信息保护系统脆弱性评价方式研究  

Study on Vulnerability Evaluation Methodology for Information Security System

在线阅读下载全文

作  者:金点九 

机构地区:[1]南首尔大学

出  处:《黑龙江八一农垦大学学报》2006年第1期70-74,共5页journal of heilongjiang bayi agricultural university

基  金:2005年南首尔大学学术研究经费

摘  要:保证可信度的评价标准得到了统一,但各国的评价方法等客观性的保证方面上的一些部分还是有点模糊。换言之,脆弱性评价有范围,深度,实验用道具,提纲和评价者因素,而随着这些因素的不同其评价结果也会出现差异,这样一来,评价的公正性和客观性的保证上就存在困难。本论文提出了能保证信息保护产品保安脆弱性评价的公正性客观性和效率性的信息保护产品保安脆弱性评价方法,体现了自动化完成评价系统的设计。Although an evaluation criterion for reliable guarantee is unified, the difference in evaluation mechanism is already ambiguity in every country. In other words, the aspect of objectivity would be a little because it is true that the vulnerability evaluation include evaluator, scenario and target of evaluation (TOE) security vulnerability evaluation system applying in test, depth and scope of evaluation. But evaluation results can be difference in accordance with each evaluation elements. We propose the system to evaluate network security vulnerability. First, we expected the evaluation results are impartiality, objectivity, repeatability, reproducibility, appropriateness and soundness of results. Second, it could be transferred manual ways into automation ways, and then expected easiness and safety of extension and modification in a quality of products as well as reduction of waste of time and energy.

关 键 词:信息保护 脆弱性 TOE 

分 类 号:TP309.2[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象