欢迎来到天天文库
浏览记录
ID:45783593
大小:252.29 KB
页数:47页
时间:2019-11-17
《基于安全策略的主机安全评估技术分析》由会员上传分享,免费在线阅读,更多相关内容在工程资料-天天文库。
1、R臼earchofHostComputersecurityevaluatioobasedoosecuritypolicySpecialty:TnhnologyComputerApplicationName:WuJunfangSupervisoi•:Prof・ZhengQiushengAbstractWiththepopularizationofInternet.theuniversalusageofcomputermakesworksandLife°9ivenientforthepeople.Whilepeoplee町oytheconvenienceofefficiency
2、ofinformationsy如msociety,Ih勾iaJsofa°°ajlsoi岱ofrisksofsalety.Attacksofhackers,t:hespreadofvirusesandDylansseriouslythreatentheregularoperationoftheinformationsystemandatthesametime,theillegaltheftandevilmodificationofentelplise严部onalinformationcausesirreparabledamagesl-Iowtoeftectidely思lara
3、nteeinformationscourityhasbecomethefocusofresearchatthecomputerfield.Evaluationofsafetyisabasicworic10ensuresafetyofinformation,mainlyas优ssinginformationsecuritysituation也roughsomemethodsandmakingsuggestionsandmeasuresforpromotionandpeltection,sothatuserscanbeinluibvelyawareofsafetylevelto
4、prcvcntlos岱s.qlISpaper也'Stm11刨ucatheimpoIim°°ofHostComputersecurityininfonnationsyslcmsewrity.drawingthenecessityof^fetyassessment,thenintroducingstandarhl:.technologyandrelatedmethodsandexistingproblemsrelatedtosaffq]revaluation・NeAl10ensuretheetl也bvcimplementationofthesafetyassessmentsaf
5、etyassessmentmustbecarri创outunderthe阴idanceof部uritystrategies,weshouldanalyzether^sult»adjustandmodi1thecoirondingsecuritystra问y.Thus,wc,咀givearelationshipofsafetyasscssmc以and如untystra忧町,andacoordingtothedemandoflevelprotectionstandardavcclassifythesccluitystrategicsfromtwo呻cctsprot.donte
6、chnologyandmanagement.furtherdLtailed°9iaete础;luitystrat巳gyweShoiUdtaketoachievethesecurityof1lostComputer・Finally、也ispaperpresentsakindof^jfetyevaluationmodeLusingthestrategyofvulnerabilityassessmentmethodstoevaluatethesecuritystrategyandusinganalytichierarchypl以元sstogradetheimplementatio
7、nofthestralegyKeywords:ClassiILedProtectialSecurityEvaluationbasedHost;So)rityPolicy;Analyticalhierarchypre沁css•••••••••••••••••••••••••••••••••♦••••••••(1)・・(1)(1)••(2)(3)-⑷(4)••⑷(4)-(5)(6)•⑹(6)•.(别(10)(11)2)(12)(12)(13)(1令....(14)-(15)..…(15)(26)”“”(27)....(
此文档下载收益归作者所有