文档详情

Research o the Evaluation of Computer Security Based on the Fuzzy Analytic Hierarchy Process.doc

发布:2016-11-21约1.26万字共7页下载文档
文本预览下载声明
Research on the Evaluation of Computer Security Based on the Fuzzy Analytic Hierarchy Process Abstract:The hieratchy model of computer security assessment was constructed in light of the characteristics of computer and the factors influencing the computer security, with the method of Fuzzy Analytic Hierarchy Process, to offer a way for computer security assessment. Keywords: Computer; Assessment; Fuzzy Analytic Hierarchy Process First,introduction With the development of our societys information technology,people have gradually accept the importance of information.So the computer system has become a indispensable part in social and economic development and Peoples daily life.But with computerswidely used,it brought much convenient to people,it also brought new security threats to many social organizations and individuals.Their computers security now are under the threat of social network hackers, trojans, viruses, malicious program organizations and individuals and so on.People have pay more attention to computer security problem.However,computer security is a long-term and sustainable development process,it is not a settled problem.So people can not expect solve it by one simple safety products,it is impossible and not realistic.Computers security evaluation is the basis of computer security.To solve the problem of computer security,above all people must have the knowledge in the aspects which affect computer security and make analysis and evaluation with them.But by now,a mature method computer security evaluation has not shaped.This article is aim to form a new computer security evaluation model which isbased on fuzzy analytic hierarchy Process and to find a practicial computer security evaluation method. Second,feasibility and design principles on Computer Security evaluation Computer security is a fuzzy concept and can not be defined by a concrete concept.What a degree of it can be called safe is not very clear.Now there are some standards of the evaluation a
显示全部
相似文档