Font Size: a A A

Study And Case Analyze On Index System And Method In Dividing The Security Domain Based On Threat

Posted on:2008-09-05Degree:MasterType:Thesis
Country:ChinaCandidate:H L ZhangFull Text:PDF
GTID:2178360242471467Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Hierachical Protection is a basic work of information system security.It is one of the important methods to strengthen the safeguard system of information security.It is also specific expression of the hierachical protection and priority protection..The total goal of information security hierachical protection is promoting the development of our country infomationization, benefiting the development of safeguard system of information security, and improving the ability of security protection of information system. The objective is making the assessed organization to see clearly the security condition. It is helpful for the management taking security safeguard measures, making more economical and effective. So, Hierachical Protection is a objective and urgent demanding for the current information security work. But, because of our country condition , specially in the research of dividing security domain is weak. So, my paper is focus on the research of dividing security domain. I hope it may be benefit for Hierachical Protection work in our country.The most important productions in thesis include:1 Firstly, use the classification of threat source and threat way to obtain the similar index of threat environment. Later, give a simple instance to introduce the way of dividing threat security domain for the subsystem of information system by the blurred classification.2 Use threat tree model to analyze the information Hierachical Protection standard ,to obtain the characterization index.3 Make a information system for a instance, to use the way which my paper introduced to divide the security domain, to prove practicability .4 Employ two typical network attack simulation experiment in this Hierachical Protection work ,to prove the similarity of threat environment. In security domain . To explain; the important of divided security domain by analyzing consequence of the destructiveness .
Keywords/Search Tags:Hierachical Protection, Threat Security Domain, Divide Security Domain, Threat Source, Threat Approach
PDF Full Text Request
Related items