Analysis and Application of Security Risk Management Based on Business Process Granularity
Existing assets as the core of the security risk management models, cannot meet the actual needs of business risk management. Through the establishment of security granularity based on business process risk management models, and the realization and application in the WAP, SMS systems, the business...
Saved in:
Main Author: | |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2013-11-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2013.11.029/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841529252209491968 |
---|---|
author | Bin Tan |
author_facet | Bin Tan |
author_sort | Bin Tan |
collection | DOAJ |
description | Existing assets as the core of the security risk management models, cannot meet the actual needs of business risk management. Through the establishment of security granularity based on business process risk management models, and the realization and application in the WAP, SMS systems, the business risk management was realized. Security administrators and business system administrators can clearly understand the security risk situation of business systems, effectively focus and prioritize critical business systems, business processes and the security alarm; based on perceived security risk posture, security officer may plan, develop and implement safety programs, to improve operational safety risk management. |
format | Article |
id | doaj-art-48c0827cdd4c4dac98b39a415dfae6f5 |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2013-11-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-48c0827cdd4c4dac98b39a415dfae6f52025-01-15T03:21:24ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012013-11-012916817259625730Analysis and Application of Security Risk Management Based on Business Process GranularityBin TanExisting assets as the core of the security risk management models, cannot meet the actual needs of business risk management. Through the establishment of security granularity based on business process risk management models, and the realization and application in the WAP, SMS systems, the business risk management was realized. Security administrators and business system administrators can clearly understand the security risk situation of business systems, effectively focus and prioritize critical business systems, business processes and the security alarm; based on perceived security risk posture, security officer may plan, develop and implement safety programs, to improve operational safety risk management.http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2013.11.029/security risk managementbusiness processWAP systemSMS system |
spellingShingle | Bin Tan Analysis and Application of Security Risk Management Based on Business Process Granularity Dianxin kexue security risk management business process WAP system SMS system |
title | Analysis and Application of Security Risk Management Based on Business Process Granularity |
title_full | Analysis and Application of Security Risk Management Based on Business Process Granularity |
title_fullStr | Analysis and Application of Security Risk Management Based on Business Process Granularity |
title_full_unstemmed | Analysis and Application of Security Risk Management Based on Business Process Granularity |
title_short | Analysis and Application of Security Risk Management Based on Business Process Granularity |
title_sort | analysis and application of security risk management based on business process granularity |
topic | security risk management business process WAP system SMS system |
url | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2013.11.029/ |
work_keys_str_mv | AT bintan analysisandapplicationofsecurityriskmanagementbasedonbusinessprocessgranularity |