期刊文献+

双因素认证以及文件过滤的系统安全增强策略 被引量:1

Security Enhancement Strategy of Windows 10 Operating System based on Two Factor Authentication and File Filtering
下载PDF
导出
摘要 目前,绝大多数计算机操作系统是微软的Windows 10操作系统,而Windows 10操作系统不开源的特性,再结合该操作系统的个人数据与业务数据的混合存储以及其支持的应用程序的多样性,为广大用户工作生活带来方便的同时,也给计算机信息安全埋下了严重隐患。针对当前的主流操作系统Windows 10存在的安全隐患,通过对安全风险模型分析,从三个方面对系统进行安全增强:第一,双因素认证,保证了用户的合法性;第二,应用程序控制,降低了应用程序带来的风险;第三,数据传播途径控制,控制了敏感数据的外泄。试验表明,从三个方面入手进行系统安全增强,极大地提高了Win⁃dows 10操作系统的安全性,具有很强的实用性。 At present,the vast majority of computer operating systems are Microsoft's windows 10 operating system.But the win⁃dows 10 operating system is not open-source,combined with the mixed storage of personal data and business data of the operating system and the diversity of the applications it supports,it brings convenience to the work and life of the majority of users,but also lays a serious hidden danger to the computer information security.In view of the security risks existing in the current mainstream op⁃erating system Windows 10,through the analysis of the security risk model,the security of the system is enhanced from three as⁃pects:first,two factor authentication ensures the legitimacy of users;second,application control reduces the risks brought by the application process;third,the control of data transmission channels controls the leakage of sensitive data.The test shows that the system security enhancement from three aspects greatly improves the security of windows 10 operating system and has strong practi⁃cability.
作者 韩金池 丁汨 HAN Jin-chi;DING Mi(Zhengzhou Xindajie'an Information Technology Co.,Ltd,Zhengzhou450003,China;ZhengzhouShuqing Medical College,Zhengzhou 450064,China)
出处 《电脑知识与技术》 2020年第29期52-54,64,共4页 Computer Knowledge and Technology
关键词 双因素认证 安全增强 文件过滤 国产密码模块 two factor certification security enhancements file filtering domestic cipher module
  • 相关文献

参考文献4

二级参考文献33

  • 1胡朝晖.角色访问控制在分布式环境下的一种实现[J].舰船电子工程,2008,28(8):134-137. 被引量:2
  • 2Mattsson, UIfT. Key Management for Enterprise Data Encryption[J]. 2007,3.
  • 3Olaru, Stefan. Key Management in a Transparent Database Encryption Environment[J].2008,3.
  • 4Bell D E, LaPadula L J. Secure computer systems- Mathemati- cal foundations[R]. Bedford, USA: The MITRE Corporation, Tech. Rep. : ESD-TR 72 278,1973.
  • 5Rajeev Nagar. Windows NT File System Internals, A Developer's Guide[M]. USA.- O'Reilly, 1997 - 359-614.
  • 6Walter Oney. Programming the Microsoft Windows Driver Model[M] USA: O'Reilly, 1999 : 516-546.
  • 7陈尚义.透明文件加解密技术及其应用[J].信息安全与通信保密,2007,29(11):75-77. 被引量:32
  • 8Microsoft corporation. Windows 8 security improvements[EB/OL].https://techriet.microsoft.com/en-us/windows/jj983723.aspx, 2015.
  • 9Microsoft corporation. What's Changed in Security Technologies inWindows 8.1 [EB/OL].https://technet.microsoft.com/library/dn344918.aspx, 2013.
  • 10UEFI Forum. Unified Extensible Firmware Interface SpecificationVersion 2.4[EB/OL].http://www.uefi.org/sites/default/files/resources/UEFI_2.4.pdf, 2013.

共引文献12

同被引文献8

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部