Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Construction a Portrait of Network Security Defense Capabilities Driven by Risk Monitoring Data

View through CrossRef
<p>The construction of the defense capability portrait can accurately locate the weak points of university defenses, locate the risks of the university&rsquo;s network information system, and provide security suggestions and countermeasures for university risk defense. Aiming at the problems in the construction method of network security defense capability portrait, such as large evaluation indicator system, strong subjectivity of weight and lack of theoretical support of profiling technology. The method integrates the hierarchical network security defense capability assessment with profiling technology organically, to simplify the evaluation indicator system. Relying on network security knowledge and statistical methods, it realizes the quantification of portrait labels in different dimensions and uses Analytic Hierarchy Process (AHP) to determine the weight of different indicator items, avoiding the subjectivity and arbitrariness in determining weight factors. Experimental results show that the proposed method can effectively solve the aforementioned problems, enhance the credibility and accuracy of network security defense capability portrait, and provide a theoretical basis for profiling technology. The experimental results show that the method in this paper effectively solves the shortcomings of the traditional network security capability portrait construction. In the real university network data, the evaluation results of this method are consistent with the expected effects, effectively evaluating the network security defense capabilities of universities.</p> <p>&nbsp;</p>
Title: Construction a Portrait of Network Security Defense Capabilities Driven by Risk Monitoring Data
Description:
<p>The construction of the defense capability portrait can accurately locate the weak points of university defenses, locate the risks of the university&rsquo;s network information system, and provide security suggestions and countermeasures for university risk defense.
Aiming at the problems in the construction method of network security defense capability portrait, such as large evaluation indicator system, strong subjectivity of weight and lack of theoretical support of profiling technology.
The method integrates the hierarchical network security defense capability assessment with profiling technology organically, to simplify the evaluation indicator system.
Relying on network security knowledge and statistical methods, it realizes the quantification of portrait labels in different dimensions and uses Analytic Hierarchy Process (AHP) to determine the weight of different indicator items, avoiding the subjectivity and arbitrariness in determining weight factors.
Experimental results show that the proposed method can effectively solve the aforementioned problems, enhance the credibility and accuracy of network security defense capability portrait, and provide a theoretical basis for profiling technology.
The experimental results show that the method in this paper effectively solves the shortcomings of the traditional network security capability portrait construction.
In the real university network data, the evaluation results of this method are consistent with the expected effects, effectively evaluating the network security defense capabilities of universities.
</p> <p>&nbsp;</p>.

Related Results

Indonesia's Defense Policy In Addressing Space Threats In Perspective Of Defense Management
Indonesia's Defense Policy In Addressing Space Threats In Perspective Of Defense Management
This article investigates Indonesia's defense policy in addressing space threats, driven by the research objectives of analyzing the policy, assessing its effectiveness, and provid...
Eyes on Air
Eyes on Air
Abstract We at ADNOC Logistics & Services have identified the need for a Fully Integrated Inspection and Monitoring Solution to meet our operational, safety and ...
Cyber defense in breadth: Modeling and analysis of integrated defense systems
Cyber defense in breadth: Modeling and analysis of integrated defense systems
Cybersecurity is one of most critical concerns for any organization, as frequency and severity of cyber attacks constantly increase, resulting in loss of vital assets and/or servic...
Artificial Intelligence and Machine Learning Used as an Enabler for Dynamic Risk Management
Artificial Intelligence and Machine Learning Used as an Enabler for Dynamic Risk Management
Abstract Applying big data, data science, business process automation (BPA) and domain expertise to operational and project risk in the upstream O&G space, will ...
Circular Economy: Rethinking Security Sustainability Through Ransom Project
Circular Economy: Rethinking Security Sustainability Through Ransom Project
Abstract As part of PETRONAS approach to sustainability, the organization has made more concerted effort to purposefully adopt Circular Economy (CE) across PETRONAS ...
The Role of Computer Deception in Network Security
The Role of Computer Deception in Network Security
With the rapid development of Internet technology, computer has become an indispensable part of modern society. However, with the popularization of computer technology, the problem...
ThreatBased Security Risk Evaluation in the Cloud
ThreatBased Security Risk Evaluation in the Cloud
Research ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources f...
Public budget security administration: development of primary mechanisms
Public budget security administration: development of primary mechanisms
The current state of public administration of budget security indicates its actual absence. With the extremely important role of budget security, both in the life of the country as...

Back to Top