Font Size: a A A

Study On CC Criteria And Key Technologies Correlative To Risk Assessment System

Posted on:2005-08-23Degree:MasterType:Thesis
Country:ChinaCandidate:H HongFull Text:PDF
GTID:2168360122480285Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the fast development of network technology, information spread quickly in the network, Information security is faced by threatens from many outside aspects. Risk assessment acts as the basis and premise in information security. Together with information security, risk assessment becomes the focus and one of the task studies in this security area. This thesis based on the task study deals with design and realization of CC criteria security risk assessment system first presents the concepts and statuses of information security and risk assessment. It then expounds risk assessment's two main parts, criteria and process & methods. And it discusses deeply in the theory research results of the task prophase include CC criteria and CC evaluation process & methods, especially in CC's main idea, the applications of CC, work of the three phases in CC evaluation process and the applications of the CEM documents together with CC in evaluation phase used in this security risk assessment system. The paper also points out the shortcomings of the theory bases. At last it uses the above theory research results in introducing the parts & the whole design and the realization parts of the security risk assessment system.
Keywords/Search Tags:Information Security, Risk Assessment, Evaluation Criteria, CC
PDF Full Text Request
Related items