期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
信息保障体系及技术发展研究 被引量:6
1
作者 尹德成 《现代雷达》 CSCD 北大核心 2010年第8期14-18,共5页
信息保障是确保信息优势、决策优势以及信息系统互操作性的必不可少的实现因素,近年来受到以美国为代表的国家的重视,得到了较快的发展。文中提出了信息保障的概念,介绍了美军信息保障战略——深度防御,分析了信息保障的体系结构、信息... 信息保障是确保信息优势、决策优势以及信息系统互操作性的必不可少的实现因素,近年来受到以美国为代表的国家的重视,得到了较快的发展。文中提出了信息保障的概念,介绍了美军信息保障战略——深度防御,分析了信息保障的体系结构、信息保障的目标以及深度防御战略的信息保障原则,重点论述了信息保障战略技术层面的四大重点领域,最后给出了信息保障的重要安全技术。 展开更多
关键词 信息保障 深度防御 安全技术
下载PDF
海洋无线电装备电波环境信息保障技术 被引量:6
2
作者 康士峰 曹仲晴 李建儒 《装备环境工程》 CAS 2017年第7期1-6,共6页
主要分析了海洋电波环境对海上雷达、通信、导航、电子对抗等无线电系统的影响,论述了海上信息化装备电波环境保障系统的组成和功能,提出了技术途径和实现方法。
关键词 海洋 电波环境 无线电装备 信息保障
下载PDF
Using Linear Regression Analysis and Defense in Depth to Protect Networks during the Global Corona Pandemic 被引量:1
3
作者 Rodney Alexander 《Journal of Information Security》 2020年第4期261-291,共31页
The purpose of this research was to determine whether the Linear Regression Analysis can be effectively applied to the prioritization of defense-in-depth security tools and procedures to reduce cyber threats during th... The purpose of this research was to determine whether the Linear Regression Analysis can be effectively applied to the prioritization of defense-in-depth security tools and procedures to reduce cyber threats during the Global Corona Virus Pandemic. The way this was determined or methods used in this study consisted of scanning 20 peer reviewed Cybersecurity Articles from prominent Cybersecurity Journals for a list of defense in depth measures (tools and procedures) and the threats that those measures were designed to reduce. The methods further involved using the Likert Scale Model to create an ordinal ranking of the measures and threats. The defense in depth tools and procedures were then compared to see whether the Likert scale and Linear Regression Analysis could be effectively applied to prioritize and combine the measures to reduce pandemic related cyber threats. The results of this research reject the H0 null hypothesis that Linear Regression Analysis does not affect the relationship between the prioritization and combining of defense in depth tools and procedures (independent variables) and pandemic related cyber threats (dependent variables). 展开更多
关键词 information assurance Defense in Depth information technology Network Security CYBERSECURITY Linear Regression Analysis PANDEMIC
下载PDF
Using the Analytical Hierarchy Process Model in the Prioritization of Information Assurance Defense In-Depth Measures?—A Quantitative Study
4
作者 Rodney Alexander 《Journal of Information Security》 2017年第3期166-173,共8页
Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing dev... Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth information assurance measures such as firewalls, intrusion detection systems, and password procedures across their enterprises to plan strategically and manage IT security risks. This quantitative study explores whether the analytical hierarchy process (AHP) model can be effectively applied to the prioritization of information assurance defense in-depth measures. In response to these threats, the President, legislators, experts, and others have characterized cyber security as a pressing national security issue. The methods used in this study consisted of emailing study participants a survey requesting that they prioritize five defense in-depth information assurance measures, anti-virus, intrusion detection, password, smart-cards, and encryption, with a range of responses from 1 - 5 using a Likert scale to consider standard cost, effectiveness, and perceived ease of use in terms of protection of organizational computing devices. The measures were then weighted, based on ranking. A pair-wise comparison of each of the five measures is then made using AHP to determine whether the Likert scale and the AHP model could be effectively applied to the prioritization of information assurance measures to protect organizational computing devices. The findings of the research reject the H0 null hypothesis that AHP does not affect the relationship between the information technology analysts’ prioritization of five defense in-depth dependent variables and the independent variables of cost, ease of use, and effectiveness in protecting organizational devices against cyber-attacks. 展开更多
关键词 information assurance Analytical HIERARCHY Process DEFENSE in DEPTH information technology
下载PDF
Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures
5
作者 Rodney Alexander 《Journal of Information Security》 2020年第3期121-137,共17页
