期刊文献+

中国电信IT安全保障体系研究与设计 被引量:4

A Study in IT Security System of China Telecom
下载PDF
导出
摘要 文章首先分析了全业务运营形势下中国电信IT支撑系统面临的安全新挑战,从多个角度出发,阐述了电信运营商CTG-MBOSS支撑系统安全现状和当下亟需解决的安全问题,在分析和比较了当前国际最先进的安全保障体系模型,基于多年来电信在IT安全管理方面的实践,结合了行业最佳实践,设计了适用于中国电信全业务支撑要求的安全保障体系模型框架,并给出了安全保障体系建设路线规划和演进策略。 This paperdescribes the situation and challenges of China Telecom's IT support system in full-service operation,and analyzes the security issues of the operator's CTG-MBOSS support system.Combined with analysis and comparison of current international security systems and models,based on years of practices of China Telecom in the IT security management,and combined with industry best practices,it designsa security system framework for China Telecomwhich can meet the requirements of full-service support,and then gives the route planning andevolution strategiesfor the system construction and operation.
出处 《现代电信科技》 2011年第9期53-57,共5页 Modern Science & Technology of Telecommunications
关键词 CTG-MBOSS 安全管理中心SOC DCN CTG-MBOSS SOC DCN
  • 相关文献

参考文献9

二级参考文献46

  • 1王娜,方滨兴,罗建中,刘勇.“5432战略”:国家信息安全保障体系框架研究[J].通信学报,2004,25(7):1-9. 被引量:36
  • 2冯登国.国内外信息安全研究现状及发展趋势(摘编)[J].信息网络安全,2007(1):9-11. 被引量:11
  • 3IEEE STD 1472 -1995. IEEE Standard Glossary of Software Engineering Terminology[ S]. Piscataway, NJ: Institute of Electrical and Electronics Engineers, Inc,1995.
  • 4Bell David E, La Padula Leonard J. Secure Computer Systems : A Mathematical Model [ R ]. ESD - TR - 73 - 278,1973.
  • 5Biba K J. Integrity Considerations for Secure Computer Systems[ R]. ESD - TR - 76 - 372,1977.
  • 6Information Processing Systems -OSI RM. ISO/TC97 7498 -2. Part 2: Security Architecture[ S]. Geneva: International Organization for Standardization, 1989.
  • 7This Version April. DoD Technical Architecture Framework for Information Management, Volume 6 : DoD Goal Security Architecture, Defense Information Systems Agency Center for Standards [ EB/OL]. ( 1996 - 4 - 30) [ 2009 - 12 - 22 ]. http ://www. dmff. org/pres/index. html.
  • 8Fine T, Minear S E, Hills Arden. Assuring Distributed Trusted Mach [ C ]//Proceeding of the 1993 Symposium on Security and Privacy. Washinton DC : IEEE Computer Society, 1993:206 - 218.
  • 9Spencer Ray, Smalley Stephen, Loscocco Peter, et al. The Flask Security Architecture : System Support for Diverse Security Policies[ C]//Proceedings of the 8th USENIX Security Symposium. Berkeley, CA:USENTX Association, 1999:123 -139.
  • 10Bender Dan, Moore Reaqan, Marciano Richard, et al. Intelligent Metacomputing Tested ( Distributed Object Computation Tested (DOCT)) [ EB/OL]. (1997 -01 -08 ). http.//handle. dtic. rail/100. 2/ADA324199.

共引文献73

同被引文献22

引证文献4

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部