期刊文献+

军工行业信息系统安全风险分析与评估 被引量:1

Security Risk Analysis and Assessment of Information Systems in War Industry
原文传递
导出
摘要 安全风险评估是信息系统安全工程的重要组成部分,是建立信息系统安全保障体系的基础和前提。文中对军工行业信息系统安全风险评估的主要内容、关键环节和评估准则进行了阐述,并结合实际风险评估工作给出了风险评估的基本方法和经验性策略,最后对军工行业信息系统的典型安全威胁和系统脆弱性进行了分析和归纳。 Risk assessment is very important for security assurance of information systems in war industry. The main contents, key technologies and principles of security risk assessment are described in this paper. Then, the basic methods and some practical advice on risk assessment and threat analysis for different kinds of information system are presented. Finally, the typical security threats and vulnerabilities of information systems in war industry are analyzed and summarized.
出处 《信息安全与通信保密》 2010年第1期64-66,69,共4页 Information Security and Communications Privacy
关键词 信息系统 风险评估 安全威胁 系统脆弱性 information system risk assessment security threat system vulnerability
  • 相关文献

参考文献4

二级参考文献35

  • 1田新广,高立志,张尔扬.新的基于机器学习的入侵检测方法[J].通信学报,2006,27(6):108-114. 被引量:15
  • 2Verwoerd T, Hunt R. Intrusion detection techniques and approaches.Computer Communication, 2002, 25(15):1356- 1365.
  • 3Lee W, Dong X. Information-theoretic measures for anomaly detection. Proc. of the IEEE Symposium on Security and Privacy, Oakland, USA, 2001: 130-134.
  • 4Ye N, Emran S M, Chen Q, et al. Multivariate statistical analysis of audit trails for host-based intrusion detection. IEEE Trans. on Computers, 2002, 51(7): 810-820.
  • 5Tian X G, Gao L Z, Sun C L, et al. A method for anomaly detection of user behaviors based on machine learning. The Journal of China Universities of Posts and Telecommunications, 2006, 13(2):61-65.
  • 6Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of the ACM, 1997, 40(10): 88-96.
  • 7Lane T, Brodley C E. Temporal sequence learning and data reduction for anomaly detection. ACM Trans. on Information and System Security, 1999, 2 (3): 295-331.
  • 8Lee W, Stolfo S J. A Framework for constructing features and models for intrusion detection systems. ACM Trans. on Information and System Security, 2000, 3 (4): 61-69.
  • 9Yan Q, Xie W X, Yang B. An anomaly intrusion detection method based on HMM. Electronics Letters, 2002, 38 (13): 663-664.
  • 10Lane T, Carla E B. An empirical study of two approaches to sequence learning for anomaly detection. Machine Learning, 2003, 51(1): 73-107.

共引文献96

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部