排序方式: 共有92条查询结果,搜索用时 0 毫秒
61.
62.
基于指挥控制的网络安全防御体系 总被引:1,自引:0,他引:1
胡昌振 《信息安全与通信保密》2002,(8):16-18
前言网络安全不仅是一个纯技术问题,单凭技术因素确保网络安全是不可能的。网络安全是一个涉及法律、管理和技术等方面综合因素的人-机复杂系统,如图1,只有通过合理地协调这三者的关系,才能有效地保护网络安全。 相似文献
63.
Based on the analysis of inherent limitations in existing security response decision-making systems, a dynamic adaptive model of fault response is presented. Several security fault levels were founded, which comprise the basic level, equipment level and mechanism level. Fault damage cost is calculated using the analytic hierarchy process. Meanwhile, the model evaluates the impact of different responses upon fault repair and normal operation. Response operation cost and response negative cost are introduced through quantitative calculation. This model adopts a comprehensive response decision of security fault in three principles-the maximum and minimum principle, timeliness principle, acquiescence principle, which assure optimal response countermeasure is selected for different situations. Experimental results show that the proposed model has good self-adaptation ability, timeliness and cost-sensitiveness. 相似文献
64.
65.
我国信息安全技术的发展,应该站在国家安全的高度,以“构筑自主防御体系、形成自主技术特色、建立自主民族产业”为目标宏观规划。选择跟踪国外先进技术可以提高我国信息安全技术的起步水平,但我国信息安全整体技术能力的提升,必须走跨越式发展的道路。本文从信息安全技术的发展趋势出发,提出网络空间信息优势的建立,为我国信息安全技术的跨越式发展带来机遇,并结合网络空间信息防御需求,提出了信息安全技术跨越式发展的技术思路与研究方向的建议。 相似文献
66.
67.
68.
69.
Some unsafe languages, like C and C+ + , let programmers maximize performance but are vulnerable to memory errors which can lead to program crashes and unpredictable behavior. Aiming to solve the problem, traditional memory allocating strategy is improved and a new probabilistic memory allocation technology is presented. By combining random memory allocating algorithm and virtual memory, memory errors are avoided in all probability during software executing. By replacing default memory allocator to manage allocation of heap memory, buffer overflows and dangling pointers are prevented. Experiments show it is better than Die-hard of the following aspects: memory errors prevention, performance in memory allocation set and ability of controlling working set. So probabilistic memory allocation is a valid memory errors prevention technology and it can tolerate memory errors and provide probabilistic memory safety effectively. 相似文献
70.
HoneyPot系统是一类在网络上诱骗黑客对其实施攻击.并记录所有攻击行为的系统。早期HoneyPot系统的设计初衷是为了了解黑客入侵的思路、工具及目的。 相似文献