期刊文献+

几种网络互连设备的脆弱性分析 被引量:1

Vulnerability Analysis of Several Internet Connecting Devices
原文传递
导出
摘要 信息安全风险评估是信息系统安全工程的重要组成部分,也是建立信息安全保障体系的基础。本文依据信息安全风险评估的脆弱性分析要求,从设备自身的工作原理、外在因素等方面分析网络互连设备的脆弱性,着重从其工作原理分析存在的脆弱性。 Information security risk assessment is not only the most component of the information system security engineering,but also the basis to construct the information safety guarantee system.In this paper,it depends on the need of information security risk assessment and analyzes the vulnerability from the point of the principle of equipments'working,extrinsic factors and so on.She emphasizes on analyzing the vulnerability from the principle of equipments'working.
出处 《网络安全技术与应用》 2006年第10期30-31,共2页 Network Security Technology & Application
关键词 信息安全风险评估 网络互连设备 脆弱性分析 information security risk assessment internet connecting devices vulnerability analysis
  • 相关文献

参考文献3

二级参考文献13

  • 1[2]http://www.snort.org, Snort Users Manual, Snort Release 1.9.0. 2002-08-13:26
  • 2[3]Assessing Internet Security Risk. Part One: What is Risk Assessment.http://online.securityfocus.com/infocus/ 1591
  • 3United States General Accounting Office, Accounting and Information Management Division. Information Security Risk Assessment[Z]. Augest 1999.
  • 4National Institute of Standards and Technology. Special Publications 800-30, Risk Management Guide(DRAFT)[Z]. June 2001.
  • 5BUTLER S A, FISCHBECK P. Multi-Attribute Risk Assessment, Technical Report CMD-CS-01-169[R]. December 2001.
  • 6BUTLER S A. Security Attribute Evaluation Method: A Cost-Benefit Approach[Z]. Computer Science. Department, 2001.
  • 7PELTIER T R. Information Security Risk Analysis[Z]. Rothstein Associates Inc, 2001.
  • 8SHARMA R K 赵刚 译.Cisco网络安全宝典[M].北京:电子工业出版社,2002.109-130.
  • 9TOMSHO G 战晓苏 译.网络维护和故障诊断指南[M].北京:清华大学出版社,2003.280-288.
  • 10TANENBAUM S. Andrew. Computer Network[M]. 3rd ed. Prentice-Hall International, Inc, 1998.396-412.

共引文献312

同被引文献7

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部