Paper
8 December 2022 Research on vulnerability of classification method of a complex information system
Yuan Wei, Keli Zhang, Ning Yang, Guangli Li
Author Affiliations +
Proceedings Volume 12474, Second International Symposium on Computer Technology and Information Science (ISCTIS 2022); 124741Z (2022) https://doi.org/10.1117/12.2653789
Event: Second International Symposium on Computer Technology and Information Science (ISCTIS 2022), 2022, Guilin, China
Abstract
With the development of science and technology, the demand for automation and intelligence has nearly penetrated every corner of society. Single software and specific needs of information systems can no longer meet the growing needs of people. A complex information system composed of various systems, smart devices, and software emerged. The security of such complex information systems is becoming increasingly important. Attacks on complex information systems have become an important factor in harming national security, political stability, economic lifeline, and citizen security. Risk factors are weak links in the information system that may be threatened to cause damage, and the risk factors are transformed into damage to assets under certain conditions. Although the existing vulnerability management specification standards contain relevant content of risk assessment, the scope is not enough to support and cover the assessment of risk factors in information systems. In this paper, we comprehensively investigate and analyze the vulnerability standards of various vulnerability classification for information systems, and propose a classification standard for the analysis and grading of risk factors of complex information systems, which can provide a reference for the classification of information system risk factors in finance, public communications, and energy industries.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Yuan Wei, Keli Zhang, Ning Yang, and Guangli Li "Research on vulnerability of classification method of a complex information system", Proc. SPIE 12474, Second International Symposium on Computer Technology and Information Science (ISCTIS 2022), 124741Z (8 December 2022); https://doi.org/10.1117/12.2653789
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Complex systems

Classification systems

Information security

Data modeling

Systems modeling

Network security

Defense and security

Back to Top