Research Article
Risk-Based Dynamic Identity Authentication Method Based on the UCON Model
Table 3
Resource value level of the campus.
| Importance | Value | Type | Introduction |
| V | 80–100 | Infrastructure | Server pool composed of computing nodes; will cause very serious damage if destroyed | IV | 60–80 | System resources | Website’s operating systems; will cause serious damage if destroyed | III | 40–60 | Shared data | Data that need to be shared; will cause some damage if destroyed | II | 20–40 | Application tool | Auxiliary application on the website; will cause loss after being destroyed | I | 0–20 | Portal information | Announcements; causes almost no damage if destroyed |
|
|