期刊文献+

专用园区网络系统安全风险评估研究 被引量:3

Study on information security risk assessment of private intranet network system
下载PDF
导出
摘要 对网络安全的风险评估不仅是专用网络系统建设的重要内容,也是其园区单位进行网络安全规划、实施与管理的基础。结合园区网络系统安全的现状,阐述了对专用园区网络信息安全风险评估问题的认识,通过构建风险评估模型及量化方法,结合评估过程实例,分析了目前用于专用园区网络系统安全风险评估的主要过程,并针对网络信息安全风险评估结果中存在的问题,研究了相应可行的方法对策。 Security and risk assessment on information is not only an important aspect of private network system security construct, but also a foundation of network security programming, implementing and managing in secret department. According to the actuality of network system in secret department, the understanding about security and risk evaluating is expatiated, and a security evaluating model and a measuring method. According to evaluating course instance, the main process of network system security evaluating in private network is analyzed are built. According to the problems in outcome of network information security assessment, the article brings forward corresponding feasible countermeasure.
作者 陈鹏 蔡玥
出处 《计算机工程与设计》 CSCD 北大核心 2008年第9期2209-2211,2214,共4页 Computer Engineering and Design
关键词 专用网络 风险评估 评估模型 风险量化 网络信息安全 private network risk assessment assessment model risk quantization network information security
  • 相关文献

参考文献8

二级参考文献30

  • 1朱松岭,周平,韩毅,杨海成.基于模糊层次分析法的风险量化研究[J].计算机集成制造系统,2004,10(8):980-984. 被引量:81
  • 2高景生,宋昌烈,李成仁,李淑凤,宋琦,黄开玉,李国卿.中频溅射技术沉积镱铒共掺Al_2O_3薄膜光致发光[J].光电子.激光,2004,15(10):1162-1165. 被引量:10
  • 3罗璎珞,李晓勇.风险评估实施过程中的影响因素[J].计算机安全,2004(8):59-60. 被引量:3
  • 4[1]Rommelfanger HJ.Multicriteria Decision Making Using Fuzzy Logic [C].In:Proceedings of the Conference on the North American Fuzzy Information Processing Society, 1998: 360~364
  • 5[2]Hanseong S,Poonghyun S.A Software Safety Evaluation Method Based on Fuzzy Colored Petri Nets[C].In:Proceedings of International Conference on Fuzzy Systems, 1999; (2): 830~834
  • 6[3]Antonakopoulos T, Agavanakis K.CASE Tools Evaluation: An Automatic Process Based on Fuzzy Sets Theory[C].In:Proceedings of Sixth IEEE International Workshop on Rapid System Prototyping, 1995:140~146
  • 7[4]Cannavacciuolo A,Capaldo G.A Fuzzy Model of the Evaluation Process[C].In:Proceedings of the Fifth IEEE International Conference on Fuzzy Systems, 1996; (2) :828~834
  • 8[5]Copigneaux F,Martin S.Software Security Evaluation Based on a Topdown McCall-like Approach[C].In:Proceedings of the Fourth Conference on Aerospace Computer Security Applications, 1988:414~418
  • 9[6]Garrabrants WM,Ellis AW.CERTS :A Comparative Evaluation Methodfor Risk Management Methodologies and Tools[C].In:Proceedings of the Sixth Annual Computer Security Applications Conference,1990:251~257
  • 10Rainer, Jr R K,et al. Risk Analysis for Information Technology[ J].Journal of Management Information Systems, 1991,8 ( 1 ) : 129-147.

共引文献65

同被引文献11

引证文献3

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部