期刊文献+

信息安全漏洞全生命周期管理 被引量:4

Full life-cycle management of information security vulnerabilities
下载PDF
导出
摘要 本文以某网上营业厅重置任意用户密码漏洞为线索,详细介绍了漏洞的概念以及漏洞的整个生命周期,包括漏洞的产生、发现、公开、管理和消亡,并详细介绍了漏洞在生命周期中每个阶段的成因、形式、发现方法和具体的应对措施。 In this paper, to an online business hall reset any user password vulnerability for clue, we introduced the concept of vulnerability, and vulnerability of the entire life cycle, including the generation of vulnerability discovery, disclosure, management and demise. Meanwhile, the paper described in detail the vulnerabilities in each stage in the life cycle of the causes, forms of discovery methods and specific measures to deal with.
出处 《电信工程技术与标准化》 2012年第12期23-26,共4页 Telecom Engineering Technics and Standardization
关键词 信息安全 漏洞 生命周期 information security vulnerability life-cycle
  • 相关文献

参考文献3

  • 1M. Rozenblit.Security for Telecommunications Network Management[]..2000
  • 2C. Douligeris,D. N. Serpanos.Network security:Current Status and Future Directions[]..2007
  • 3Jacobs S.Engineering Information Security:The Application of SystemsEngineering Concepts to Achieve Information Assurance[]..2000

同被引文献5

引证文献4

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部