期刊文献+

关于信息安全管理的方法研究 被引量:3

Comprehensive Information Safety Management Framework
在线阅读 下载PDF
导出
摘要 从社会环境、商业、组织和个人的角度分析了电子商务的信息安全问题,提出一个全面的信息安全管理框架。方案中提供了一个通用的模型及模型中的组件功能,通过实际工作经验重新进行分析,得出了一种较为合理的设计,以此降低各企业、组织在电子商务运营中的网络安全隐患。 Information safety of electronic commerce was considered in the view of social environment, business, organism and personal. A comprehensive safety management framework was presented. In order to created a useful framework, at first the generic model was presented where also the framework' s components would be described briefly. The analysis would be backed up by real work experiences ,and then would improve the feasible design. It decreases the permanent mistakes in electronic commerce among social environment, business, organism, etc.
作者 官巍 胡若
出处 《计算机应用研究》 CSCD 北大核心 2007年第3期118-120,139,共4页 Application Research of Computers
基金 国家自然科学基金重点资助项目(70433003/G03) 上海市教委发展基金资助项目(02GK09)
关键词 工作流 信息安全管理 全面系统的方法 workflow information safety management systemic-overall approach
  • 相关文献

参考文献8

  • 1BOEHM B. A spiral model of software development and enhancement[J]. IEEE Computer, 1988,21(5) :61-72.
  • 2BOOYSEN H, ELOFF J. Information safety management [ M ]. [ S.1. ] :[s.n.],1995:114-119.
  • 3FISCHER-HUBNER S. IT-safety and privacy : design and use of privacyenhancing safety mechanisms : Lecture Notes in Computer Science[ C]. [ S. 1. ] :Springer, 2001:46-47.
  • 4许诚,张玉清,雷震甲.企业信息安全风险的自评估及其流程设计[J].计算机应用研究,2005,22(7):108-110. 被引量:14
  • 5HICHINGS J. Achieving an integrated design: the way forward for information safety[ C].//ELOFF J H P,SOLMS S H. Information security:the next decade :proc. of the 11 th International Conference on Information Security. [ S. 1. ] : Chapman and Hall, 1995:79.
  • 6SIPONEN M. An analysis of the recent IS safety development approaches[ C]//lnformation safety management: global challenges in the new millennium. [ S. 1. ] :Idea Group,2001:242-245.
  • 7BACKHOUSE J, DHILON G. Structures of responsibilities and safety of information system [J]. European Journal of Information Systems, 1996,5( 1 ) :21-24.
  • 8吕霞,李文印,玄光哲.基于SNMP的校园网网络性能管理系统的实现[J].吉林大学学报(信息科学版),2003,21(2):192-195. 被引量:6

二级参考文献9

  • 1Code of Practice for Information Security Management [S]. ISO/IEC17799, 2000.
  • 2Information Technology-Guidelines for the Management of IT Security[S].ISO/IEC 13335,1997.
  • 3Information Security Risk Assessment-Practices of Leading Organizations[R]. U.S. General Accounting Office, 1999.
  • 4Christopher Alberts, Audrey Dorofee. Managing Information Security Risks: The OCTAVE Approach[M]. Addison Wesley Inc.,2002.
  • 5Thomas R Pelitier. Information Security Risk Analysis [M]. Rothstein Associates Inc. , 2001.
  • 6Yacov Y Haimes. Risk Modeling, Assessment and Management [M].Wiley & Sons Inc. , 2002.
  • 7Gary Stoneburner, Alice Goguen, Alexis Fefinga. Risk Management Guide for Information Technology Systems [R].NIST SP800- 30,2001.
  • 8Mariane Wanson.Security Self-Assessment Guide for Information Technology System[R]. NIST SP800-26, 2001.
  • 9贺旻捷,孙亚民.基于Web方式网络管理的研究与实现[J].计算机应用研究,2002,19(3):136-138. 被引量:10

共引文献17

同被引文献13

  • 1沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:365
  • 2施伯乐,丁宝康,等.数据库系统教程:第2版[M].北京:高等教育出版社,2003.
  • 3Frederic Cuppens.Managing alerts in a multi-intrusion detection environment[].Proceedings of the th Annual Computer Security Applications Conference (ACSAC’).2001
  • 4Stanton, J.M,Stam, K.R,Mastrangelo, P.Analysis of end-user securitybehaviours[].Computers and Security.2005
  • 5Kenneth J.Knapp,Thomas E.Marshall.Information security policy:An organizational-level process model[].Computers and Security.2009
  • 6Tejaswini Herath,H. R Rao.Encouraging information security behaviors inorganizations: Role of penalties,pressures and perceived effectiveness[].Decision Support.2009
  • 7J.F.Van Niekerk,R.Von Solms.Information securityculture:A management perspective[].Computers and Security.2010
  • 8Eirik Albrechtsen,Jan Hovden.Improving informationsecurity awareness and behaviour through dialogue,participationand collective reflection.An intervention study[].Computers and Security.2010
  • 9Debi Ashenden.Information Security management:Ahuman challenge[].Information Security Technical Re-port.2008
  • 10臧劲松.数据库系统安全的研究与分析[J].计算机安全,2008(7):26-30. 被引量:8

引证文献3

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部