期刊文献+

基于ITIL体系的安全服务级别管理研究 被引量:11

Security service level management based on ITIL
下载PDF
导出
摘要 通过引入IT服务管理的理念,将安全运营管理定位为IT基础设施库ITIL中的服务,同时综合借鉴BS7799、NIST SP800系列以及其它有关信息安全标准的特点,构建基于ITIL的网络安全运营管理体系,帮助解决安全运营管理平台相关技术和产品的研究开发过程缺乏标准和规范的问题。服务级别管理是基于ITIL的网络安全运营管理体系保证安全服务达到组织或客户的期望并获得认可的关键,是基于安全服务级别协议的协商、定案、监控、报告和总结的过程。详细阐述了安全服务级别管理的相关概念、流程以及与安全运营管理体系其它过程间的关系。 By introducing the theory of IT service management and positioning security operation management as service in ITIL as well as utilizing BS7799, NIST 800 series and other security standards for reference, a network security management architecture based on ITIL is proposed to solve the problem of lacking of the uniform standard and criterion in developing the techniques and products of security operation. Security service level management is the key to meet expectations of organizations or customers and satisfy them in security services. SLM is the process of negotiation, agreement, monitoring, reporting and summary, which is based on service level agreement (SLA). The relevant concepts, procedures as well as relations with other processes are expounded.
出处 《计算机工程与设计》 CSCD 北大核心 2007年第4期780-784,868,共6页 Computer Engineering and Design
基金 国家自然科学基金项目(60403006) 北京市科技计划基金项目(D0105007040331)
关键词 IT基础设施库 服务级别管理 服务级别协议 运营级别协议 支持合同 IT infrastructure library (ITIL) service level management (SLM), service level agreement (SLA), operation level agreement (OLA) underpinning contract (UC)
  • 相关文献

参考文献13

  • 1Mike Stephenson,Eli Egozi.Delivering best practices for complex IT environment[EB/OL].2002.http://www3.ca.com/Files/WhitePapers/15980-CTO-DelerBestPractic.pdf.
  • 2ISO/IEC17799(BS7799-1:2005) code of practice for information security management[S].
  • 3ISO27001(BS7799-2:2005) specification for information security management systems[S].
  • 4Marianne Swanson,Joan Hash,Pauline Bowen.NIST SP800-18,guide for developing security plans for federal information systems[EB/OL].2006.http://csrc.nist.gov/publications/nistpubs/800-18-Revl/sp800-18-Revl-final.pdf.
  • 5Tim Grance,Joan Hash.NIST SP800-35,guide to information technology security services[EB/OL].2003.http://csrc.nist.gov/publications/nistpubs/800-35/SP800-35-final.pdf.
  • 6Colin Rudd.An introductory overview of ITIL[EB/OL].2004.http://www.itsmf.com/bestpractice/publications.asp.
  • 7王胜航,毕永军,代永杰,等.IT服务管理白皮书[M].北京:IBM公司,2003.
  • 8GB/T 20281-2006.防火墙技术要求和测试评价方法[S].
  • 9GB/T 20275-2006.入侵检测系统技术要求和测试评价方法[S].
  • 10GB/T 19771-2005.公钥基础设施PKI组件最小互操作规范[S].

二级参考文献16

  • 1Marc Welz, Hutchison A C M. Modulating access control at the application for closely coupled intrusion detection [R]. Cape Town, South Africa: 1st Computer Science Mini Conference,2002.
  • 2Marc Welz, Hutchison A C M. Interfacing trusted applications with intrusion detection systems [J]. Davis, California: 4th Symposium on Recent Advances in Intrusion Detection (RAID),LNCS, Springer Verlag, 2002,(10):37-53.
  • 3Giovanni Vigna, Richard A Kemmerer, Per Blix. Designing a web ofhighly-configurable intrusion detection sensors[M]. California Santa Barbara:Springer Verlag Heidelberg, Reliable Software Group Department of Computer Science Universit, 2003.
  • 4Holy_Father. Hooking Windows API [Z]. Nautopia. Coolfree-Pages.com, 29A Labs(29a.host.sk), 2004.
  • 5Chopper. The mydoom.a back door[EB/OL]. 2004. www. go-vernmentsecurity.org.
  • 6Markus De Shon. Intusion prevention versus intrusion detection[EB/OL]. http://www.netbankaudit.com/images/IP SvsIDS_White_Paper. pdf
  • 7陈代寿.从检测到预防IDS的演化与革命[J].中国计算机报,2003,(6).
  • 8Neil Desai. Intrusion prevention systems: The next step in the evolution of IDS [EB/OL]. http://www. securityfocus.com/infocus/1670.
  • 9Luiz Gustavo Martins Arruda, Around Network Intrusion Prevention Systems[Z]. SANS Institute, 2003.
  • 10Bob walder, Chris daSilva. Instrusion prevention: Reality or hype?[EB/OL]. http://www. networkassociates.com/us/_tier2/products/_media/sniffer/nww_insert_issue2.pdf4.

共引文献20

同被引文献55

引证文献11

二级引证文献54

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部