期刊文献+

网络安全的非传统安全特征决定其管理模式 被引量:4

原文传递
导出
摘要 文章介绍了1997年以来美国网络安全战略的演变过程,同时进一步了解了网络安全的非传统安全特征,并着重分析了《关于加强信息安全保障工作的意见》的历史局限性,进一步研究了我国信息安全管理所面临的问题和探索解决方案。
机构地区 本刊特约撰稿人
出处 《信息安全与通信保密》 2012年第8期23-32,3,共10页 Information Security and Communications Privacy
  • 相关文献

参考文献22

  • 1Critical Foundations: Protecting America's Infrastructure, The Report of the President's Commission on Critical Infrastructure Protection, USA, October 1997.
  • 2《关于加强信息安全保障工作的意见》,国家信息化领导小组,2003.
  • 3SUBJECT: Critical Infrastructure Protection, Presidential Decision Directives 63, the White House Washington, USA, May 22, 1998.
  • 4National Plan for lnformation Systems Protection Version 1.0, The White House , USA, 2000.
  • 5The National Strategy to Secure Cyberspace, The White House, USA, February 2003.
  • 6Cyberspace Policy Review, The White House, USA, May, 2009.
  • 7James A. Lewis, Project Director, Cybersecurity Two Years Later, a Report of the Csis Corrmussion on Cybersecurity for the 44h Presidency, January 2011.
  • 8"Cybersecurity: Threats to Communications Networks and Private-Sector Responses" Testimony of Larry Clinton, President & CEO Intemet Security Alliance, United States House of Representatives Committee on Energy & Commerce Subcommittee on Communications and Technology, February8, 2012.
  • 9Statement of Edward Amoroso, Ph.D. Senior Vice President & Chief Security Officer AT & T, Hearing: Cybersecurity: Threats to Communications Networks and Private-Sector Responses, United States House of Representatives Committee on Energy & Commerce Subcommittee on Communications and Technology, March 7, 2012.
  • 10Risk Management Guide for Information Technology Systems(NIST 800-30), NIST, USA, 2002.

同被引文献12

引证文献4

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部