Research Article

Risk-Based Dynamic Identity Authentication Method Based on the UCON Model

Table 3

Resource value level of the campus.

ImportanceValueTypeIntroduction

V80–100InfrastructureServer pool composed of computing nodes; will cause very serious damage if destroyed
IV60–80System resourcesWebsite’s operating systems; will cause serious damage if destroyed
III40–60Shared dataData that need to be shared; will cause some damage if destroyed
II20–40Application toolAuxiliary application on the website; will cause loss after being destroyed
I0–20Portal informationAnnouncements; causes almost no damage if destroyed