Title | Design of Information System Security Evaluation Management System based on Artificial Intelligence |
Publication Type | Conference Paper |
Year of Publication | 2022 |
Authors | He, Song, Shi, Xiaohong, Huang, Yan, Chen, Gong, Tang, Huihui |
Conference Name | 2022 IEEE 2nd International Conference on Electronic Technology, Communication and Information (ICETCI) |
Keywords | artificial intelligence, artificial intelligence security, composability, Economics, Human Behavior, Information security, information system, information technology, Metrics, Network security, pubcrawl, resilience, Resiliency, security, security assessment, Stability analysis, system design |
Abstract | In today's society, with the continuous development of artificial intelligence, artificial intelligence technology plays an increasingly important role in social and economic development, and hass become the fastest growing, most widely used and most influential high-tech in the world today one. However, at the same time, information technology has also brought threats to network security to the entire network world, which makes information systems also face huge and severe challenges, which will affect the stability and development of society to a certain extent. Therefore, comprehensive analysis and research on information system security is a very necessary and urgent task. Through the security assessment of the information system, we can discover the key hidden dangers and loopholes that are hidden in the information source or potentially threaten user data and confidential files, so as to effectively prevent these risks from occurring and provide effective solutions; at the same time To a certain extent, prevent virus invasion, malicious program attacks and network hackers' intrusive behaviors. This article adopts the experimental analysis method to explore how to apply the most practical, advanced and efficient artificial intelligence theory to the information system security assessment management, so as to further realize the optimal design of the information system security assessment management system, which will protect our country the information security has very important meaning and practical value. According to the research results, the function of the experimental test system is complete and available, and the security is good, which can meet the requirements of multi-user operation for security evaluation of the information system. |
DOI | 10.1109/ICETCI55101.2022.9832131 |
Citation Key | he_design_2022 |