中图网(原中国图书网):网上书店,尾货特色书店,30万种特价书低至2折!

歡迎光臨中圖網(wǎng) 請 | 注冊
> >
網(wǎng)絡空間內置式主動防御(英文版)

包郵 網(wǎng)絡空間內置式主動防御(英文版)

作者:孟丹等
出版社:科學出版社出版時間:2021-12-01
開本: B5 頁數(shù): 52
中 圖 價:¥50.7(7.3折) 定價  ¥69.0 登錄后可看到會員價
加入購物車 收藏
開年大促, 全場包郵
?新疆、西藏除外
本類五星書更多>

網(wǎng)絡空間內置式主動防御(英文版) 版權信息

網(wǎng)絡空間內置式主動防御(英文版) 本書特色

本書提出內置式主動防御的理念、模型和技術體系?晒┚W(wǎng)絡空間安全、信息技術等領域科研人員、工程技術人員以及研究生、高校教師閱讀。

網(wǎng)絡空間內置式主動防御(英文版) 內容簡介

本書提出內置式主動防御新思路,強調從分析攻擊機理和路徑入手,找出信息系統(tǒng)漏洞背后攻擊者所利用的信息技術安全脆弱點,從安全的需求出發(fā),改變安全從屬地位,重新設計、改造現(xiàn)有的信息技術,使其具備有效抑制、發(fā)現(xiàn)、調控、消除自身安全脆弱性造成的安全威脅的能力,變"信息技術加安全"為"安全的信息技術"。

網(wǎng)絡空間內置式主動防御(英文版) 目錄

Contents
Preface
Chapter 1 Security Threats in Cyberspace 1
Chapter 2 Dilemma of Classic Defense Systems and Technology 4
2.1 Defense Systems 4
2.2 Security Technology 6
2.3 Main Issues 7
Chapter 3 The Built-in Active Defense Theory and Model 11
3.1 Core Ideas 11
3.2 Defense Model 14
3.3 Main Features 18
Chapter 4 Built-in Active Defense Framework 22
4.1 Overview 22
4.2 Security-First Architecture 24
4.3 Key Techniques 29
Chapter 5 Summary 33
Acknowledgments 34
References 35
展開全部

網(wǎng)絡空間內置式主動防御(英文版) 節(jié)選

Chapter 1 Security Threats in Cyberspace   The extensive application of information technology and the expansive reach of cyberspace have greatly boosted economic development and social prosperity, while bringing new security risks and challenges. On the one hand, the society and economy are increasingly integrated with the information systems. With the rapid development of emerging technologies such as 5G, cloud computing, artificial intelligence, and big data, the degree at which human, machine, and things are integrated is becoming higher and higher. Security threats in cyberspace are increasingly getting into the human society and physical space. On the other hand, security vulnerabilities in cyberspace are becoming more prevalent, the boundary between cyberspace and physical space is becoming increasingly blurred, attacks with unknown patterns are becoming ever more destructive, and cyberspace is becoming harder and harder to defend. Cybersecurity is now tightly associated with the common interests of all mankind, world peace and development, and national security of every country. It is a common challenge faced by all countries in the world. From a technical point of view, cybersecurity is facing two increasingly critical problems.   First, software and hardware vulnerabilities are inevitable. In the past two decades, the scale and complexity of software systems have increased constantly. The higher complexity of software code and the greater difficulty of verification, the higher probability of having security vulnerabilities. At the same time, hardware vulnerabilities are also ubiquitous. Defects in hardware designs and complex design/manufacturing processes are the two main factors that introduce hardware vulnerabilities. ①Many classic design principles embedded in the current hardware architectures place a heavy emphasis on performance optimization over security, leading to inherent security deficiencies in hardware. ②The hardware design process is lengthy and complex, such as requiring the use of many third-party IPs, standard cell libraries, and various EDA (electronic design automation) tools. The entire process may involve dozens of vendors, all of which may introduce new security vulnerabilities to the final products.   Second, attacks with unknown patterns emerge continuously. Attacks exploring software and hardware vulnerabilities are the main security threats in cyberspace. In recent years, the number of zero-day vulnerabilities has been growing rapidly and has become a norm. Although new vulnerabilities may pose difficulty of varying degrees when it comes to them being exploited, there are always new vulnerabilities that will be successfully exploited, leading to security breaches with previously unknown patterns. The traditional defense technology that uses ad-hoc patches after each breach is reactive in nature and is always lagging behind attacks. Attacks with unknown patterns have become the most threatening challenge in cyberspace and are the focus and main challenge of future defense strategies.   As software and hardware vulnerabilities are inevitable and attacks with unknown patterns are unavoidable, exploring and designing more effective new defense systems for cyberspace has great practical significance, broad scientific and technological importance, and profound strategic influence.   Chapter 2 Dilemma of Classic Defense Systems and Technology   2.1 Defense Systems   The classic defense systems, represented by perimeter defense and defense-in-depth, mainly consider the network system as the center and create a perimeter surrounding the network system. It then implements defense policies at the perimeter and achieves the effect of "fending off the enemy outside the gate".   Perimeter defense[1], as the earliest defense mechanism, mainly guards the perimeter to resist external attacks. It, however, has many shortcomings, such as that there is no effective way to prevent internal threats and any breach of the perimeter will render the entire security system completely ineffective.   The defense-in-depth system[2] is an extension of the perimeter defense and typically implements hierarchical multi-layered defense policies. It considers human, technology, and operation as the core elements of safeguarding information systems and deploys security measures in the critical areas such as network infrastructure, network boundaries, computing systems, and supporting infrastructure. It sets up layered protection and detection measures according to the hierarchical network architecture to form a hierarchical security framework.   In an open network, defenders cannot fully control all the paths of the network, making it difficult to build a defense-in-depth system. To address this challenge, a new type of defense system represented by zero-trust has been proposed a few years ago[3]. In the zero-trust system, security defense is no longer centered on networks and

