Font Size: a A A

Development And Application Of The Network Security Evaluation Information System

Posted on:2010-04-17Degree:MasterType:Thesis
Country:ChinaCandidate:Q F LinFull Text:PDF
GTID:2178360275499546Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With fast development of the network technology and extensive application, especially the overall quickening of our national economy and social information-based process, the basic function of overall importance of the network and information system is strengthened day by day, the information of the network has already become the important component of national security safely. The protection system of the grade of information safety is the country in the course of development of national economy and social informationization, improve the supportability of information safety and level, safeguard national security, social stability and public interests, a basic system of ensuring and protecting the healthy development of information construction. Implement the protection system of the grade of information safety, can fully arouse the enthusiasm of country, legal person, other organizations and citizen, play a of various fields role, achieve the goal of protecting effectively, strengthen the globality, pertinence and substantial results of safe protection, it is rational to make the network system build and stress the key points, unify the norm, science further safely, will play an important role in promoting the development of the information safety of our country. This text starts with testing and assessing the commonly used grade of method to protect safely, has recommended the grade to protect and test and assess the application in the system in the security emphatically. And then the management of providing the safe grade and protecting measures realization: Including the tolerance should ask for, measure the index quantization which choose and measure the result. Have expounded the fact in detail the grade protects the application in the concrete security land, and has proposed the safe tactics to network land, calculation land, user's land,etc..
Keywords/Search Tags:Level protection, security evaluation systems, security domain, security policy
PDF Full Text Request
Related items