The Study on Network Security Strategy Based on Security Evaluation

Article Preview

Abstract:

The feedbacks of the results of assessing the network security strategy based on security capability, as a reference to the security strategy for effective adjustment, providing a more robust system and improve the safety. The correct security strategy results from the correct understanding on the system security demands and effective assessment model, because the various security domain information subjects and objects have different security needs. On the basis of the establishment of the network security strategy based on security domain, through analysis of the security strategy defensive methods, application objects, information security attributes and their relationship, this paper proposed an assessment model of network security strategy based on security capability, and analyzed the impact of the network security strategy attributes upon network security capability, that is the robust security strategy is conducive to system safety.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

446-450

Citation:

Online since:

October 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Chenghua. T, Shuping. Y, and Zhongjie. C, A Network Security Strategy Model and Its Realization Mechanism, Inscrpyt, LNCS 4318, Springer, Beijing, China, 2006, pp.168-181.

Google Scholar

[2] Hongzi. W, Yongbin. Z, and Sihan. Q, A formal commercial secure strategy model based on framework, ACTA ELECTRONICA SINICA, vol. 33, No. 2, 2005, pp.222-226.

Google Scholar

[3] D. Clark, D. Wilson, A comparison of commercial and military computer security policies, IEEE Symposium on Security and Privacy, IEEE press, Oakland, CA, 1987, pp.184-194.

DOI: 10.1109/sp.1987.10001

Google Scholar

[4] Jiaxi. Y, Anjia. M, and Zhizhong. G, Vulnerability Assessment of Cyber Security in Power Industry, Power Systems Conference and Exposition, IEEE press, Atlanta, USA, 2006, pp.2200-2205.

DOI: 10.1109/psce.2006.296283

Google Scholar

[5] W. Mees, Risk management in coalition networks, Information Assurance and Security, IEEE Press, Manchester, U. K, 2007, pp.329-336.

Google Scholar

[6] Butler S. A, Security attribute evaluation method: a cost-benefit approach,. International Conference on Software Engineering, IEEE press, Orlando, USA, 2002, pp.232-240.

DOI: 10.1109/icse.2002.1007971

Google Scholar

[7] Sihan. Q, Liping. L, and Jianbo. H, A Security Domain Separation Z Model Based on DTE Strategy, Journal of Computer Research and Development, vol. 44, No. 11, pp.1881-1888.

Google Scholar