Analysis and Application of Security Risk Management Based on Business Process Granularity

Existing assets as the core of the security risk management models, cannot meet the actual needs of business risk management. Through the establishment of security granularity based on business process risk management models, and the realization and application in the WAP, SMS systems, the business...

Full description

Saved in:
Bibliographic Details
Main Author: Bin Tan
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2013-11-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2013.11.029/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529252209491968
author Bin Tan
author_facet Bin Tan
author_sort Bin Tan
collection DOAJ
description Existing assets as the core of the security risk management models, cannot meet the actual needs of business risk management. Through the establishment of security granularity based on business process risk management models, and the realization and application in the WAP, SMS systems, the business risk management was realized. Security administrators and business system administrators can clearly understand the security risk situation of business systems, effectively focus and prioritize critical business systems, business processes and the security alarm; based on perceived security risk posture, security officer may plan, develop and implement safety programs, to improve operational safety risk management.
format Article
id doaj-art-48c0827cdd4c4dac98b39a415dfae6f5
institution Kabale University
issn 1000-0801
language zho
publishDate 2013-11-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-48c0827cdd4c4dac98b39a415dfae6f52025-01-15T03:21:24ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012013-11-012916817259625730Analysis and Application of Security Risk Management Based on Business Process GranularityBin TanExisting assets as the core of the security risk management models, cannot meet the actual needs of business risk management. Through the establishment of security granularity based on business process risk management models, and the realization and application in the WAP, SMS systems, the business risk management was realized. Security administrators and business system administrators can clearly understand the security risk situation of business systems, effectively focus and prioritize critical business systems, business processes and the security alarm; based on perceived security risk posture, security officer may plan, develop and implement safety programs, to improve operational safety risk management.http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2013.11.029/security risk managementbusiness processWAP systemSMS system
spellingShingle Bin Tan
Analysis and Application of Security Risk Management Based on Business Process Granularity
Dianxin kexue
security risk management
business process
WAP system
SMS system
title Analysis and Application of Security Risk Management Based on Business Process Granularity
title_full Analysis and Application of Security Risk Management Based on Business Process Granularity
title_fullStr Analysis and Application of Security Risk Management Based on Business Process Granularity
title_full_unstemmed Analysis and Application of Security Risk Management Based on Business Process Granularity
title_short Analysis and Application of Security Risk Management Based on Business Process Granularity
title_sort analysis and application of security risk management based on business process granularity
topic security risk management
business process
WAP system
SMS system
url http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2013.11.029/
work_keys_str_mv AT bintan analysisandapplicationofsecurityriskmanagementbasedonbusinessprocessgranularity