期刊文献+

基于业务的ITBPM校园网信息安全应用研究 被引量:2

Analysis of Information Security in Campus Network with ITBPM Based on Business Management
原文传递
导出
摘要 文章首先对IT基准安全防护手册(ITBPM)进行了详细的介绍。然后,在分析了高校校园网业务的基础上,应用ITBPM中五个标准环节进行校园网信息安全的分析和安全防护措施的设计。为校园网信息安全防护提供了一种简洁高效的方法。 A detailed description of IT Baseline Protection Manual is provided in this paper. Based on the analysis of business in campus network, five standard steps in ITBPM are applied in the analysis of information security and design of safeguards. We suggest that ITBPM should be an effective and simple way to deal with the problems in information security in campus network.
出处 《图书馆学研究(应用版)》 CSSCI 2011年第1期28-32,共5页
关键词 ITBPM 信息安全 校园网 业务分析 ITBPM Information security campus network business analysis
  • 相关文献

参考文献6

二级参考文献35

共引文献87

同被引文献16

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:313
  • 2Li Zhi-qiang, The agricultural product market analysis of focus and key technology[J]. Agricultural Outlook,2010( 1) :43-58.
  • 3Xu Yun-feng, AHP based information system security evaluation method [C]. Proceedings of the 26th China Computer Security Academic,Fujian WUyishan,China,2011 :120-122.
  • 4Thomas L Saaty. Time dependent decision-making dynamic priorities in the AHP / ANP: Generalizing from points to functions and from real to complex variables [J]. Mathematical and Computer Modeling, 2007 , ( 46) : 860-891.
  • 5Liu Juan. Study on the core competence of fumiture enterprise in Xindu based on value chain [D]. Fuxin : Liaoning Technical University,2008.
  • 6Li Ying. Research on safety assessment model of Hydroelectric construction site with DEMATEL and ANP[D]. Wuhan-Huazhong University of Science and Technology,2011.
  • 7Saaty L. Decision making in complex environment: the analytic hierarchy process (AHP) for decision making and the analytic network process (ANP) for decision making with dependence and feedback [M]. Pittsburgh, PA: Creative Decisions Foundation, 2003.
  • 8Chi-Chun Lo, Wan-Jia Chen. A hybrid information security risk assessment procedure considering interdependences between controls [J]. Expert Systems with Applications,2012,39:247-257.
  • 9ISO/IEC 15408-1: 2005 ( E). Infonnation technology-security techniques-evaluation criteria for IT security [S]. Geneva, Switzerland: ISO Copyright Office, 2005.
  • 10Wang Yan-wei,Zhang Na-na. Study on the application of ITBPM in campus network information security based on service [J]. Research on Library Science,2011 (2) :28-32.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部