期刊文献+

攻防演练中网络安全监测研究 被引量:4

Research on Network Security Monitoring in Attack and Defense Drill
下载PDF
导出
摘要 随着大数据、物联网、云计算等新技术的崛起,传统和新型网络安全威胁已经成为企业网络安全面临的全新挑战.企业在进行网络安全建设的同时也需要一定的技术手段和方法对企业的网络安全防护能力进行检验.目前,网络攻防演练是企业在真实环境中检验自身网络安全防护能力的主要方式.而在攻防演练中,网络安全监测工作又是防守方工作的重点.主要从攻防演练中网络安全监测的作用、网络安全监测工作开展和网络安全监测工作面临的挑战3个方面,系统地阐述网络安全监测工作在整个攻防演练中的工作方法和重点难点,并结合作者实际工作经验,提出解决办法.以期帮助企业更好地在攻防演练中开展网络安全监测工作,提高企业网络安全防护水平和网络安全运营水平. With the rise of new technologies such as big data,Internet of things and cloud computing,traditional and new cyber security threats have become a new challenge to enterprise cyber security.Enterprises need certain technical means and methods to test the ability of enterprise network security protection while building the construction of network security.At present,the network attack and defense drill is the main way for enterprises to test their own network security protection ability in the real environment.In the attack and defense drill,the network security monitoring is the focus of the defense.Mainly from three aspects,such as the role of the offensive and defensive drills in network security monitoring,offensive and defensive drills in network security monitoring and network security monitoring work challenges,this article systematically elaborates the work methods,key points and difficulties of network security monitoring work in the offensive and defensive drills.Combining with the working experience,the author puts forward the specific solution to help enterprises to better carry out network security monitoring in the offensive and defense drill and improve the level of enterprise network security protection and network security operation level.
作者 李东 蔡良飞 Li Dong;Cai Liangfei(Network Security Laboratory,Computer Application Institute of Nuclear Industry,Beijing 100048;Huahui Information Technology Co.,LTD,Beijing 100048)
出处 《信息安全研究》 2021年第7期669-673,共5页 Journal of Information Security Research
关键词 信息技术 网络安全 攻防演练 安全监测 网络空间安全 information technology network security attack and defense drill safety monitoring cyber security
  • 相关文献

参考文献8

二级参考文献23

共引文献46

同被引文献20

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部