- 1、本文档被系统程序自动判定探测到侵权嫌疑,本站暂时做下架处理。
- 2、如果您确认为侵权,可联系本站左侧在线QQ客服请求删除。我们会保证在24小时内做出处理,应急电话:400-050-0827。
- 3、此文档由网友上传,因疑似侵权的原因,本站不提供该文档下载,只提供部分内容试读。如果您是出版社/作者,看到后可认领文档,您也可以联系本站进行批量认领。
查看更多
目 录
1 章 网络安全概述··············································································································1
1.1 见的安全威胁与攻击·······································································································1
1.1.1 安全威胁····························································································································1
1.1.2 网络攻击····························································································································3
1.2 安全问题根源·······················································································································6
1.3 网络信息安全的内涵···········································································································8
习题1 ············································································································································9
2 章 安全框架与评估标准·······························································································10
2.1 ISO/OSI 安全体系结构······································································································10
2.2 动态的自适应网络安全模型·····························································································13
2.3 五层网络安全体系·············································································································16
2.4 六层网络安全体系·············································································································18
2.5 国际安全评价标准·············································································································19
2.5.1 美国国防部评价准则·········································································································20
2.5.2 欧洲评价准则···················································································································2 1
文档评论(0)