期刊文献+

典型发达国家信息安全培训教育评析及启示

Analysis and Enlightenment of Information Security Training and Education in Typical Developed Countries
下载PDF
导出
摘要 [研究目的]在科学技术突飞猛进的今天,窃密与反窃密之争从根本上讲的是技术之争,核心更是人才之争。为了应对日益严峻的信息安全形势,梳理总结典型发达国家的信息安全培训现状,可以为我国信息安全培训工作提供经验借鉴,提升我国信息安全管理水平。[研究方法]采用文献调研、资料总结等方法,从培训法规制度、培训管理机构、培训方法等方面总结了美国、日本、英国等典型发达国家的信息安全培训教育的特点和经验。[研究结论]通过对国外典型发达国家先进经验的学习,从立法完善、技术发展、多方合作、体系建设等方面,为我国信息安全培训工作的开展提供对策建议。 [Research purpose] Today, with the rapid development of science and technology, the dispute between secret stealing and anti-secret stealing is fundamentally a dispute of technology, and the core is a dispute of talents. In order to deal with the increasingly severe information security situation, combing and summarizing the current situation of information security training in typical developed countries can provide experience for China’s information security training and improve the level of information security management in China. [Research method] Using the methods of literature research and data summary, this paper summarizes the characteristics and experience of information security training and education in the United States, Japan and Britain from the aspects of training laws and regulations, training management institutions and training methods. [Research conclusion] Through the study of the advanced experience of foreign typical developed countries, the paper provides countermeasures and suggestions for the development of information security training in China from the aspects of legislative perfection, technical development, multi-party cooperation and system construction.
作者 李庚 张爽 Li Geng;Zhang Shuang(College of Management and Economics,Tianjin University,Tianjin 300072)
出处 《情报杂志》 CSSCI 北大核心 2022年第11期71-77,61,共8页 Journal of Intelligence
关键词 信息安全 教育培训 典型发达国家 培训体系结构 培训方法 information security education and training typical developed countries training system architecture contrast analysis training method
  • 相关文献

参考文献13

二级参考文献61

  • 1高雨彤.日本采取行动应对复杂的网络威胁[J].保密科学技术,2012(11):71-72. 被引量:1
  • 2王鹏飞.论日本信息安全战略的“保障型”[J].东北亚论坛,2007,16(2):95-99. 被引量:5
  • 3US Joint Chief of Staff, Joint Publication 3-13 Information Opera- tions [ R] ,2006.
  • 4US Department of Defense, DoD Directive 8500.02 Information Assurance (IA) Implementation [ R] ,2003.
  • 5US Department of Defense, DoD 5200.1 - R Information Security Program[ R], 1997.
  • 6US Army Intelligence Center, Computer Security Program [ M ] , US : The Army Institute of Professional Development, 1998.
  • 7US Joint Chief of Staff, CJCSM 6510.01 Information Assurance (IA) And Computer Network Defense (CND) [ R] ,2005.
  • 8US Department of Defense, DoD Directive 8570.01 ga "Information Assurance Training, Certification, and Workforce Management" JR] ,2007.
  • 9Naval Postgraduate School. The center for information sys- terns security studies and research, "CyberCIEGE Scenario Development Tool User's Guide" [EB/OL]. [2010-04-17]. http://cisr, nps, edu/cyberciege/downloads/sdt, pdf.
  • 10Irvine C E, Thompson M F. Expressing an information secu rity policy within a security simulation game[C]//Proc of WECS6, 2004:43-49.

共引文献53

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部