期刊文献+

信息安全风险分析方法及其应用研究 被引量:3

The Application of Information Security Risk Analysis Methods
下载PDF
导出
摘要 信息技术的广泛深入应用使得信息安全问题更加复杂化,如何有效地进行信息安全风险分析,分析组织存在的安全漏洞并及时修补,最大限度地降低组织的安全风险,已经成为信息安全领域研究的重要内容。在研究信息安全分析方法、实施过程及步骤的基础上,以电信运营商计费帐务系统为应用主体,对信息安全风险分析方法进行了应用。 Information security problem has been made much more complex by the wide use of information technology. It has become important content of information security research field that how to execute effective information security risk analysis, to analyze security vulnerabilities and its repainment and to minimize security risks. Based on the demonstration of information security analysis method, implementation process and steps, the paper uses information security risk analysis method in practice in telecom billing system.
作者 张晶
出处 《电脑与电信》 2010年第7期81-83,共3页 Computer & Telecommunication
关键词 信息安全风险 风险分析 应用 information security risk risk analysis application
  • 相关文献

参考文献3

二级参考文献39

  • 1徐永青,徐丽珍.数据库系统安全风险及安全策略研究[J].电脑知识与技术,2005(11):7-9. 被引量:7
  • 2张立涛,应力,钱省三.信息安全风险评估中若干操作问题的研究[J].山东理工大学学报(自然科学版),2006,20(1):79-83. 被引量:3
  • 3Bishop M. , Bailey D.. A critical analysis of vulnerability taxonomies. Department of Computer Science, University of California at Davis: Technical Report CSE-96-11, 1996
  • 4Longley D. , Shain M. , Caelli W.. Information Security: Dictionary of Concepts, Standards and Terms. New York: Macmillan, 1992
  • 5Beizer B.. Software Testing Techniques. 2nd edition. International Thomson Computer Press, 1990
  • 6Farmer D. , Spafford E. H.. The COPS security checker system. Purdue University, West Lafayette: Technical Report,Coast TR 94-01, CSD-TR-993, 1990
  • 7Baldwin R. W.. Kuang: Rule-based security checking. Programming Systems Research Group, Lab for Computer Science, MIT, Massachusetts: Technical Report, 1994
  • 8Zerkle D. , Levitt K. , NetKuang: A multi-host configuration vulnerability checker. In: Proceedings of the 6th USENIX Security Symposium, San Jose, CA, 1996
  • 9Porras P. A. , Kemmerer R. A.. Penetration state transition analysis: A rule-based intrusion detection approach. In: Proceedings of the Eighth Annual Computer Security Applications Conference, 1992, 220~229
  • 10Ilgun K.. USTAT: A real-time intrusion detection system for UNIX. In: Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, CA, 1993, 16

共引文献92

同被引文献12

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部