期刊文献+

网络信息安全建设体系研究

The Exploration of Construction System of Network Information Safety
下载PDF
导出
摘要 随着网络时代的飞速发展,科学技术的不断进步,网络已经成为人们生活、工作、出行不可或缺的工具。在进行信息交流,信息传递的过程中,网络安全问题成为人们共同关注的话题。由于互联网具有一定的开放性、不确定性、虚拟性等特性,不法份子伪造用户身份,盗取用户的密码、账户和资料入侵保密的资料、数据库,随意篡改文件内容等事件层出不穷,网络用户的利益受到了极大的损害。从网络安全的现状出发,着重分析了网络安全隐患产生的原因,给出了网络信息安全建设的可行性方案,有利于保障网络的正常运行。 With the rapid development of the network,the improvement of science and technology,network has become the people live,work,and travel indispensable tools.In the exchange of information,the process of information transmission network security in become common topic,due to the Internet has certain openness,uncertainty,virtual nature,and so on,such as fake user identity,and steal the password of user,account and material invasion confidential material,database,optional tamper with the content,the interests of the network users by the great damage,This article from the present situation of network security,this paper analyzes the problem of network security hidden danger as the cause of the network information safety construction to make a strong feasible solutions to guarantee the normal operation of the network.
作者 尹文婷
出处 《软件导刊》 2012年第5期134-135,共2页 Software Guide
关键词 互联网安全 信息安全 数据加密 Internet Security Information Safety Data Encryption
  • 相关文献

参考文献3

二级参考文献12

  • 1[1]ISO/ICE 17799-2000(E),Information technology Code of practice for information security management[S].
  • 2[2]BS7799-2:2002,信息安全管理体系实施规范[S].
  • 3[2]陈光.信息系统信息安全风险管理方法研究[C].长沙:国防科技大学,2005
  • 4[3]Kwok L F.Information Security Management and Model-ing[J].Informtion Management and Computer Security,1999,7(1):30~39.
  • 5[4]Parker D.Why the Due Care Security Review Method is Superior to Risk Assessment[J].CSI ALERT Newsletter,2000:212.
  • 6[5]McDermott J.Attack Net Penetration Testing[A].Proceedings:2000 New Security Paradigms Workshop (NSPW' 00),Cork,Ireland,2000,15~21.
  • 7[6]Dacier M,Deswarte Y,Ka'aniche M.Quantitative Assessment of Operational Security:Models and Tools[R].Laboratory for Analysis and Architecture of Systems,National Center for Scientific Research (LAAS-CNRS),1996.
  • 8[7]Helmer G,Wong J,Slagell M,et al.Software Fault Tree and Colored Petri Net Based Specification,Design and Imp-ementation of Agent-Based Intrusion Detection System.Req-uirements Engineering,2000,7(4):207~220.
  • 9[8]Turban E,Wetherbe J,Mclean,E.Information Technology for Management:Improving Quality and Productivity.New York:John Wiley and Sons,1996.
  • 10[9]Bilar D.Quartitative Risk Analysis of Computer Networks.Hanover,New Hampshire:Thayer School of Engineering,Dart mouth University,2003.

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部