期刊文献+

纵深防御策略在防范信息泄漏中的运用

Usage of Defense in Depth Strategy to Prevent the Information Leakage
下载PDF
导出
摘要 防范信息泄漏是当前信息化建设中必须积极面对的一个重大课题。文章介绍了信息泄漏的因素和渠道、纵深防御策略相关知识,分析了纵深防御策略在防范信息泄漏中的应用,对信息泄漏防范技术的发展趋势进行了预测。 Information leakage prevention is a great subject that we have to deal with positively in the process of informationization. The article introduces why and how the pens and the relevant knowledge of defense in depth strategy, analyzes the strategy to prevent the information leakage, and predicts the developing leakage prevention technology
机构地区 北京
出处 《电子对抗》 2013年第4期14-17,49,共5页 Electronic Warfare
关键词 纵深防御 策略 防范 信息泄漏 defense in depth strategy prevention information leakage information leakage hap- usage of defense in depth orientation of information
  • 相关文献

参考文献5

  • 1Percept Technology Labs, Inc. 2006 Information Leak Pre- vemion Accuracy and Security Tests. http://www, websense. conr/docs/whitepapers/wpOl06 - 0506_ perceptlabs, pdf. 2006 - 04 - 01/2012 - 10 - 01.
  • 2P. Rubel, C. Payne, M. Ihde, S. Harp, and M.Atighetchi. Generating Policies for Defense in Depth J J. IAnewsletter,2006,9(3).
  • 3B. K. Ashley, L. Jackson. Defense in Depth[J] .IAnewslet- ter, 1999,3(2).
  • 4R. Layland. Data Leak Prevention: Coming Soon to a Busi- ness Near You [ J ]. Business Communications Review, May 2007 : 44 - 49.
  • 5张洪欣,吕英华.电磁信息泄漏技术及其发展[J].安全与电磁兼容,2004(6):39-43. 被引量:16

二级参考文献12

  • 1余祖荣.TEMPEST技术国内外发展概况[J].计算机与信息处理标准化,1996(3):52-56. 被引量:2
  • 2[1]Berke Durak. Hidden data transmission by controlling electromagnetic emanations of computers [EB/OL]. http://altern.org/berke/tempest/, 2000
  • 3[2]Markus G. Kuhn and Ross J. Anderson. Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations [A]. in David Aucsmith(ED), Information Hidding, second International Workshop [C] , USA: Portland, Oregon, 15-17, April, 1998.LNCS 1525, 124-142
  • 4[3]Highland H. J. TEMPEST over Leaking Computers [J]. Computers & Security, 1988, 13 (7): 457-458
  • 5[4]ZHANG Hongxin, Lu Yinghua. A Study on the Recognizability of Electromagnetic Leakage Information from Computer [A]. The third ASIA-PACIFIC conference on environmental electromagnetics[C], Hangzhou: 2003, 11. 65-68
  • 6[5]ZHANG Hongxin, Lu Yinghua. The Research on Video Signal Electromagnetic Radiation of Computer Based on Near-Field Testing Data [A]. The third ASIA-PACIFIC conference on environmental electromagnetics[C], Hangzhou :2003, 11. 69-72
  • 7[15]Smulders P. The Threat of Information Theft by Reception of Electromagnetic Radiation form RS-232 Cables [J]. Computers & Security, 1990, vol. 9:53-58
  • 8[16]ZHANG Hongxin, Lu Yinghua. The Study on the Recognizability of Electromagnetic Leakage Information arising from Computer [J].The Journal of China universities of Posts and Telecommunications. 2004, 11(3)
  • 9[17]Eck van. W. Electromagnetic Radiation form Video Display Units:An Eavesdropping Risk?[J]. Computers & Security, 1985, vol.4 :269-286
  • 10[18]Ross J. Anderson and Markus G. Kuhn. Soft Tempest-An Opportunity for NATO [EB/OL]. http://www.cl.cam.ac.uk, 2001

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部