计算机科学
计算机安全
信息安全
保安服务
安全信息和事件管理
计算机安全模型
信息安全管理
安全性测试
作者
Ching-Jiang Chen,Ming-Hwa Li
出处
期刊:Networked Computing and Advanced Information Management
日期:2008-09-01
被引量:1
摘要
Recently, malicious programs and targeted attacks in social engineering have proved that lots of traditional outer protection schemes cannot prevent these threats. According to the principles of ISO27001 and BS7799 standards, an automatic information security protection system named SecConfig (security configuration) is proposed in this paper for the information security protection at the end host. There are totally 31 potential information security threats classified into three main categories: 1) the central control of the information security protection, 2) the fix of the information security at the operation system level and the application level, and 3) the asset management and information security live monitor platform. In this paper, there are 520 end hosts and 20 experimental rounds (one round per month) used to evaluate the proposed system. The results show that, excluding artificial and inartificial causes, more than 95% hosts can be protected safely and efficiently in the later rounds.
科研通智能强力驱动
Strongly Powered by AbleSci AI