Operations Research and Management Science ›› 2014, Vol. 23 ›› Issue (3): 163-169.

Previous Articles     Next Articles

Resources Allocation Analysis of Information Security Defense in Network Information System——In Perspective of Theory of Constrains

XIONG Qiang1,2, ZHONG Wei-jun1, LI Zhi-wen2   

  1. 1. School of Economic and Management, Southeast University, Nanjing 210096, China;
    2. School of Management, Jiangsu University, Zhenjiang 212013, China
  • Received:2012-11-02 Online:2014-03-25

网络信息系统中信息安全防御资源分配策略分析——基于约束理论视角

熊强1,2, 仲伟俊1, 李治文2   

  1. 1.东南大学 经济管理学院,江苏 南京 210096;
    2.江苏大学 管理学院,江苏 镇江 212013
  • 作者简介:熊强(1979-),男,江苏常州人,博士研究生,研究方向:电子商务、信息安全管理;仲伟俊(1962-),男,江苏南通人,教授,研究方向:信息管理与信息系统、企业创新;李治文(1981-),男,山东海阳人,博士,研究方向:电子商务、信息系统管理。
  • 基金资助:
    国家自然科学基金项目(71071033);国家社会科学基金项目(10BGL097);教育部人文社会科学研究青年基金项目(11YJC630234)

Abstract: Being safe and economical is the main foundation when enterprises make the decision on information security defense, so that enterprises need to trade off optional allocation of defense resources among many different information nodes in the network information system. This paper firstly establishes a decision model of security defense without resource constraints in order to study how enterprise optimizes the allocation of its defense resources, and the result obtains the defense threshold and relative economical defense level of different nodes. Furthermore, the condition that security resources are limited is combined into the basic model. Through analyzing the impact of factors such as the defensive value of different information nodes, the expected loss, attack probability and so on, we draw conclusions about the priority of different nodes, the amount of resources invested in the defense of different nodes.

Key words: information system, resources allocation, constrains theory, information security

摘要: 安全经济性是企业信息安全防御决策的重要依据,在网络信息系统中企业需要权衡如何在众多不同信息资源节点间实施防御资源的合理分配。本文首先构建了无安全资源约束下的安全防御决策模型,研究企业在信息安全防御中如何来优化分配其防御资源,得出不同信息节点存在防御阀值以及各节点的相对经济防御水平值;在此模型基础上增加了安全防御资源约束条件,分析不同信息资源节点的防御价值、损失预期、攻击概率等因素对决策的影响,得出企业在不同节点上的防御优先级以及防御过程中投入资源量等相关结论。

关键词: 信息系统, 资源分配, 约束理论, 信息安全

CLC Number: