Font Size: a A A

Based Vulnerability Scanning Technology Network Security Risk Assessment

Posted on:2010-01-12Degree:MasterType:Thesis
Country:ChinaCandidate:C Z ZhangFull Text:PDF
GTID:2208360275484156Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Being in modern information society line, People enjoy the information facilitatesthat Internet brings about, but they are bothered by the issue of network securityproblems. Currently, the mainstream network security products on the market, includevulnerability scan, firewall, intrusion detection /intrusion prevent system, etc., whichcan protect the security of the system. We define vulnerability scanning technology,firewall technology, intrusion detection/intrusion prevent technology and virus defensetechnologyas theindependent networksecurityelement.For anindependent element ofnetwork security- vulnerabilityscanning technology, using the method-a points systemto achievethe host network securityrisk assessment, designingthe mathematical modeland prototype software, and judging the system's security level, providing scientificbasisforthesecurityofthesystem.
Keywords/Search Tags:Scanleaks, riskassessment, securitylevel, pointssystem
PDF Full Text Request
Related items