Research on the Evaluation of Computer Security Based on the Fuzzy Analytic Hierarchy Process.doc
- 1、本文档共7页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
ResearchontheEvaluationofComputerSecurityBasedontheFuzzyAnalyticHierarchyProcessResearchontheEvaluationofComputerSecurityBasedontheFuzzyAnalyticHierarchyProcess
Research on the Evaluation of Computer Security Based on the Fuzzy Analytic Hierarchy Process
Abstract:The hieratchy model of computer security assessment was constructed in light of the characteristics of computer and the factors influencing the computer security, with the method of Fuzzy Analytic Hierarchy Process, to offer a way for computer security assessment.
Keywords: Computer; Assessment; Fuzzy Analytic Hierarchy Process
First,introduction
With the development of our societys information technology,people have gradually accept the importance of information.So the computer system has become a indispensable part in social and economic development and Peoples daily life.But with computerswidely used,it brought much convenient to people,it also brought new security threats to many social organizations and individuals.Their computers security now are under the threat of social network hackers, trojans, viruses, malicious program organizations and individuals and so on.People have pay more attention to computer security problem.However,computer security is a long-term and sustainable development process,it is not a settled problem.So people can not expect solve it by one simple safety products,it is impossible and not realistic.Computers security evaluation is the basis of computer security.To solve the problem of computer security,above all people must have the knowledge in the aspects which affect computer security and make analysis and evaluation with them.But by now,a mature method computer security evaluation has not shaped.This article is aim to form a new computer security evaluation model which isbased on fuzzy analytic hierarchy Process and to find a practicial computer security evaluation method.
Second,feasibility and design principles on Computer Security evaluation
Computer security is a fuzzy concept and can not be defined by a concrete concept.What a degree of it can be called safe is not very clear.Now there are some standards of the evaluation and
您可能关注的文档
- Python Questions.doc
- python开发环境.docx
- Python操作Access数据库步骤.docx
- QA06-02员工激励管理办法K.doc
- P波离散度与甲亢的相关研究进展.doc
- QAbstractItemView.doc
- QB_Ch15(Eng)_output_revised 022011.doc
- QHSE工作要点.doc
- QHSE管理体系内审.doc
- QHSE管理体系管理内审检查表2015.5.20-01.doc
- 第十一章 电流和电路专题特训二 实物图与电路图的互画 教学设计 2024-2025学年鲁科版物理九年级上册.docx
- 人教版七年级上册信息技术6.3加工音频素材 教学设计.docx
- 5.1自然地理环境的整体性 说课教案 (1).docx
- 4.1 夯实法治基础 教学设计-2023-2024学年统编版九年级道德与法治上册.docx
- 3.1 光的色彩 颜色 电子教案 2023-2024学年苏科版为了八年级上学期.docx
- 小学体育与健康 四年级下册健康教育 教案.docx
- 2024-2025学年初中数学九年级下册北京课改版(2024)教学设计合集.docx
- 2024-2025学年初中科学七年级下册浙教版(2024)教学设计合集.docx
- 2024-2025学年小学信息技术(信息科技)六年级下册浙摄影版(2013)教学设计合集.docx
- 2024-2025学年小学美术二年级下册人美版(常锐伦、欧京海)教学设计合集.docx
文档评论(0)