摘要
5G作为"网络的网络",成为万物互联的纽带和融合创新的驱动力,利用面向服务的架构和开放的服务能力,为多类型用户提供全方位的优质服务。5G 网络特点和业务属性决定了其安全的重要性,而网络安全威胁建模是面对复杂网络进行网络安全最佳实践的起点和重要的一环。文章首先介绍业界成熟的威胁建模方法;然后介绍威胁建模方法论的6大阶段;最后重点阐述5G威胁建模的过程和关键输出结果的样例。
As a"network of networks",5G has become the link of the IoT and the driving force for integration and innovation.It uses service-based architecture and open service capabilities to provide a full range of quality services for various types of users and industries.5G network characteristics and business attributes determine the importance of its security.Threat modeling is the starting point and very important part of cyber security best practices in the face of complex cyberspace.This article first introduces the industry's mature threat modeling methods,then introduces the six major stages of the threat modeling methodology,and finally focuses on the 5G threat modeling process and examples of key output results.
作者
毕亲波
赵呈东
BI Qinbo;ZHAO Chengdong(Beijing Venustech Information Security Technology Co.LTD,Beijing 100093,China)
出处
《信息网络安全》
CSCD
北大核心
2020年第9期72-76,共5页
Netinfo Security