期刊文献+

基于ITIL的安全管理平台流程响应机制设计 被引量:2

Design on Response mechanism of Security Operations Center based on ITIL
下载PDF
导出
摘要 随着信息系统的发展,业务运转对信息系统的依赖性越来越强,安全管理的成败直接关系到业务的正常运转。安全运维作为安全管理的重要组成范畴,在传统安全管理系统建设中却并未得到足够的重视。通过对IT服务管理知识框架ITIL进行分析和研究,建立起以告警、预警、工单为核心流程的新型响应处理机制,提高了安全管理的水平和安全运维的效率。从业务和运维的角度对安全管理的响应流程进行重构,推动新型安全管理平台的设计和开发工作。 With the development of information systems, the business of the companies and organizations rely on them increasingly. The threats of the information system may lead to failure of the business. Security maintenance is an important component of the security operations center. However it didn' t take enough attention in traditional Security Operations Center. With the research on ITIL, a new type of processes handling mechanism is established which the core processes responses are alarm, warning and work orders mproves the level of safety management' s and the efficiency of sec to reconstruct safety management process and promote the design and urlty devek maintenance. The thought of business and maintenance pment of new s Security Operations Center.
出处 《计算机安全》 2013年第3期36-40,共5页 Network & Computer Security
基金 山东省自然科学基金项目(ZR2009GM009)资助
关键词 安全运维 信息技术基础结构库(ITIL) 响应处理机制 Security maintenance, information technology infrastructure library (ITIL), processes handling mechanism And it s used
  • 相关文献

参考文献7

二级参考文献18

  • 1孙强,李长征.整合COBIT、ITIL、ISO/IEC17799和PRINCE2构建善治的IT治理机制[EB/OL].赛迪培训,http://www.ccidtraining.Com,1999.
  • 2左天祖,刘伟.ITIL白皮书[M/OL].北京:北京大学出版社,2004-03.http://club.amteam.org/upload-file/83/839796_75149.PDF.
  • 3Rudd C.An introductory overview of ITIL[S/OL].[2004-04].http://www.itsmf.com/bestpractice/publications.asp.
  • 4BSI,BS 7799-1:Information security management-part 1:code of Practice for information security management,BSI[S/OL].http://asia.bsi-global.com/China +InformationSecurity/Overview/WhatisBS7799.xalter.
  • 5BSI,BS7799-2:Information security management-part 2:Specification for information security management systems,BSI[S/OL].http://asia.bsi-global.com/China+InformationSecurity/Overview/WhatisBS7799.xaher.
  • 6NIST.NIST SP800-12 An introduction to computer seeuritv:the NIST handbook[S/OL].[1996-21].http://csrc.nist.gov/publications/nistpubs//800-12/handbook.pdf.
  • 7Swanson M,Hash J,Bowen P/NIST SP800-18 Guide for Developing Security Plans for Federal Information Systems[S/OL].[2006-04].http://csrc.nist.gov/publications/nistpubs/800-18-Revl/sp800-18-Rev1-final.pdf.
  • 8Swanson M,Wohl A,Pope L.et al.NIST SP800-34.Contingency planning guide for information technology systems[S/OL].[2002-06].http://csrc.nist.gov/publieations/nistpubs/800-34/sp800-34.pdf.
  • 9ca公司.eTrust TM Security Management[EB/OL].http://www3.ca.com/solutions/Solution.aspx?ID=271.
  • 10Paul Overbeek.ITIL SECURITY MANAGEMENT Security as a managed service[EB/OE].[2004-06].http://www.spiral.lu/SI/Event.nsf/0/c0eba09d9cb8a870c1256eba002b6f49/$FILE/08_Overbeek_Sec-Man_Lux_Jun04.pdf.

共引文献26

同被引文献6

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部