3S. KIM, H. PARK and Y KIM. The load monitoring of Web se~'er using mobile agent[C]. InFo-tech and lnfb-net.Proceedings. ICII. Beijing China, 2001,130 - 135.
6NIST. Special Publications [EB/OL]. [2011-05-10]. http: //csrc. nist. gov.
7ISO/IEC27004. Information technology-security techniques-Information security management measurements [S]. 2011-01-07.
8LIU Fonghao, Lee Wei Tsong. Constructing enterprise infor- mation network security risk management mechanism by ontology [J]. Tamkang Journal of Science and Engineering, 2010, 13 (1): 79-87.
9Premaratne U, Samarabandu J, Beresh B, et al. Application of security metrics in auditing computer network security= A case study [C]//Proceedings of ICIAFS08, 2008: 200-205.
10Hagen J M, Albrechtsen E, Hovden J. Implementation and effectiveness of organizational information security measures [J]. Information Management and Computer Security, 2008, 16 (4) : 377-397.