Studied in this article is whether the Bayesian Network Model (BNM) can be effectively applied to the prioritization of defense in-depth security tools and procedures and to the combining of those measures to reduce c... Studied in this article is whether the Bayesian Network Model (BNM) can be effectively applied to the prioritization of defense in-depth security tools and procedures and to the combining of those measures to reduce cyber threats. The methods used in this study consisted of scanning 24 peer reviewed Cybersecurity Articles from prominent Cybersecurity Journals using the Likert Scale Model for the article’s list of defense in depth measures (tools and procedures) and the threats that those measures were designed to reduce. The defense in depth tools and procedures are then compared to see whether the Likert scale and the Bayesian Network Model could be effectively applied to prioritize and combine the measures to reduce cyber threats attacks against organizational and private computing systems. The findings of the research reject the H0 null hypothesis that BNM does not affect the relationship between the prioritization and combining of 24 Cybersecurity Article’s defense in depth tools and procedures (independent variables) and cyber threats (dependent variables). 展开更多
关键词 information assurance Bayesian Networks Influence Diagrams Defense in Depth information technology Network Security CYBERSECURITY
下载PDF
Using the Latin Square Design Model in the Prioritzation of Network Security Threats: A Quantitative Study
6
作者 Rodney Alexander 《Journal of Information Security》 2020年第2期92-102,共11页
Society is becoming increasingly dependent on cyberspace for both business and pleasure. Cyber attackers continue to attack organizational computer networks, as those same computer networks become increasing critical ... Society is becoming increasingly dependent on cyberspace for both business and pleasure. Cyber attackers continue to attack organizational computer networks, as those same computer networks become increasing critical to organizational business process. Strategic planning and managing IT security risks play an important role in the business and government planning process. Deploying defense in depth security measures can ensure that organizations continue to function in times of crisis. This quantitative study explores whether the Latin Square Design (LSD) model can be effectively applied to the prioritization of cybersecurity threats and to the linking of information assurance defense in-depth measures to those threats. The methods used in this study consisted of scanning 10 Cybersecurity Websites such as the Department of Homeland Security US CERT (United States-Computer Emergency Readiness Team [1]) and the SANS Institute (SysAdmin, Audit, Network and Security [2]) using the Likert Scale Model for the Website’s top ten list of cyber threats facing organizations and the network defense in depth measures to fight those threats. A comparison of each cybersecurity threats was then made using LSD to determine whether the Likert scale and the LSD model could be effectively applied to prioritize information assurance measures to protect organizational computing devices. The findings of the research reject the H0 null hypothesis that LSD does not affect the relationship between the ranking of 10 Cybersecurity websites top ten cybersecurity threats dependent variables and the independent variables of defense in depth measures used in protecting organizational devices against cyber-attacks. 展开更多
关键词 information assurance LATIN SQUARE Design Model DEFENSE in Depth information technology Network Security CYBERSECURITY
下载PDF
二维条码在信息安全领域的应用研究 被引量:9
7
作者 张茹 刘明业 《计算机工程与科学》 CSCD 2004年第2期108-109,共2页
二维条码本身具有高可靠性识读、编码保护源数据、身份识别、纠错等四种安全防伪特性。我们将二维条码与数字签名技术结合,建立了一种新的编译码方案。它能够提供访问控制、保密性、完整性、可用性和不可否认性五种安全服务,提高了安全... 二维条码本身具有高可靠性识读、编码保护源数据、身份识别、纠错等四种安全防伪特性。我们将二维条码与数字签名技术结合,建立了一种新的编译码方案。它能够提供访问控制、保密性、完整性、可用性和不可否认性五种安全服务,提高了安全级别,实现了数字签名的可视化和自动识读。 展开更多
关键词 二维条码 信息安全 可靠性 数字签名 自动识别技术
下载PDF
IATF思想下的网络安全系统设计及应用 被引量:5
8
作者 杨冠杰 《现代电子技术》 北大核心 2018年第1期81-84,共4页
为了减少网络异常事件发生,需要将网络管理、通信控制等方面联系起来共同进行网络防御。因此,设计信息保障技术框架(IATF)思想下的网络安全系统。设计的系统由内网、访问控制模块、外网与业务网组成,其三层网络框架使网络设施部署与信... 为了减少网络异常事件发生,需要将网络管理、通信控制等方面联系起来共同进行网络防御。因此,设计信息保障技术框架(IATF)思想下的网络安全系统。设计的系统由内网、访问控制模块、外网与业务网组成,其三层网络框架使网络设施部署与信息隔离变得更加容易。访问控制模块利用IATF思想在信息传输装置上建立多层强力安全防御机制,设计网络安全防御体系与IATF信息安全防御模型,实现IATF认证与授权机制。实验结果表明,该系统的整体运行效果佳,防御性良好。 展开更多
关键词 信息保障技术框架 网络安全系统 三层网络框架 防御机制 性能测试 认证
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部