期刊文献+

测控网安全防护体系研究 被引量:4

A Study on the Security Architecture of TT&C Networks
下载PDF
导出
摘要 从多个角度分析了测控网面临的安全威胁,研究了ESA(欧空局)和NASA(美国国家航空航天局)安全标准体系、安全技术应用和安全管理,总结了国外安全防护体系建设在顶层设计、制度建设、安全训练、威胁感知等方面的特点。基于我国测控网的特点,研究了边界安全、数据安全、终端安全以及备份与恢复等层面安全技术的部署,提出一个基于安全域划分的安全防护技术框架,其中各安全域可根据任务需要进行裁剪或扩展,具有一定灵活性。同时,在综合考虑规章制度、安全训练、安全技术以及安全审计与咨询等多种因素基础上,提出一个安全管理模型,该模型提供了安全管理与安全技术紧密结合的方法。 Security threats facing TT&C (Tracking, Telemetry and Command) networks are analyzed from different perspectives. Following study of the security standards architecture, application of security technologies and security management of ESA (European Space Agency) and NASA (National Aeronautics and Space Administration), the paper summarizes the features of development of security protection systems of foreign space agencies in top level design, regulations, security training, awareness to threats, etc. Based on the characteristics of China's TT&C networks and considerations for deployment of security technologies in terms of edge security, data security, terminal security and backup and recovery, a security protection technology framework based on security domain division is proposed. A certain degree of flexibility is provided by tailoring or extension of each security domain according to mission requirements. Meanwhile, a security management model is proposed based on comprehensive consideration for rules and regulations, security training, security technologies, security audits, consulting, etc. and the model facilitates an approach for close combination of security management and security technologies.
出处 《飞行器测控学报》 CSCD 2013年第4期294-301,共8页 Journal of Spacecraft TT&C Technology
关键词 测控网 安全标准 安全体系 安全管理 Tracking, Telemetry and Command (TT&C) networks security standards security architecture secu- rity management
  • 相关文献

参考文献18

  • 1王朋.中国航天测控网[J].太空探索,2006(8):36-41. 被引量:2
  • 2白云,张凤鸣,黄浩,孙璐.信息系统安全体系结构发展研究[J].空军工程大学学报(自然科学版),2010,11(5):75-80. 被引量:13
  • 3徐会忠.测控信息网组网技术探讨[J].电讯技术,2007,47(3):4-8. 被引量:2
  • 4Ivancic W D.Architecture study of space-based satellite net-works for NASA missions[Z/OL](2003-08-15)[2012*08-10],http://gltrs.grc.nasa.gov.
  • 5Bhasin K,Hayden J L.Evolutionary space communicationsarchitectures for Human/Robotic exploration and science mis-sions[C]// AIP Conference Proceedings.Albuquerque,NewMexico,2004,699:893-904.
  • 6Bhasin K,Hayden J L.Space internet architectures and tech-nologies for NASA enterprises[C] // IEEE Proceedings ofAerospace Conference,2001:931-941.
  • 7ESA Council.Regulations of the European space agency:se-curity regulations[Z/OL](2012-01-18)[2013-01-02].ht-tp:// download,esa.int/docs/eso/esa-reg-004e.pdf.
  • 8US Office of Management and Budget.Fiscal year 2011 re-port to congress on the implementation of the federal informa-tion security management act of 2002[R/OL](2012-03-07)[2012-08-12].http:// www.whitehouse.gov/sites/default/files/omb/assets/egov_docs/fy 1 l」isma.pdf.
  • 9NIST.Guide for applying the risk management framework tofederal information systems:a security life cycle approach,SP800-37 [R/OL](2009-12-01)[2012-10-11].http://cs-rc.nist.gov/ publications/nistpubs/800-37-revl/sp800-37-revl-final.pdf.
  • 10NASA Office of Audits.Inadequate security practices exposekey NASA network to cyber attack,IG-11-017 [R/OL](2011-03-28)[2012-09-11].http:// oig.nasa.gov/audits/re-ports/FYll/IG-11-017.pdf.

二级参考文献18

  • 1王娜,方滨兴,罗建中,刘勇.“5432战略”:国家信息安全保障体系框架研究[J].通信学报,2004,25(7):1-9. 被引量:36
  • 2冯登国.国内外信息安全研究现状及发展趋势(摘编)[J].信息网络安全,2007(1):9-11. 被引量:11
  • 3IEEE STD 1472 -1995. IEEE Standard Glossary of Software Engineering Terminology[ S]. Piscataway, NJ: Institute of Electrical and Electronics Engineers, Inc,1995.
  • 4Bell David E, La Padula Leonard J. Secure Computer Systems : A Mathematical Model [ R ]. ESD - TR - 73 - 278,1973.
  • 5Biba K J. Integrity Considerations for Secure Computer Systems[ R]. ESD - TR - 76 - 372,1977.
  • 6Information Processing Systems -OSI RM. ISO/TC97 7498 -2. Part 2: Security Architecture[ S]. Geneva: International Organization for Standardization, 1989.
  • 7This Version April. DoD Technical Architecture Framework for Information Management, Volume 6 : DoD Goal Security Architecture, Defense Information Systems Agency Center for Standards [ EB/OL]. ( 1996 - 4 - 30) [ 2009 - 12 - 22 ]. http ://www. dmff. org/pres/index. html.
  • 8Fine T, Minear S E, Hills Arden. Assuring Distributed Trusted Mach [ C ]//Proceeding of the 1993 Symposium on Security and Privacy. Washinton DC : IEEE Computer Society, 1993:206 - 218.
  • 9Spencer Ray, Smalley Stephen, Loscocco Peter, et al. The Flask Security Architecture : System Support for Diverse Security Policies[ C]//Proceedings of the 8th USENIX Security Symposium. Berkeley, CA:USENTX Association, 1999:123 -139.
  • 10Bender Dan, Moore Reaqan, Marciano Richard, et al. Intelligent Metacomputing Tested ( Distributed Object Computation Tested (DOCT)) [ EB/OL]. (1997 -01 -08 ). http.//handle. dtic. rail/100. 2/ADA324199.

共引文献14

同被引文献39

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部