期刊文献+

基于安全管理平台的脆弱性量化探讨与应用

Quantitative discussion and application of vulnerability based on security management platform
下载PDF
导出
摘要 在计算机信息安全领域,针对计算机信息系统的脆弱性量化探讨是目前的研究热点。本文通过对信息系统脆弱性的研究和信息安全风险计算分析与比较,提出了一种基于安全管理平台的脆弱性量化算法,并采用该量化算法在安全管理平台上进行应用实践。结合安全管理平台的脆弱性管理功能和白名单机制,对安全对象进行脆弱性识别后,通过脆弱性量化计算取得目标资产的漏洞和基线的度量值,并由漏洞和基线的度量值综合确定最终的资产脆弱性值。 In the field of computer information security,the quantification probe of the vulnerability of computer information system is the current research hotspot.Based on the analysis of information system vulnerability and the analysis and comparison of information security risk,this paper proposes a quantitative algorithm based on security management platform,and uses this quantization algorithm to apply practice on security management platform.Based on the vulnerability management function and the white list mechanism of the security management platform,the vulnerabilities and baseline measures of the target assets are obtained by the quantitative calculation of the vulnerability,and the vulnerability and the baseline metrics are used to determine the final asset vulnerability.
作者 邓宇珊 DENG Yushan
出处 《电信网技术》 2017年第7期62-69,共8页 Telecommunications Network Technology
关键词 安全管理平台 资产 漏洞 脆弱性 风险评估 量化 security management platform assets bug vulnerability risk assessment quantify
  • 相关文献

参考文献1

二级参考文献11

  • 1The International Organization for Standardization. Common Criteria for Information Technology Security Evaluation-Part 1:Introduction and General Model, ISO/IEC 15408-1:1999(E)[S]. 1999.
  • 2The International Organization for Standardization. Common Criteria for Information Technology Security Evaluation-Part 2:Security Function Requirements, ISO/IEC 15408-2:1999(E)[S]. 1999.
  • 3The International Organization for Standardization, Common Criteria for Information Technology Security Evaluation-Part 3:Security Assurance Requirements, ISO/IEC 15408-3: 1999(E)[S]. 1999.
  • 4BRESLAU L, ESTRIN D, FALL K. Advances in network simulation[J]. IEEE Computer, 2000, 35(5): 59-67.
  • 5候定丕,王战军.非线性评估的理论探索与应用[M]合肥:中国科学技术大学出版社,2001.
  • 6Canada. Communications Security Establishment, Canadian Trusted Computer Product Evaluation Criteria (V3.0e) [S]. 1993.
  • 7System security engineering capability maturity model (SSE-CMM) [EB/OL]. http://www.se-cat.com/download/download.shtml.
  • 8Trusted Computer System Evaluation Criteria[S]. US National Computer Security Center, NCSC 5200.28-STD, 1985.
  • 9Information Technology Security Evaluation Criteria[S]. Provisional Harmonized Criteria of France, Germany, Netherlands, and United Kingdom, Commission of the European Communities, 1991.
  • 10The International Organization for Standardization. Information Technology-Code of Practice for Information Security Management,ISO/IEC 17799: 2000(E)[S]. 2000.

共引文献54

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部