期刊文献+

浅谈企业网络安全性评价分析

Discussion on the Evaluation and Analysis of Enterprise Network Security
下载PDF
导出
摘要 随着企业内外信息化应用的越来越普及和深入,单位部门的网络拓扑结构日益复杂和巨大,因而网络中的数据日常管理维护以及网络运行安全保障等各个方面的问题也日趋增多。文章对某企业单位的网络规划建设进行解读,特别是实际运用中发生的安全性问题,通过安全访问控制等手段,对企业单位的网络组建提供可行、高效的规划,同时针对企业网络建设中安全方面的隐患,提出了有效预案措施,并对企业网络的安全性评价现况进行了阐述,旨在为企业网络安全性评价工作提供可靠的理论依据。 With the application of information inside and outside of the corporate sector getting more and more wide and deeper,departments and units of the network topology is becoming more and more complex and huge,and network in the daily data management and maintenance and safe operation of the network security from various aspects of the problems are becoming more and more common.This paper elaborates on a business unit network planning and construction of interpretation,especially in practical application,by means of security access control,to form a network of business units provide the feasible and efficient planning,at the same time for the construction of enterprise network security hidden danger.It proposes effective measures,and has made elaboration of the enterprise network safety evaluation of the status of,and aims to provide a reliable theoretical basis for enterprise network security evaluation.
作者 王晟 黄凌震 Wang Sheng Huang Lingzhen(The 28th Institute of China Electronics Technology Group Corporation, Nanjing 210007, China)
出处 《信息化研究》 2016年第4期46-50,共5页 INFORMATIZATION RESEARCH
关键词 体系结构 网络安全性 评价分析 architecture network security evaluation and analysis
  • 相关文献

参考文献3

二级参考文献86

  • 1陈火旺,王戟,董威.高可信软件工程技术[J].电子学报,2003,31(z1):1933-1938. 被引量:115
  • 2姚文斌,李炯亮,汪东升,郑纬民.相异性容错软件故障模型[J].清华大学学报(自然科学版),2005,45(4):458-462. 被引量:8
  • 3覃志东,雷航,桑楠,熊光泽.连续执行软件可靠性验证测试方法[J].计算机科学,2005,32(6):202-205. 被引量:9
  • 4王涛,郭荷清,姚松涛.基于综合安全保护质量的安全服务协商模型[J].计算机工程与科学,2006,28(4):26-29. 被引量:1
  • 5Howard M,Pincus J,Wing J M.Measuring relative attack surfaces[C]//Proc,of Workshop on Advanced Developments in Software and Systems Security.Taipei,2003.
  • 6Manadhata P,Wing J M.Measuring a system's attack surface[R].CMU-CS-04-102.Computer Science Department of Camegie Mellon University,2004.
  • 7Manadhata P,Wing J M.An attack surface metric[R].CMUCS-05-155.Computer Science Department of Carnegie Mellon University,2005.
  • 8Manadhata P,Wing J,Flynn M,et al.Measuring the attack surfaces of two FTP daemons[C]//Proceedings of the 2nd ACM Φorkahop on Quality of Protection.Alexandria VA,USA,2006.
  • 9Manadhata P,Kaynar D K,Wing J M.A formal model for a system's attack surface[R].CMU-CS-07-144.Computer Science Department of Carnegie Mellon University,2007.
  • 10Mirkovic J,Reiher P,Fahmy S,et al.Measuring Denial of Service[C]//Proceedings of the 2nd ACM Workshop on Quality of Protection.Alexandria VA,USA,2006.

共引文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部