首页> 美国政府科技报告 >Risk Assessment Methodology for EDI Unclassified/Sensitive Information Systems
【24h】

Risk Assessment Methodology for EDI Unclassified/Sensitive Information Systems

机译:EDI未分类/敏感信息系统的风险评估方法

获取原文

摘要

Because it is not cost-effective to implement more security procedures than aparticular environment requires, defining security requirements based on the results of a thorough risk analysis provides an effective way to control the cost of security for information systems. The steps involved in the EDI risk assessment methodology presented in this paper are the same basic steps found in most types of risk assessment: define assets, review threats, identify security requirements, and select protective countermeasures. The methodology addresses all of the primary threats to an EDI application system and its data, which include the following: unauthorized disclosure of data, unauthorized modification of data, sender repudiation of transactions, receiver repudiation of transactions, unauthorized system access, and lack of system availability.... Information systems, Electronic Data Interchange (EDI), Security, Risk assessment.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号