Keywords: risk assessment, Analytic Hierarchy Process, information security IntroductionInformation security risk management is the overall process that identifies and analyzes the risk of being exposed to the organization, provides an assessment of the potential impact on the business, and takes measures to eliminate or reduce the risk to an acceptable level [1]. Information security risk assessment is a stage of information security risk management. Information security risk management depends on the results of risk assessment to determine the subsequent risk control and approval activities. There are many risk assessment methods, which can be divided into three categories: the qualitative risk assessment methods, quantitative risk assessment methods, comprehensive assessment methods which combine qualitative with quantitative assessment methods [2]. In reference [3], the key issues during the process of information security risk assessment are proposed and the quantitative methods of risk assessment are studied. In reference [4], a quantitative method based on expert judgments, fuzzy logic and analytic hierarchy process is used to evaluate the impact and possibility values for specific threats. In reference [5], the Bayesian network is introduced into information security risk assessment system to establish the risk analysis model. In reference [6], the information security risk assessment approach based on two stages decision model with grey synthetic measure is proposed to solve the fuzziness and uncertainty from many aspects.However, there are too many elements in the process of information security risk assessment, which makes the calculation of risk value more complicated and cumbersome. How to find the more important elements of assessment from many elements to simplify the calculation of risk value and provide a strong basis for taking relevant measures, which is a problem needs to be solved. In addition, the reliability of the risk assessment results can not be guaranteed only through a single qualitative or quantitative assessment method due to the fact that the qualitative assessment methods are too subjective and rough and some risk elements may be misunderstood or misinterpreted in the process of quantitative assessment, which will have great influence on the accuracy of the evaluation results [7].By AHP, the relative weight of elements related to information security risk can be calculated. Then the optimal indicators, which can simplify the calculation of risk value, can be
Build strata three-dimensional structure model By GMS (Groundwater Modeling System) software about the Feng He River basin and on the basis of it place the groundwater water model to better show the groundwater level, buried depth, thickness, etc., at the same time display the locations of groundwater cordon. Groundwater cordon can be cut along with the strata and water and displayed on the cutting profile. Superimpose the model and satellite topographic map, so can select a specific position cutting three-dimensional model in order to understand a specific location or area of underground water level, water thickness, etc. Through the real-time update of groundwater level data to understand the utilization of groundwater mining in the study area, ensure the sustainable use of groundwater resources and realization of three dimensional dynamic monitoring of groundwater resources in the study area.
Data conversion is a necessary step to establish a unified data storage and management mode. Based on the analysis of the structure of Shapefile and the principle of semantic conversion, this paper proposes a method of geospatial data files conversion based on semantic. This method to a relational database file shape file conversion, the application of this method can not only increase the data read speed, and ease of data management and sharing.
A maximum-meet user’s individual needs integration model was presented in this paper, which integrated information integration thinking, Web3.0 with open platform. The model embedded Service-Oriented Architecture (SOA) framework realized the information integration. Then combined the OpenID ,OAuth, and role-based access control (RBAC) achieved single sign-on and authorization system; finally, based on Maps API Mashup applications realized the interaction between the LAN Web information and maps. The model has the advantage of friendly interface, strong replicability, and high security.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.