基于安全策略的主机安全评估技术分析-analysis of host security assessment technology based on security policy.docxVIP

  • 17
  • 0
  • 约3.91万字
  • 约 47页
  • 2018-05-18 发布于上海
  • 举报

基于安全策略的主机安全评估技术分析-analysis of host security assessment technology based on security policy.docx

基于安全策略的主机安全评估技术分析-analysis of host security assessment technology based on security policy

R臼earchofHostComputersecurityevaluatioobased00securitypolicySpecialty:T配hnology01ComputerApplicationNamc:WuJunfangSupervisor:Prof.ZhengQiushengAbstractWiththepopularizationofIntemet,theuniversal usageofcomputermakesworksandLife∞nvenientforthepeople.Whilepeoplee町oytheconvenienceofefficiencyofinformationsy如msociety,th勾IaJsofa∞aJl SOI岱ofrisksofsafety.Attacksofhackers,t:hespread ofvirusesand叫ansseriously 由reatentheregularoperationoftheinformationsystem,andatthesametime,theillegaltheftandevilmodificationofentelplise严部onalinformationcausesirreparabledamages1-Iowtoeftecti飞lely思laranteeinformation sωurityhasbecome thefocusofresear巳hatthecomputerfíeld.Evaluationofsafety isabasicwork10ensuresafety ofinformation,mainlyas优ssinginformationsecuritysituation也roughsomemethodsandmakingsuggestionsandmeasuresforpromotionandpeltection,sothatuserscanbeintuibvelyawareofsafetyleveltopreventlos岱s.η11Spaper也Stm1l刨uc臼theimpo口m∞ofHostComputersecurityininformationsyslemseωrity,drawingthenecessityof领fetyassessment,thenintroducingstandar址,technologyandrelatedmethodsandexistingproblemsrelatedtosaf问revaluation.Neà110ensuretheetl也bveimplementationofthesafetyassessment,safetyassessmentmustbecarri创outunderthe阴idanceof部uritystrategies,weshouldanalyzether穹sult,adjustandmodiiYtheCOIT ondingsecuritystra问y.Thus,we ,咀givearelationshipofsafetyassessme以and如untystra忧町,andaωordingtothedemandoflevelprotectionstandard,weclassifythesecluitystrategiesfromtwo呻ectsprot,创iontechnologyandmanagement,furtherd巳tailed∞nαete础;lU1tystrat巳gyweShOlùdtaketoachievethesecurityof1-IostComputer.Finally,也ispaperpresentsakindof剑fetyevaluationmodel,usingthestrategyofvulnerabilityassessmentmethodstoevaluatethesecuritystrategyandusinganalytichierarchypl以元sstograde theimplementationofthestralegyKeywords:Classi且edProtectiα1;SecurityEvaluationbasedHost;SωrityPolicy;Analyticalhierarchy prc沁ess录同口1.绪论…....…............……....……............…......................…............………...............…..….........….(1)川引言…..…….........……...

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档