Font Size: a A A

Design An Implementation Of Host Security Evaluation System For Classified Protections

Posted on:2015-05-01Degree:MasterType:Thesis
Country:ChinaCandidate:H HuFull Text:PDF
GTID:2298330467450998Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Classified protection of information system security evaluation is an important part of information security level protection. From the present situation of classified protection evaluation, there are many difficulties in this work. Such as heavy workload, lack of normative evaluation standard, complex data etc. Therefore, we studied on the technology of host security assessment system, which meets the requirements of the information security level protection. The system aims at complete, impartial, effective safety evaluation system of the host to provide technical support for safety evaluation agency.This thesis analyses the evaluation system level protection requirements, and studies the existing security risk assessment and evaluation system. On this basis, design and development of the host evaluation prototype system for classified protection assessment. The main work of this thesis are as follows:1. This thesis takes advantage of previous evaluation automation system, at the same time, the use of risk assessment theory. This thesis proposes a general scheme for prototype system classified protection of host security assessment;2. This thesis design and implement the standard method of host security assessment. Study on the process of this method based on classified protection requirements, reference to domestic and foreign safety evaluation and risk assessment results, combined with a large number of practical testing experience. The method is in accordance with the assessment object and built-in operation guide book knowledge library automatic generation capacity evaluation checklist;3. The system establish a host evaluation program based on the classified protection. Specifically, the program will evaluation method corresponding to the evaluation object, according to the requirements of test target operating system and knowledge base. The system automatically generates a plan, and the use automated inspection program finished the analysis on automatic inspection and the results of host security assessment;4. This thesis analyzes the host security evaluation standard of judgment and the requirements for the evaluation report. This thesis establishes the evaluation standard. The system by calling the built-in tests standard knowledge base, can be summarized, statistics and calculation of the testing results, the system can generate the test report according to the requirements, the final conclusion is given evaluation analysis.
Keywords/Search Tags:security evaluate, information system, classified protection, host
PDF Full Text Request
Related items