期刊文献+

电信网安全保障能力评价模型与方法浅析 被引量:2

Research of Telecommunication Network Security Capabilities Evaluation Models and Methods
下载PDF
导出
摘要 分析了电信运营商IT支撑系统和网络亟需解决的安全问题,从建立完备的IT安全保障体系框架入手,给出了一个IT安全保障体系建设能力成熟度的模型和评价方法,以及具体实现的达标考评标准和实践方案。 This paper firstly analyzes the IT support systems of telecom operators and network security issues should be solved, starting from the establishment of a comprehensive IT security framework, given the Capability Maturity Model of the IT security system and evaluation methods, and concrete realization of the standard evaluation criteria and practices.
出处 《电信网技术》 2012年第3期36-40,共5页 Telecommunications Network Technology
关键词 CTG-MBOSS 保障体系 成熟度模型 安全基线 CTG-MBOSS security system maturity model security baseline
  • 相关文献

参考文献6

二级参考文献53

  • 1王娜,方滨兴,罗建中,刘勇.“5432战略”:国家信息安全保障体系框架研究[J].通信学报,2004,25(7):1-9. 被引量:36
  • 2张新跃,邓炜春,沈树群.策略驱动的网络安全管理模型[J].计算机应用研究,2005,22(1):226-228. 被引量:12
  • 3冯登国.国内外信息安全研究现状及发展趋势(摘编)[J].信息网络安全,2007(1):9-11. 被引量:11
  • 4IEEE STD 1472 -1995. IEEE Standard Glossary of Software Engineering Terminology[ S]. Piscataway, NJ: Institute of Electrical and Electronics Engineers, Inc,1995.
  • 5Bell David E, La Padula Leonard J. Secure Computer Systems : A Mathematical Model [ R ]. ESD - TR - 73 - 278,1973.
  • 6Biba K J. Integrity Considerations for Secure Computer Systems[ R]. ESD - TR - 76 - 372,1977.
  • 7Information Processing Systems -OSI RM. ISO/TC97 7498 -2. Part 2: Security Architecture[ S]. Geneva: International Organization for Standardization, 1989.
  • 8This Version April. DoD Technical Architecture Framework for Information Management, Volume 6 : DoD Goal Security Architecture, Defense Information Systems Agency Center for Standards [ EB/OL]. ( 1996 - 4 - 30) [ 2009 - 12 - 22 ]. http ://www. dmff. org/pres/index. html.
  • 9Fine T, Minear S E, Hills Arden. Assuring Distributed Trusted Mach [ C ]//Proceeding of the 1993 Symposium on Security and Privacy. Washinton DC : IEEE Computer Society, 1993:206 - 218.
  • 10Spencer Ray, Smalley Stephen, Loscocco Peter, et al. The Flask Security Architecture : System Support for Diverse Security Policies[ C]//Proceedings of the 8th USENIX Security Symposium. Berkeley, CA:USENTX Association, 1999:123 -139.

共引文献53

同被引文献16

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部