期刊文献+

Windows安全基线研究 被引量:10

Research on Windows Security Baseline
在线阅读 下载PDF
导出
摘要 随着互联网应用的快速发展,信息系统的安全性问题日益突出,安全基线的概念、技术与应用就更加重要。安全基线是微软安全生态系统中的一个重要组成部分,它通过安全合规管理器(SCM)以基线的形式判断用户的应用环境安全是否达标,提供一个信息系统所需的最基本的安全保证。安全基线的概念源于微软为美国空军实施的安全配置方案,最终为美国政府机构所采纳,作为国家标准实施。文章对Windows安全基线的由来与发展、安全合规管理器(SCM)、安全基线的基本概念和实现原理、安全基线的部署与安全策略设置、Windows 8.1的安全基线更新等进行讨论与分析。Windows安全基线的概念可以方便地推广到更加广泛的应用场合,如Linux操作系统。 With the rapic1 development of internet applications,the security issues of information systems have become increasingly prominent, and consequently the concept, methodology and application of security baseline have become more important. Security baseline is an important part of Microsoft's security ecosystem, by the use of security compliance manager (SCM) which is able to determine whether the security requirements of users' application environment are met, providing a basic security assurance for an information system. The concept of security baseline originally coming from the Microsoft's security configuration initiative for the US Air Force, eventually had been accepted by the US government, and been deployed as national standards. This paper discusses and analyzes the origin and progress of Windows security baseline, security compliance manager, the basic concept and implementation rationale of security baseline, deployment and security policy settings of security baseline, and update of security baseline for Windows 8.1. The concept of Windows Security Baseline can be easily extended to a wide range of applications, such as Linux OS.
出处 《信息网络安全》 2015年第3期6-13,共8页 Netinfo Security
基金 国家自然科学基金[61170282]
关键词 安全基线 安全合规管理器 组织单元 组策略对象 security baseline security compliance manager organizational unit group policy object
  • 相关文献

同被引文献68

  • 1刘海燕,王子强,邵立嵩.Linux系统的安全检测与增强技术分析[J].计算机工程与设计,2005,26(1):100-102. 被引量:11
  • 2胡兆阳,谢余强,舒辉.Windows下堆内存管理机制研究[J].计算机工程与应用,2005,41(17):59-61. 被引量:6
  • 3董耀祖,周正伟.基于X86架构的系统虚拟机技术与应用[J].计算机工程,2006,32(13):71-73. 被引量:64
  • 4王存健,张建正.嵌入式Linux下Qt/Embedded的应用[J].计算机技术与发展,2006,16(11):179-181. 被引量:30
  • 5ESD-TR-73-278 Electronic Systems Division[S]. USA: Air Force Systems Command, 1973.
  • 690CH2884-5 IEEE Computer Society Symposium on Research in Security and Privacy[S]. USA: IEEE, 1990.
  • 7LOSCOCCO P. SMALLEY S. Meeting Critical Security Objectives with Security-Enhanced Linux[EB/OL]. http://ftp.funet.fi/pub/linux/ images/selinux/doc/ottawaOl.pdf, 2008-09-20.
  • 8马林立外军网电空间战一现状与发展[M].北京:国防工业出版社,2012.
  • 9LOSCOCCO P, SMALLEY S. Integrating Flexible Support for Security Policies into the Linux Operating System[Cl//Proceedings of the FKEENIX Track: 2001 USENIX Annual Technical ConferenceUSENIX Association, 2001: 64-72.
  • 10CHOI Y, KIM H, LEE D. Detecting Heap-spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution[J].1EICE Transactions on Communications, 2012, 95 (5): 1711-1721.

引证文献10

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部