-
>
全國計算機等級考試最新真考題庫模擬考場及詳解·二級MSOffice高級應用
-
>
決戰(zhàn)行測5000題(言語理解與表達)
-
>
軟件性能測試.分析與調優(yōu)實踐之路
-
>
第一行代碼Android
-
>
JAVA持續(xù)交付
-
>
EXCEL最強教科書(完全版)(全彩印刷)
-
>
深度學習
網(wǎng)絡空間內置式主動防御(英文版) 版權信息
- ISBN:9787030680891
- 條形碼:9787030680891 ; 978-7-03-068089-1
- 裝幀:一般膠版紙
- 冊數(shù):暫無
- 重量:暫無
- 所屬分類:>
網(wǎng)絡空間內置式主動防御(英文版) 本書特色
本書提出內置式主動防御的理念、模型和技術體系?晒┚W(wǎng)絡空間安全、信息技術等領域科研人員、工程技術人員以及研究生、高校教師閱讀。
網(wǎng)絡空間內置式主動防御(英文版) 內容簡介
本書提出內置式主動防御新思路,強調從分析攻擊機理和路徑入手,找出信息系統(tǒng)漏洞背后攻擊者所利用的信息技術安全脆弱點,從安全的需求出發(fā),改變安全從屬地位,重新設計、改造現(xiàn)有的信息技術,使其具備有效抑制、發(fā)現(xiàn)、調控、消除自身安全脆弱性造成的安全威脅的能力,變"信息技術加安全"為"安全的信息技術"。
網(wǎng)絡空間內置式主動防御(英文版) 目錄
Preface
Chapter 1 Security Threats in Cyberspace 1
Chapter 2 Dilemma of Classic Defense Systems and Technology 4
2.1 Defense Systems 4
2.2 Security Technology 6
2.3 Main Issues 7
Chapter 3 The Built-in Active Defense Theory and Model 11
3.1 Core Ideas 11
3.2 Defense Model 14
3.3 Main Features 18
Chapter 4 Built-in Active Defense Framework 22
4.1 Overview 22
4.2 Security-First Architecture 24
4.3 Key Techniques 29
Chapter 5 Summary 33
Acknowledgments 34
References 35
網(wǎng)絡空間內置式主動防御(英文版) 節(jié)選
Chapter 1 Security Threats in Cyberspace The extensive application of information technology and the expansive reach of cyberspace have greatly boosted economic development and social prosperity, while bringing new security risks and challenges. On the one hand, the society and economy are increasingly integrated with the information systems. With the rapid development of emerging technologies such as 5G, cloud computing, artificial intelligence, and big data, the degree at which human, machine, and things are integrated is becoming higher and higher. Security threats in cyberspace are increasingly getting into the human society and physical space. On the other hand, security vulnerabilities in cyberspace are becoming more prevalent, the boundary between cyberspace and physical space is becoming increasingly blurred, attacks with unknown patterns are becoming ever more destructive, and cyberspace is becoming harder and harder to defend. Cybersecurity is now tightly associated with the common interests of all mankind, world peace and development, and national security of every country. It is a common challenge faced by all countries in the world. From a technical point of view, cybersecurity is facing two increasingly critical problems. First, software and hardware vulnerabilities are inevitable. In the past two decades, the scale and complexity of software systems have increased constantly. The higher complexity of software code and the greater difficulty of verification, the higher probability of having security vulnerabilities. At the same time, hardware vulnerabilities are also ubiquitous. Defects in hardware designs and complex design/manufacturing processes are the two main factors that introduce hardware vulnerabilities. ①Many classic design principles embedded in the current hardware architectures place a heavy emphasis on performance optimization over security, leading to inherent security deficiencies in hardware. ②The hardware design process is lengthy and complex, such as requiring the use of many third-party IPs, standard cell libraries, and various EDA (electronic design automation) tools. The entire process may involve dozens of vendors, all of which may introduce new security vulnerabilities to the final products. Second, attacks with unknown patterns emerge continuously. Attacks exploring software and hardware vulnerabilities are the main security threats in cyberspace. In recent years, the number of zero-day vulnerabilities has been growing rapidly and has become a norm. Although new vulnerabilities may pose difficulty of varying degrees when it comes to them being exploited, there are always new vulnerabilities that will be successfully exploited, leading to security breaches with previously unknown patterns. The traditional defense technology that uses ad-hoc patches after each breach is reactive in nature and is always lagging behind attacks. Attacks with unknown patterns have become the most threatening challenge in cyberspace and are the focus and main challenge of future defense strategies. As software and hardware vulnerabilities are inevitable and attacks with unknown patterns are unavoidable, exploring and designing more effective new defense systems for cyberspace has great practical significance, broad scientific and technological importance, and profound strategic influence. Chapter 2 Dilemma of Classic Defense Systems and Technology 2.1 Defense Systems The classic defense systems, represented by perimeter defense and defense-in-depth, mainly consider the network system as the center and create a perimeter surrounding the network system. It then implements defense policies at the perimeter and achieves the effect of "fending off the enemy outside the gate". Perimeter defense[1], as the earliest defense mechanism, mainly guards the perimeter to resist external attacks. It, however, has many shortcomings, such as that there is no effective way to prevent internal threats and any breach of the perimeter will render the entire security system completely ineffective. The defense-in-depth system[2] is an extension of the perimeter defense and typically implements hierarchical multi-layered defense policies. It considers human, technology, and operation as the core elements of safeguarding information systems and deploys security measures in the critical areas such as network infrastructure, network boundaries, computing systems, and supporting infrastructure. It sets up layered protection and detection measures according to the hierarchical network architecture to form a hierarchical security framework. In an open network, defenders cannot fully control all the paths of the network, making it difficult to build a defense-in-depth system. To address this challenge, a new type of defense system represented by zero-trust has been proposed a few years ago[3]. In the zero-trust system, security defense is no longer centered on networks and
- >
月亮虎
- >
中國歷史的瞬間
- >
推拿
- >
上帝之肋:男人的真實旅程
- >
李白與唐代文化
- >
小考拉的故事-套裝共3冊
- >
羅庸西南聯(lián)大授課錄
- >
伯納黛特,你要去哪(2021新版)