商品評論(0條)
暫無評論……
書友推薦
本類暢銷
編輯推薦
返回頂部
中圖網(wǎng)
在線客服
主站蜘蛛池模板: 华中线缆有限公司-电缆厂|电缆厂家|电线电缆厂家 | 节流截止放空阀-不锈钢阀门-气动|电动截止阀-鸿华阀门有限公司 | 电动不锈钢套筒阀-球面偏置气动钟阀-三通换向阀止回阀-永嘉鸿宇阀门有限公司 | 西安耀程造价培训机构_工程预算实训_广联达实作实操培训 | 北京工业设计公司-产品外观设计-产品设计公司-千策良品工业设计 北京翻译公司-专业合同翻译-医学标书翻译收费标准-慕迪灵 | 特材真空腔体_哈氏合金/镍基合金/纯镍腔体-无锡国德机械制造有限公司 | 南京种植牙医院【官方挂号】_南京治疗种植牙医院那个好_南京看种植牙哪里好_南京茀莱堡口腔医院 尼龙PA610树脂,尼龙PA612树脂,尼龙PA1010树脂,透明尼龙-谷骐科技【官网】 | 全自动贴标机-套标机-工业热风机-不干胶贴标机-上海厚冉机械 | 搜木网 - 木业全产业链交易平台,免费搜货、低价买货! | 食品质构分析仪-氧化诱导分析仪-瞬态法导热系数仪|热冰百科 | 卷筒电缆-拖链电缆-特种柔性扁平电缆定制厂家「上海缆胜」 | 健康管理师报考条件,考试时间,报名入口—首页 | 实验室隔膜泵-无油防腐蚀隔膜泵-耐腐蚀隔膜真空泵-杭州景程仪器 电杆荷载挠度测试仪-电杆荷载位移-管桩测试仪-北京绿野创能机电设备有限公司 | 深圳宣传片制作-企业宣传视频制作-产品视频拍摄-产品动画制作-短视频拍摄制作公司 | 西安文都考研官网_西安考研辅导班_考研培训机构_西安在职考研培训 | 拼装地板,悬浮地板厂家,悬浮式拼装运动地板-石家庄博超地板科技有限公司 | 郑州大巴车出租|中巴车租赁|旅游大巴租车|包车|郑州旅游大巴车租赁有限公司 | 泰兴市热钻机械有限公司-热熔钻孔机-数控热熔钻-热熔钻孔攻牙一体机 | 西安耀程造价培训机构_工程预算实训_广联达实作实操培训 | 臻知网大型互动问答社区-你的问题将在这里得到解答!-无锡据风网络科技有限公司 | 武汉宣传片制作-视频拍摄-企业宣传片公司-武汉红年影视 | 建筑资质代办_工程施工资质办理_资质代办公司_北京众聚企服 | 欧必特空气能-商用空气能热水工程,空气能热水器,超低温空气源热泵生产厂家-湖南欧必特空气能公司 | 3d可视化建模_三维展示_产品3d互动数字营销_三维动画制作_3D虚拟商城 【商迪3D】三维展示服务商 广东健伦体育发展有限公司-体育工程配套及销售运动器材的体育用品服务商 | 北京租车牌|京牌指标租赁|小客车指标出租 | 智能汉显全自动量热仪_微机全自动胶质层指数测定仪-鹤壁市科达仪器仪表有限公司 | 发电机价格|发电机组价格|柴油发电机价格|柴油发电机组价格网 | 尊享蟹太太美味,大闸蟹礼卡|礼券|礼盒在线预订-蟹太太官网 | 沈阳建筑设计公司_加固改造设计_厂房设计_设计资质加盟【金辉设计】 | 气力输送设备_料封泵_仓泵_散装机_气化板_压力释放阀-河南锐驰机械设备有限公司 | 焦作网 WWW.JZRB.COM| 成都软件开发_OA|ERP|CRM|管理系统定制开发_成都码邻蜀科技 | 电销卡_北京电销卡_包月电话卡-豪付网络 | 布袋式除尘器|木工除尘器|螺旋输送机|斗式提升机|刮板输送机|除尘器配件-泊头市德佳环保设备 | 包塑软管|金属软管|包塑金属软管-闵彬管业 | 深圳彩钢板_彩钢瓦_岩棉板_夹芯板_防火复合彩钢板_长鑫 | 高压微雾加湿器_工业加湿器_温室喷雾-昌润空气净化设备 | 飞象网 - 通信人每天必上的网站| 杭州双螺杆挤出机-百科 | 冷却塔风机厂家_静音冷却塔风机_冷却塔电机维修更换维修-广东特菱节能空调设备有限公司 | 净化车间_洁净厂房_净化公司_净化厂房_无尘室工程_洁净工程装修|改造|施工-深圳净化公司 |