Font Size: a A A

Research Of Host Computer Security Evaluation Based On Security Policy

Posted on:2012-12-24Degree:MasterType:Thesis
Country:ChinaCandidate:J F WuFull Text:PDF
GTID:2178330332486502Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the popularization of Internet, the universal usage of computer makes works and life convenient for the people. While people enjoy the convenience of efficiency of information system society, they also face all sorts of risks of safety. Attacks of hackers, the spread of viruses and trojans seriously threaten the regular operation of the information system, and at the same time, the illegal theft and evil modification of enterprise personal information causes irreparable damages. How to effectively guarantee information security has become the focus of research at the computer field. Evaluation of safety is a basic work to ensure safety of information, mainly assessing information security situation through some methods and making suggestions and measures for promotion and perfection, so that users can be intuitively aware of safety level to prevent losses.This paper first introduces the importance of Host Computer security in information system security, drawing the necessity of safety assessment, then introducing standard, technology and related methods and existing problems related to safety evaluation. Next to ensure the effective implementation of the safety assessment, safety assessment must be carried out under the guidance of security strategies, we should analyze the result, adjust and modify the corresponding security strategy. Thus, we will give a relationship of safety assessment and security strategy, and according to the demand of level protection standard, we classify the security strategies from two aspects: protection technology and management, further detailed concrete security strategy we should take to achieve the security of Host Computer .Finally, this paper presents a kind of safety evaluation model, using the strategy of vulnerability assessment methods to evaluate the security strategy and using analytic hierarchy process to grade the implementation of the strategy.
Keywords/Search Tags:Classified Protection, Security Evaluation based Host, Security Policy, Analytical hierarchy process
PDF Full Text Request
Related items