期刊文献+

浅析信息安全与网络安全 被引量:1

Analyses the Information Security and Network Security
下载PDF
导出
摘要 当今社会步入互联网信息时代,对于各种信息搜索更加的迅速敏锐,群众在享受科技带来的便利的同时,也受到了信息安全的挑战,网络虚拟空间的操作为机关、企事业单位信息安全也带来了极大的挑战。因此,针对信息安全与网络安全进行具体分析,通过网络和信息安全教育,实现网络和信息安全的维护,针对网络和信息风险管理进行有效地管理,防范风险的出现。 As today's society is walking into the information age,all kinds of science and technology are updated quickly.All kinds of information search became more quickly.As people are enjoying the benefit from the massive construction of science and technology,people also received the challenge of information security.The operation of the network in the virtual space for public sector,enterprises and institutions also poses a great challenge in the information security.Therefore,a specific analysis of information security and network security is carried out,and it is hoped that through the discussion,the awareness of network and information security management in various organizations such as the information management department of public sectors,enterprises and institutions can be strengthened,and network and information security education can be carried out to achieve better network and information security.Then target on effective management of network and information risk management to prevent the emergence of risks.
作者 艾青 AI Qing(Zhaotong City in Yunnan Province Economic Information Center,Zhaotong 657000,China)
出处 《中国有线电视》 2022年第1期36-38,共3页 China Digital Cable TV
关键词 信息安全 网络安全 风险管理 information security network security risk management
  • 相关文献

参考文献3

二级参考文献11

  • 1罗刚,王振东.网络爬虫[M].北京:清华大学出版社,2010.
  • 2冯登国,孙阳,孙锐+信息安全体系结构[M].北京:清华大学出版社.2008.
  • 3曾庆凯,徐峰,张有东信息安全体系结构[M].北京:电子工业出版社.2010.
  • 4屈延文等.中国信息安全产业发展白皮书(2005-2010)[M].北京:中国信息产业商会信息安全产业分会,2011.
  • 5谢宗晓,郭立生.信息安全管理体系应用手册--ISO\IEC27001标准解读及应用模板[M].北京:中国标准出版社,2008.
  • 6The White House. National Security Strategy of the United States of America[EB/OL].http://www.whitehouse.gov/sites/default/files/rss_viewer/national_security_strategy.pdf,2010.
  • 7Wolfgang Gruener. U.S.Internet Penetration Hits 82%[EB/OL].http://www.tomshardware.com/news/internet-service-isp,5360.html,2005.
  • 8Brian Krebs. A Short History of Computer Viruses and Attacks[OL].http://www.washingtonpost.com/ac2/wp-dyn/A50636-2002Jun26? language =printer,.
  • 9Stephen W.Korns. Cyber Operations:The New Balance[J].Joint Force Quarterly,2009,(54):99.
  • 10Elizabeth Montalbano. Federal Cyber Attacks Rose 39% in 2010[J/OL].http://www.informationweek.com/news/government/security/229400156,2011.

共引文献36

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部