Please wait a minute...
Computer & Telecommunication  2017, Vol. 1 Issue (6): 63-65    DOI:
Current Issue | Archive | Adv Search |
Research on Risk Management Process and Method in Information System Integration Project
An Yichun
CETC Special Mission Aircraft System Engineering Co.,Ltd.
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  In view of some current risk problems in information system integration project, this paper combines with the characteristics of the system integration project, researches on the risk category analysis, process and management methods of the system integration project, aiming to strengthen the risk management of system integration project, and insure the smooth implementation of the project.
Key wordsrisk management      information system      security     
Published: 16 November 2017
:  F284  

Cite this article:

An Yichun. Research on Risk Management Process and Method in Information System Integration Project. Computer & Telecommunication, 2017, 1(6): 63-65.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2017/V1/I6/63

[1] DING Wen-chao YU Shuang-bo XUE Yan-zhu FANG Dong-li. A Trust Service Adaptation Method Based on Security Proxy[J]. 电脑与电信, 2024, 1(6): 31-34.
[2] LI Chun-hui WANG Xiao-ying ZHANG Qing-jie LIU Han-zhuo LIANG Jia-ye GAO Ning-kang. DDoS Attack Detection Method Based on Multi-scale Convolutional Neural Network [J]. 电脑与电信, 2024, 1(6): 35-.
[3] SHAO Ze-jun  DAI Bing  HU You-ming  YIN Jun-han  LIU Yue-chao. Research on the Autonomous and Controllable Maturity of Provincial Enterprise Data Centers: Take Shandong Province for Example[J]. 电脑与电信, 2024, 1(5): 103-.
[4] BAO Hai-yan. Leading by Ideological and Political Education, Integrating Industry and Education --Research on the Teaching Innovation of Computer Network Security[J]. 电脑与电信, 2024, 1(1): 4-7.
[5] HE Zhen-xiang WANG Li-ying.
The Governance Problems and Countermeasures of Network Space
from the Angle of Investigation and Evidence Collection
[J]. 电脑与电信, 2022, 1(1-2): 36-39.
[6] PANG Hong-qiu.
Research on Risk Management of Software Project Implementation in T Company
[J]. 电脑与电信, 2022, 1(1-2): 58-62.
[7] YE Dong CHEN Chun-tao LI Zong-chen LI Jun-yao. Research on the School-Bureau-Enterprise Collaborative Education Model in the Major of Public Security Audio-visual Technology[J]. 电脑与电信, 2021, 1(8): 30-32.
[8] YANG Ye. Research on the Information Security and Management Major Personnel Training Based on“1+X”Certificate System[J]. 电脑与电信, 2021, 1(6): 6-8.
[9] HAN Hai. An Integrated Security Monitoring Solution in the Judicial Field Based on 5G Private Network[J]. 电脑与电信, 2021, 1(6): 76-78.
[10] FANG Xin. Research on Security of Rip Routing Protocol Based on Python[J]. 电脑与电信, 2021, 1(5): 1-21.
[11] JIANG Xin WANG Fei. Survey on Blockchain Technology and Application[J]. 电脑与电信, 2021, 1(5): 25-29.
[12] ZHENG Rui YANG Peng ZHOU Su-xu LI Cheng.
Research on Safety Risk Monitoring and Early Warning System of Key Enterprises
in Industry and Trade
[J]. 电脑与电信, 2021, 1(12): 69-72.
[13] LAI Jin-zhi.
Research and Practice of Network Security Management of Industrial Control System
Based on PDCA Circulation
[J]. 电脑与电信, 2021, 1(11): 12-15.
[14] GONG Jian-feng.
Research on Cloud Security Evaluation Model Based on Data Mining
[J]. 电脑与电信, 2021, 1(11): 95-.
[15] YE Hui-qing.
Discussion on Application of 5G Customized Private Network for Vertical Industry
[J]. 电脑与电信, 2021, 0(10): 64-66.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd