期刊文献+

未来终端安全防护的发展方向 被引量:8

Future Development Direction of Terminal Security Protection
下载PDF
导出
摘要 随着信息技术的发展,网络安全威胁和风险日益突出。终端作为信息交互、处理和存储的设备,数量众多,安全问题尤为突出。从网络准入、硬件、软件、数据、物联网终端和云终端六个层面分析终端存在的安全威胁,并从接入控制、身份认证和监控与审计三大方面提出了未来终端安全防护的发展方向和设计思路。该研究不仅适用于Windows终端、手机终端和平板终端,还适于国产化系统终端、云终端和物联网终端,只需针对系统的特点和用途利用不同的机制实现。通过设计和实现过程的事前检查、事中控制和事后分析审计,可大大降低安全事件发生的概率。 With the development of information technology,threats and risks of cyber security become increasingly serious.As a device for information interaction,processing and storage,the number of terminals is large,and the security problem is particularly prominent.The security threats of terminal are analyzed from the six aspects of network access,hardware,software,data,IoT terminal and cloud terminal.From the three aspects of access control,identity authentication,monitoring and auditing,the development direction and design ideas of terminal security protection are proposed.The research is applicable not only to Windows terminals,mobile terminals,and tablet terminals,but also to localized system terminals,cloud terminals,and IoT terminals.Only different mechanisms can be used to implement the system according to its characteristics and uses.The probability of security incidents can be greatly reduced by pre-inspection,in-process control and post-analysis auditing of the design and implementation process.
作者 王慧 王锐 胡兆华 WANG Hui;WANG Rui;HU Zhao-hua(Chengdu Westone Information Industry Co.,Ltd.,Chengdu Sichuan 610041,China;No.30 Institute of CETG,Chengdu Sichuan 610041,China)
出处 《通信技术》 2019年第2期455-459,共5页 Communications Technology
关键词 终端安全防护 身份认证 接入控制 监控与审计 物联网 terminal security protection identity authentication access control monitoring and auditing IoT(Internet of Things)
  • 相关文献

参考文献4

二级参考文献9

  • 1郭竟,张修如,欧晓光.一种Windows Services进程控制方法的探讨与实现[J].电脑与信息技术,2004,12(6):56-59. 被引量:3
  • 2李为.剖析Windows系统服务调用机制[J].电脑与电信,2006(5):31-34. 被引量:2
  • 3Tim Mather,Subra Kumaraswamy,Shahed Latif云计算安全与隐私[M].刘宝旭,等.北京:机械工业出版社,2011.
  • 4Jon Brodkin. Seven Cloud-Computing Security Risks(Gartner 2008)[EB/OL]. (2008-3-16)[2012-6-11]. http: //www. networkworld.com/news/2008/070208-cloud.html.
  • 5CSA. Top Threats to Cloud Computing V 1.0(CSA 2010)[EB/OL]. (2010-3-6)[2012-6-11 ]. http : //wenku.baidu.com/view/ db3506ea81 c758f5f61 f67e5.html.
  • 6云安全联盟.云计算关键领域安全指南V2.1(CSA2009)tEB/OLI.(2009-12-5)[2012-6-11].http://ishare.iask.sina.con.cn/f/20274061.html.
  • 7EricOgren.虚拟化安全综述[EB/OL].(2010-6-6)[2012-6-11].http://does.huihoo.com/cloud-computing/tt-virtualization-security.pdf.
  • 8Secure Hash Standard. FIPS 180-1 . 1995
  • 9张秋江,王澎.云计算的安全问题探讨[J].信息安全与通信保密,2011,9(5):94-95. 被引量:51

共引文献16

同被引文献55

引证文献8

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部