ICS information safety assessment method based on analytic hierarchy method

An AHP, information security technology, applied in the ICS information security assessment based on AHP, in the field of information security assessment, it can solve the problems that the assessment method cannot be completely in accordance with the ordinary information system, lack of comparison, and direct judgment by a single method, etc. The effect of ensuring network and information security, clear thinking, and accurate assessment results

Inactive Publication Date: 2017-02-08
CHINA ELECTRONICS STANDARDIZATION INST
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Due to the particularity of the industrial control system, its evaluation method cannot be completely in accordance with the general information system, and it is necessary to adopt a more effective method to evaluate the security of industrial control information
The current research on the information security assessment of industrial control systems is the direct judgment of a single method, lacking the comparison between various methods, and the choice of the accuracy of the results after the comparison

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • ICS information safety assessment method based on analytic hierarchy method
  • ICS information safety assessment method based on analytic hierarchy method
  • ICS information safety assessment method based on analytic hierarchy method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] An ICS information security assessment method based on the analytic hierarchy process, the specific steps of the security assessment method are as follows:

[0037] Step A. Assess the ICS risk, and then construct the ICS hierarchical model of the industrial control system to be evaluated, and name the constructed ICS hierarchical model from top to bottom as layers A, B, C, and D;

[0038] Among them, the A layer is the ICS system, and the ICS system is connected to the technical and management classes of the B layer. Safety management system, safety management organization, personnel safety management, system construction management and system operation and maintenance management; C-level physical security connection anti-theft and anti-sabotage, physical location selection, physical access control, lightning protection, fire prevention, waterproof and moisture-proof , anti-static, temperature and humidity control, power supply and electromagnetic protection;

[0039] ...

Embodiment 2

[0056] An ICS information security assessment method based on the analytic hierarchy process, the specific steps of the security assessment method are as follows:

[0057] Step A. Assess the ICS risk, and then construct the ICS hierarchical model of the industrial control system to be evaluated, and name the constructed ICS hierarchical model from top to bottom as layers A, B, C, and D;

[0058] Among them, the A layer is the ICS system, and the ICS system is connected to the technical and management classes of the B layer. Safety management system, safety management organization, personnel safety management, system construction management and system operation and maintenance management; C-level physical security connection anti-theft and anti-sabotage, physical location selection, physical access control, lightning protection, fire prevention, waterproof and moisture-proof , anti-static, temperature and humidity control, power supply and electromagnetic protection;

[0059] ...

Embodiment 3

[0076] An ICS information security assessment method based on the analytic hierarchy process, the specific steps of the security assessment method are as follows:

[0077] Step A. Assess the ICS risk, and then construct the ICS hierarchical model of the industrial control system to be evaluated, and name the constructed ICS hierarchical model from top to bottom as layers A, B, C, and D;

[0078] Among them, the A layer is the ICS system, and the ICS system is connected to the technical and management classes of the B layer. Safety management system, safety management organization, personnel safety management, system construction management and system operation and maintenance management; C-level physical security connection anti-theft and anti-sabotage, physical location selection, physical access control, lightning protection, fire prevention, waterproof and moisture-proof , anti-static, temperature and humidity control, power supply and electromagnetic protection;

[0079] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses an ICS information safety assessment method based on an analytic hierarchy method. The method comprises: performing ICS risk assessment and constructing an ICS hierarchical model of a project control system to be assessed; constructing a comparison matrix for the importance degree assessment; performing the consistency check of the comparison matrix; performing integral assessment of the ICS system to be assessed; and arranging the assessment report. The ICS information safety assessment method takes the analytic hierarchy method as the basis and performs improvement of the ICS information safety assessment, and preferably selects a weight ratio through comparison compared to the current assessment method so as to allow the assessment result to be more accurate, allow the information in the assessment report to be more reasonable and comprehensive and allow the whole assessment process thinking to be clearer; and moreover, the ICS information safety assessment method based on the analytic hierarchy method is scientific and rigorous and employs scientific method and means for the information safety risk assessment to provide the scientific basis for avoiding and defusing the industry information safety risk, or controlling the risk into an acceptable level and maximally ensuring the network and information safety.

Description

technical field [0001] The invention relates to an information security assessment method, in particular to an ICS information security assessment method based on analytic hierarchy process, and belongs to the technical field of information security applications. Background technique [0002] The integration of informatization and industrialization is a high-level in-depth combination of informatization and industrialization. Its core is supported by informatization. At present, it still faces some constraints. The core technology of informatization and the level of informatization security construction are relatively low. [0003] In the process of industrial control risk assessment, a variety of operational methods can be used, including empirical analysis, qualitative analysis and quantitative analysis. Regardless of the approach, the common goal is to identify the risks and impacts faced by industrial control systems, as well as the gap between the current level of secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q10/06G06Q50/26
CPCG06Q10/0635G06Q50/265
Inventor 范科峰姚相振夏冀刘贤刚周睿康高林李琳
Owner CHINA ELECTRONICS STANDARDIZATION INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products