Font Size: a A A

Design Of Host Security Evaluation Method

Posted on:2017-04-22Degree:MasterType:Thesis
Country:ChinaCandidate:L LiuFull Text:PDF
GTID:2348330518495426Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
In recent years,with the rapid development of information technology in our country,led to full speed up the process of informationization.Computer and information technology is widely applied in all walks of life.Key industries and key departments dependence on information systems is becoming more and more strong.But the information security situation is very serious in our country,the Internet affect national security and social stability problem increasingly prominent.Under this background,the advance of information security rank protection began.At present the country has issued the relevant policy standards,to regulate,guide and supervise rank protection work.Information security rank protection is a basic system,strategies and methods of the national information security work.The host security evaluation is an important component of information security rank protection.In this thesis,on the basis of deep analysis of the host security,design a host safety evaluation work procedures.The detailed operation method of host security evaluation is put forward.To common operating system and database respectively from authentication,access control,security audit,the rest of the information protection,intrusion prevention,malicious code,resource control and other control point inspection related policies,in accordance with the test results with the specific requirements of the information security rank protection,accuracy and practicability of the evaluation method.This thesis first introduces the related knowledge and the basic meaning of the information security rank protection.After understanding of the relevant standards of involves reading,analyzes the model and features of standard.Then host safety evaluation are analyzed in detail the control points and graded protection requirements.Design a host safety evaluation work procedures and evaluation methods and examples of measurement verification.Finally summarizes the full text,and the thesis points out the future work.
Keywords/Search Tags:information security, rank protection, host security, evaluation method
PDF Full Text Request
Related items