期刊文献+

分层模型在中国信息安全等级保护体系中的借鉴应用

The referential application of hierarchical model in the national classified protection systems
下载PDF
导出
摘要 多层的风险管理模型,能促进整合整个组织的风险管理流程,更有效地处理组织使命和业务流程.对中国信息安全等级保护而言,如何实现从国家到地方整个体系的有机联动,如何更好地实现体系中安全保护的持续改善,以及进一步落实等级保护中各个环节的职能分工,该模型都有较好的借鉴意义. The hierarchical risk management model can promote the integration of the risk management process and more effectively deal with the mission of the organization and the operation flow. In terms of China' s national classified protection information security ( short for classified protection) , this model sheds light on how to effectively link local and national systems, continuously improve the protection within the systems and further implement functional division of different parts in the classified protection.
出处 《重庆文理学院学报(社会科学版)》 2014年第2期87-91,共5页 Journal of Chongqing University of Arts and Sciences(Social Sciences Edition)
基金 国家自然科学基金资助项目(90718009) 贵州省科学技术基金项目(黔科合J字[2011]2205号 黔科合J字[2012]2185号) 永川区自然科学基金(重点)项目(YCSTC2013NB8001) 重庆市教委科学技术研究项目(KJ121219)
关键词 信息安全 等级保护 分层 风险管理 information security classified protection hierarchical risk management
  • 相关文献

参考文献1

二级参考文献19

  • 1陆余良,夏阳.主机安全量化融合模型研究[J].计算机学报,2005,28(5):914-920. 被引量:28
  • 2GB/T22239-2008.信息系统安全等级保护基本要求[S].2008.
  • 3GB/T22240-2008,信息系统安全等级保护定级指南[S].
  • 4ISO/IEC 15408-1: 2009, Information Technology - Security Techniques - Evaluation Criteria for IT Security [S].
  • 5ISO/IEC 27001: 2005, Information Technology Security Techniques Information Security Management Systems Requirements [S].
  • 6ISO/IEC 27002: 2005, Information Technology - Security Techniques - Code of Practice for Information Security Management [S].
  • 7Wang L, Singhal A, Jajodia S. Toward measuring network security using attack graphs [ C ]// Proceedings of the 2nd ACM Workshop on Quality of Protection. New York:ACM, 2007.
  • 8Manadhata P K, Tan K M, Maxion R A, et al. An approach to measuring a system's attack surface [R]. Pittsburgh, USA: Carnegie Mellon University, 2007 : CMU-CS-07-146.
  • 9Manadhata P, Wing J, Flynn M, et al. Measuring the attack surfaces of two FTP daemons [ C ]// Proceedings of the 2nd ACM Workshop on Quality of Protection. New York:ACM, 2006.
  • 10Mirkovic J, Reiher P, Fahrny S, et al. Measuring denial of service [C]// Proceedings of the 2nd ACM Workshop on Quality of Protection. New York: ACM, 2006.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部