期刊文献+

安全等级对信息系统安全技术策略的影响研究——以防火墙和IDS技术组合为例 被引量:4

原文传递
导出
摘要 本文以服务器防火墙和IDS的技术组成为例,运用悖论科学地研究信息系统安全级别对安全技术组成和设备对策的危害。发现安全级别越高,网络黑客的威慑力就越大,这可以降低黑客的入侵率。本文重点讨论的是关于安全级别对信息系统安全技术对策危害的科学研究,供相关读者参考。
作者 李荣健
出处 《网络安全技术与应用》 2021年第9期8-10,共3页 Network Security Technology & Application
  • 相关文献

参考文献4

二级参考文献31

  • 1Tanaka H, Matsuura K, Sudoh O. Vulnerability and information security investment: An empirical analysis of e-local government in Japan [J]. Journal of Accounting and Public Policy, 2005, 24 ( 1 ) : 37- 59.
  • 2Gupta M. Matching information security vulnerabilities to organizational security profiles: A genetic algorithm approach [J]. Decision Support Systems, 2006, 41(3) : 592-603.
  • 3Cavusoglu H, Cavusoglu H, Zhang J. Security patch management: Share the burden or share the damage? [J]. Management Science, 2008, 54(4): 657-670.
  • 4Cavusoglu H, Raghunathan S, Cavusoglu H. Configuration of and interaction between information security technologies., the case of firewalls and intrusion detection systems [J]. Information Systems Research, 2009, 20(2): 198-217.
  • 5XIA Zheng-you, ZHANG Shi-yong. A kind of network security behavior model based on game theory [C] // Parallel and Distributed Computing, Applications and Technologies, PDCAT 2003 Proceedings. Los Alamitos : IEEE Computer Society, 2003:950-954.
  • 6Cavusoglu C, Mishra B, Raghunathan S. The value of intrusion detection systems in information technology security architecture [J]. Information Systems Research, 2005, 16(1):28-46.
  • 7Yue W T, Cakanyildirim M. Intrusion prevention in information systems: Reactive and proactive responses [J]. Journal of Management Information Systems, 2007, 24(1):329-353.
  • 8Ogut H, Cavusoglu H, Raghunathan S. Intrusion- detection policies for IT security breaches [J]. INFORMS Journal on Computing, 2008, 20(1) : 112- 123.
  • 9August T, Tunca T I. Network software security and user incentives [J]. Management Science, 2006, 52(11) : 1703-1720.
  • 10Rubel P, Ihde M, Harp S, et al. Generating policies for defense in depth [C] // Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005. Los Alamitos: IEEE Computer Society, 2005 : 505-514.

共引文献23

同被引文献22

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部