美国政企网络威胁情报现状及对我国的启示  被引量:13

Analysis and Enlightenment of US Government and Enterprise Cyber Threat Intelligence

在线阅读下载全文

作  者:徐丽萍[1] 郝文江[1] 

机构地区:[1]公安部第一研究所,北京100048

出  处:《信息网络安全》2016年第9期278-284,共7页Netinfo Security

摘  要:随着信息化和网络的高速发展,针对我国关键基础设施及政府网站等攻击事件高发,更为严峻的是各类网络攻击和网络威胁呈现持续性和扩大化的发展趋势。传统的被动式防御手段已经不能适应高级持续性威胁(APT)、0 day等新型网络威胁的防护,而威胁情报的出现弥补了这一不足。美国作为网络安全起步较早的国家,20世纪初就开始关注威胁情报,目前已经逐步建立起一套应对网络威胁的完整体系。文章对美国政府和企业的威胁情报现状进行系统研究,能够为我国政府和行业发展提供有益的参考和借鉴。首先,文章对威胁情报的定义和类型进行了分析。然后,围绕着美国政府针对网络威胁情报出台的相关法案和总统令、"爱因斯坦计划"、共享机制、开展的有关项目等五个方面进行了研究和分析。同时,对美国企业在威胁情报方面的开展的工作进行了概述。最后,文章在对中美网络威胁情报对比分析的基础上,提出了几点启示。With the rapid development of information technology and ne twork, our critical infrastructure and government websites have been attacked frequently. More severe, the various types of network attacks and cyber threats present trend of development of continuity and expansion. The traditional passive means of defense can not meet the advanced persistent threat (APT), 0 day and other new network threat protection.But threat intelligence appeared to make up for this shortfall. As national cybersecurity early start country, in early 20th century the United States began to pay attention to the threat intelligence.Now,it has gradually established a complete system to deal wi th cyber threats. In this paper, we have provided a present situation wi th cyber threat intelligence of the US government and businesses. It can provide a useful reference for the threats to our government and industry intelligence. Firstly, the definition and types of threat intelligence has been analyzed. Then five areas has been studied and analyzed,such as the bi l ls and Presidential Decree of the threat intelligence of the US , "Einstein Program", sharing mechanism , the relevant projects. Meanwhile,The work of the US companies of the cyber threat intelligence has been overviewed. Finally, on the basis of comparative and analysis of the US cyber threat intelligence, we put forward some enlightenment.

关 键 词:网络威胁情报 信息共享 网络安全 美国 

分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象