期刊文献+

基于弱点相关性的网络安全性分析方法 被引量:3

Method of Network Security Analysis Based on Weaknesses Correlation
下载PDF
导出
摘要 随着科技越来越发达,网络渐渐融入到人们的生活中,网络安全问题也随之而来。本文主要从网路安全现状、弱点相关性的定义两方面提出了基于弱点相关性的网络安全性的分析方法。 As the technology becomes more advanced, network is gradually integrated into people's lives, and the network security issues are coming too. This article put forward the analysis method of network security based on weaknesses correlation from the network security status quo and the definition of the weakness relationship.
作者 王炜
出处 《价值工程》 2013年第2期194-195,共2页 Value Engineering
关键词 弱点 相关性 网络安全 方法 weakness correlation network security method
  • 相关文献

参考文献3

二级参考文献26

  • 1况晓辉,朱培栋,卢锡城.移动自组网络分布式组密钥更新算法[J].软件学报,2004,15(5):757-766. 被引量:18
  • 2SCHNEIER B.Attack trees:modeling security threats[J].Dr Dobb's Journal,1999,24(12):21-29.
  • 3DAWKINS J,HALE J.A systematic approach to multi-stage network attack analysis[C]//Proc of the 2nd IEEE International Information Assurance Workshop.Washington D C:IEEE Computer Society Press,2004:48-56.
  • 4EVANS S,WALLER J.Risk-based security engineering through the eyes of the adversary[C]//Proc of the 6th IEEE Systems,Man and Cybernetics Information Assurance Workshop.New York:IEEE Computer Society Press,2005:158-165.
  • 5ISO.ISO/IEC 17799,Information technology security techniques:code of practice for information security management[S].[S.l.]:International Organization for Seandardization,2005.
  • 6STONEBURNER G,GOGUEN A,FERINGA A.Risk management guide for information technology systems[K].Gaithersburg:NIST Special Publication,2002.
  • 7BSI.BS 7799,Code of practice for information security management[S].London:British Standards Institute,1999.
  • 8SSE-CMM model description document[S].version 3.0.Pittsburgh:Carnegie Mellon University,2003.
  • 9Microsoft Corporation.The Microsoft security risk management guide v1.1[K].2004.
  • 10CRAMM v5[EB/OL].http://www.cramm.com/.

共引文献21

同被引文献6

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部