belongs.
5. The apparatus of claim 4, wherein the apparatus further comprises:
The first determining unit is configured to determine, according to the following equation, a loss non-dimensionality processing value v i,j of a j-th outcome caused by an i-th security threat of the electric power mobile terminal:
In the above formula, i epsilon [1, N ], N is the total category of security threat of the power mobile terminal, j epsilon [1, M ], k epsilon [1, M ], M is the total category of consequences caused by the security threat of the power mobile terminal; v i,j is the amount of loss of the j-th outcome caused by the i-th security threat of the power mobile terminal, The loss maximum value of the consequences caused by the ith security threat of the power mobile terminal;
A second determining unit, configured to determine a threat index T i of an ith security threat of the power mobile terminal according to the following formula:
In the above formula, W j is the weight of the j-th outcome caused by the security threat of the power mobile terminal, and P i is the probability of the i-th security threat of the power mobile terminal.
6. The apparatus of claim 4, wherein the security index of the power mobile terminal is proportional to the security of the power mobile terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811617283.9A CN109840688B (en) | 2018-12-28 | 2018-12-28 | Security assessment method and device for electric mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811617283.9A CN109840688B (en) | 2018-12-28 | 2018-12-28 | Security assessment method and device for electric mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109840688A CN109840688A (en) | 2019-06-04 |
CN109840688B true CN109840688B (en) | 2024-09-20 |
Family
ID=66883428
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811617283.9A Active CN109840688B (en) | 2018-12-28 | 2018-12-28 | Security assessment method and device for electric mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109840688B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111815799B (en) * | 2020-08-31 | 2021-02-19 | 国网山东省电力公司高密市供电公司 | Flight inspection monitoring system based on electric power tower and electric power line |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101674302A (en) * | 2009-09-25 | 2010-03-17 | 联想网御科技(北京)有限公司 | Method and device for conducting security identification on information system |
CN107832943A (en) * | 2017-11-02 | 2018-03-23 | 国网浙江省电力公司电力科学研究院 | A kind of power system mobile terminal safety intimidation estimating method |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101964730B (en) * | 2010-01-28 | 2012-09-26 | 北京邮电大学 | Network vulnerability evaluation method |
CN102073823A (en) * | 2011-02-25 | 2011-05-25 | 天津大学 | Defect analysis based software creditability evaluating method |
CN102799822B (en) * | 2012-07-11 | 2015-06-17 | 中国信息安全测评中心 | Software running security measurement and estimation method based on network environment |
CN103400027A (en) * | 2013-07-09 | 2013-11-20 | 贵州大学 | Risk assessment algorithm for information system |
CN103716177A (en) * | 2013-11-18 | 2014-04-09 | 国家电网公司 | Security risk assessment method and apparatus |
CN104657915B (en) * | 2015-03-10 | 2018-12-18 | 全球能源互联网研究院 | A kind of electric system terminal security intimidation estimating method of dynamic self-adapting |
CN106713233B (en) * | 2015-11-13 | 2020-04-14 | 国网智能电网研究院 | Network security state judging and protecting method |
CN105933316B (en) * | 2016-04-21 | 2019-05-24 | 国家电网公司 | The determination method and apparatus of network security level |
CN106209831A (en) * | 2016-07-08 | 2016-12-07 | 瑞达信息安全产业股份有限公司 | A kind of network security index calculation method |
CN108881110B (en) * | 2017-05-10 | 2022-05-31 | 全球能源互联网研究院 | Security situation assessment and defense strategy combined decision method and system |
CN108092981B (en) * | 2017-12-22 | 2021-03-02 | 北京明朝万达科技股份有限公司 | Data security protection method, device and storage medium |
CN108833416B (en) * | 2018-06-21 | 2020-12-15 | 北京市劳动保护科学研究所 | SCADA system information security risk assessment method and system |
-
2018
- 2018-12-28 CN CN201811617283.9A patent/CN109840688B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101674302A (en) * | 2009-09-25 | 2010-03-17 | 联想网御科技(北京)有限公司 | Method and device for conducting security identification on information system |
CN107832943A (en) * | 2017-11-02 | 2018-03-23 | 国网浙江省电力公司电力科学研究院 | A kind of power system mobile terminal safety intimidation estimating method |
Also Published As
Publication number | Publication date |
---|---|
CN109840688A (en) | 2019-06-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zaeem et al. | The effect of the GDPR on privacy policies: Recent progress and future promise | |
US20110167011A1 (en) | Dynamic employee security risk scoring | |
US9680830B2 (en) | Evaluating security of data access statements | |
CN115630374B (en) | Testing method and device of credible numerical control system, computer equipment and storage medium | |
Murphy et al. | From a sea of data to actionable insights: Big data and what it means for lawyers | |
Pérez-Morón | Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda | |
Kerschbaum et al. | Confidential information-sharing for automated sustainability benchmarks | |
CN109840688B (en) | Security assessment method and device for electric mobile terminal | |
Anwar et al. | A review of information privacy laws and standards for secure digital ecosystems | |
UcuNugraha | Implementation of ISO 31000 for information technology risk management in the government environment | |
Abuhussein et al. | CSSR: cloud services security recommender | |
Alegria et al. | Method of quantitative analysis of cybersecurity risks focused on data security in financial institutions | |
CN117633837A (en) | Data access processing method, device, system and storage medium | |
Korobeinikova et al. | A General Method of Risk Estimation | |
CN111222777A (en) | Data leakage protection method and integrated system based on risk management | |
Manna et al. | A quantitative methodology for business process-based data privacy risk computation | |
Malek | Bigger Is Always Not Better; less Is More, Sometimes: The Concept of Data Minimization in the Context of Big Data | |
CN115860455A (en) | Transformer substation asset monitoring risk assessment method | |
CN114066624A (en) | Blacklist associated map mining method and system based on graph calculation | |
Ochigbo et al. | Regulatory compliance in the age of data privacy: A comparative study of the Nigerian and US legal landscapes | |
Brožová et al. | Information security management: ANP based approach for risk analysis and decision making | |
Zhang | Information security risk assessment based on cloud computing and bp neural network | |
Kour et al. | Cybersecurity for Industry 5.0: trends and gaps | |
Prokhorenkov et al. | Towards Benchmarking Privacy Risk for Differential Privacy: A Survey | |
Kim et al. | Study on sensitive information leakage vulnerability modeling |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |