The Design Policy of Large Information System Security Protection Based on Classified Protection

Article Preview

Abstract:

This paper brought forward the layered protection of defense-in-depth on the basis of analyzing information classified protection core strategy and large corporations’ net structure 、management and security actuality. Different information systems in different domains are protected according to their security classes. At the same time, the relationship between the domains and their boundaries should be defined, and the protection of domains inside and boundary are implemented. The protection layers are gradually deployed breadth wise, the protection strength are increased lengthways. Finally the objective of defense-in-depth is reached, the protection capability of enterprise’s information system is enhanced.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2307-2311

Citation:

Online since:

December 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Qiquan Guo. The New process of information classified protection.[Z]. The twelfth Information security session of China..2011-4.(in Chinese)

Google Scholar

[2] Qianyuan Jing. The Implement of information classified protection policy [J/OL]. IT security world 2006-9 . (in Chinese)

Google Scholar

[3] Yuansheng Liu. Computer network security [M]. the second edition. Beijing: Qinghua University publishing House.2009. (in Chinese)

Google Scholar

[4] ISO/IEC 13335-1 2004 Information technology-Guidelines for the management of Information and Communications Technology Security-Part 1:Concepts and models Information and CommunicationsTechnology Security Management [S].

DOI: 10.3403/30166243

Google Scholar

[5] The United States Security Beau. Information Assurance Technology Framework[M]. Beijing:Beijing Zhong Ruan publishing House,2002-4,20—24. (in Chinese)

Google Scholar

[6] Huilong Yu,Ping Li . [J/OL]. Computer Security 2006-7.

Google Scholar

[7] Hong Xiang,Peng Ai, Jiawei Liu. [J/OL].ChongQing technology Institute (Natural Science edition) 2008-2. (in Chinese)

Google Scholar

[8] ISO/IEC 27002:2005 Information Technology The practice of Information security management [S] .

Google Scholar

[9] Hong Xiang,Qinghua Xiang, Jinpeng Wu. [J/OL]. ChongQing technology Institute (Natural Science edition) 2008-10. (in Chinese)

Google Scholar