Font Size: a A A

The Cc-based Network Security Assessment Model

Posted on:2011-08-01Degree:MasterType:Thesis
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:2208360308467035Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
Nowadays, the fast development of IT makes network security issues becoming increasingly serious. How to ensure and evaluation of network security has become the issue of information security. Many countries have developed evaluation criteria of information systems. The common criterion is the most authoritative. In this paper, CC standards and network security assessments methods have been studied in-depth. A new assessment model is proposed in the paper, except for the traditional methods and model of network risk assessment. I hope to provide new ideas for network security assessment.In the paper, the network security status and trends of is decrypted briefly. Methodologies, models and standards of network security assessment are studied and analysised.The model of network security base on CC is proposed. The paper Use the safety level to describe security statement of network. Through study on the CC and network security principles, the model of producing security function is proposed: First, the security policy of object, treat and security target is analysis, and then the security functional requirements of object is gained. Through the model, the security functional requirements of firewall, database and web-servers are gained. At the same time, security functional requirements of the Distributed Systems are studied. Through the study of assessment methods and quantitative evaluation method, network security evaluation model is proposed. The right of the safety component is gained, through analytic hierarchy process. Through assessing the degree of meeting security components requirements, the level of target of evaluation is gained. Finally the level of the network is gained using the Weighted Average. At last, Through evaluation a business System,the assessment model presented in this paper is demonstrated.
Keywords/Search Tags:Security Evaluation, Security Function, Level of Security, CC
PDF Full Text Request
Related items