期刊文献+

网络渗透测试流程、用例管理和风险控制研究 被引量:2

Research Network Penetration Tesing Process Test Use Case Management and Risk Control
下载PDF
导出
摘要 网络渗透测试作为安全测试的一种重要手段,越来越受到重视。设计了网络渗透测试的实施流程,提出了可复用的渗透测试用例管理框架,并对测试过程的风险进行分析,总结了风险规避方法。 As an important means of computer security test,penetration testing has been getting more and more attention.An implementation process of network penetration testing process and reusable penetration test case management framework were designed.Through risk analysis of network penetration testing process,the risk aversion approach has been summarized.
作者 李亮 楼芳
出处 《煤炭技术》 CAS 北大核心 2010年第11期175-176,共2页 Coal Technology
基金 中国工程物理研究院科学技术发展基金(2007A12001)
关键词 渗透测试 网络安全 风险控制 测试用例 penetration testing network security risk control test case
  • 相关文献

参考文献2

二级参考文献9

  • 1G.Fink and K.Levitt,"Property-based testing of privileged programs".In Proceedings of the Inch Annual Computer Security Applications Conference:Orlando,FL.USA,1994. 被引量:1
  • 2C.R.Ramakrishnan and R.Sekar,"Model-Based Vulnerability Analysis of Computer Systems".2nd Int'I Workshop on Verification.Model Checking and Abstract Interpretation,1998. 被引量:1
  • 3O.Sheyner,l.Haines.S.Jha,R.Lippmann,and J.Wing,"Automated generation and analysis of attack graphs",Proceedings of the 2002 IEEE Symposium on Security and Privacy(Oakland 2002).Oakland.CA.May 2002. 被引量:1
  • 4Richard R.Linde,"Operating System Penetration",1975 National Computer Conference Proceedings(AFIPS Conference Proceedings 44),pp.361~368(May 1975). 被引量:1
  • 5R.P.Abbott,J.S.Chin,J.E.Donnelley,W.L.Konigsford,S.Tokubo,and D.A.Webb,"Security Analysis and Enhancements of Computer Operating Systems",NBSIR 76-1041.Institute for Computer Sciences and Technology.National Bureau of Standards(Apr.1976). 被引量:1
  • 6Aslam,"A Taxonomy of Security Faults in the Unix Operating System",MS.thesis.Purdue University,1995. 被引量:1
  • 7Power R.,"Current And Future Danger:A CSI Primer of Computer Crime & Information Warfare",CSI Bulletin.1996. 被引量:1
  • 8P.G.Neumann,"Computer System Security Evaluation",1978 National Computer Conference Proccedings(AFIPS Conference Proceedings 47),pp.1087~1095.June 1978. 被引量:1
  • 9Jeffrey L Undercoffer et al.,"Modeling Computer Attacks:An Ontology for Intrusion Detection",The Sixth International Symposium on Recent Advances in Intrusion Detection,September 2003. 被引量:1

共引文献2

同被引文献18

引证文献2

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部