期刊文献+

基于家庭互联网系统的安全威胁分析及研究 被引量:3

Analysis and Research on Security Threats Based on Home Internet System
下载PDF
导出
摘要 近年来,家庭互联网系统加速了在现代社会中的普及,越来越多的智能终端设备接入到家庭互联网中。然而,家庭互联网在普及的同时,也面临着许多安全挑战。本文对家庭互联网系统中各部分(智能终端、通信网络、APP和云端)存在的安全威胁进行了分析与研究,以帮助相关安全管理人员提升家庭互联网系统中的安全防护能力。 Home Internet has accelerated its popularity in modem society in recent years. More and more intel- ligent devices are connected into the network. However, Home Internet also brings some security challenges. This paper analyzes security threats that exists in the terminal system, the communication network, APP or the cloud in the Home Internet system to help related security personnel improve security defense mechanism in the Home Internet system.
出处 《软件》 2017年第5期117-120,共4页 Software
关键词 家庭互联网 安全威胁 安全防护 Home internet Security threats Security defense
  • 相关文献

参考文献9

二级参考文献38

  • 1范伟.云计算及其安全问题探讨[J].保密科学技术,2011(10):56-59. 被引量:3
  • 2Harald Sundmaeker, Patrick Guillemin, Peter Friess, Sylvie Woelffl 6. Vision and Challenges for Realizing the Internet of Things. European Commission - Information Society and Media, March 2010:11-23.
  • 3INFSO D.4 NETWORKED ENTERPRISE & RFID INFSO G.2 MICRO & NANOSYSTEMS in co- operation with the WORKING GROUP RFID OF THE ETP EPOSS. Internet of Things in 2020-ROADMAP FOR THE FUTURE. European Commission- Information Society and Media, Version 1.1-27 May 2008:4-9.
  • 4Berinato, Scott. Software Vulnerability Disclosure: The Chilling Effect. CSO ( CXO Media ) . January 1, 2007 : ( 7 ) .
  • 5About 2-step verification, https: //support.google.com/acc ounts/answer/180744?hl=en&rd= I[EB/OL], 2011.
  • 6Jeremiah Grossman, Robert Hansen, Petko D Petkov, et al. Cross site scripting attacks: XSS exploits and defense[M]. Burlington: Syngress, 2007.
  • 7Aayush Gupta, Youngiae Kim. Blueprint : robust prevention of crosssite scripting attacks for existing browsers[C]. Security and Privacy, 2009 30th IEEE Symposium, Berkely, CA, Aug 2009: 331-346.
  • 8Gary Wassermann, Su Zhen-dong. Static detection of cross-site scripting vulnerabilities[C]. Matthew B Dwyer. Proceedings of the 30th International Conference on Software Engineering, Leipzig, Germany, 2008: 71-180.
  • 9Mosin Hasan, Nilesh Prajapati, Safvan Vohara. Case Study On Social Engineering Techniques for Peisuasion[DB/LP]. International Journal on Applica6ons of Graph Theory in Wireless ad hoc Networks and Sensor Networks, June 2010: ( 18 ) .
  • 10Dan Goodin. Yahoo Mail reportedly loses key customer following mass hack attack[EB/OL], http: //arstechnica.com/ security/2013/05/yahoo-mail-reportedly-loses-key-customer -following-mass-hack-attack/, 2013-06.

共引文献37

同被引文献16

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部