-
>
全國計算機等級考試最新真考題庫模擬考場及詳解·二級MSOffice高級應用
-
>
決戰行測5000題(言語理解與表達)
-
>
軟件性能測試.分析與調優實踐之路
-
>
第一行代碼Android
-
>
JAVA持續交付
-
>
EXCEL最強教科書(完全版)(全彩印刷)
-
>
深度學習
網絡安全應急響應基礎理論及關鍵技術 版權信息
- ISBN:9787121437311
- 條形碼:9787121437311 ; 978-7-121-43731-1
- 裝幀:平塑
- 冊數:暫無
- 重量:暫無
- 所屬分類:>>
網絡安全應急響應基礎理論及關鍵技術 本書特色
本書主要針對網絡安全專業的從業者、學生、愛好者,概述了網絡安全應急響應方面國外的應對舉措、以及我國應急響應體系及機構建設、法律法規解讀,并對應急響應所涉及的基礎理論和關鍵技術進行了重點研究及闡釋,幫助從業人員全面了解國際國內應急響應國家的法律、法規、行業標準及規范、關鍵技術原理及應用,本書注重理論闡釋和實踐在操作相結合的原則,通過案例分析和工具使用,一是加強對理論的理解,同時也有助于提高讀者的動手操作能力。
網絡安全應急響應基礎理論及關鍵技術 內容簡介
本書主要針對網絡安全專業的從業者、學生、愛好者,概述了網絡安全應急響應方面國外的應對舉措、以及我國應急響應體系及機構建設、法律法規解讀,并對應急響應所涉及的基礎理論和關鍵技術進行了重點研究及闡釋,幫助從業人員全面了解國際國內應急響應國家的法律、法規、行業標準及規范、關鍵技術原理及應用,本書注重理論闡釋和實踐在操作相結合的原則,通過案例分析和工具使用,一是加強對理論的理解,同時也有助于提高讀者的動手操作能力。
網絡安全應急響應基礎理論及關鍵技術 目錄
1.1 網絡安全應急響應業務的由來 ·······························································.1
1.2 國際網絡安全應急響應組織的發展 ·························································.2
1.2.1 FIRST 介紹 ···············································································.2
1.2.2 APCERT 介紹 ············································································.2
1.2.3 國家級 CERT 情況······································································.2
1.3 我國網絡安全應急響應組織體系的發展簡介 ·············································.3
第2章 網絡安全應急響應概述 ···························································.5
2.1 網絡安全應急響應相關概念 ··································································.5
2.2 網絡安全與信息安全 ···········································································.5
2.3 產生網絡安全問題的原因分析 ·······························································.6
2.3.1 技術方面的原因 ·········································································.6
2.3.2 管理方面的原因 ·········································································.8
第3章 網絡安全應急響應法律法規 ·····················································.9
3.1 我國網絡安全應急響應相關法律法規、政策 ·············································.9
3.2 《網絡安全法》的指導意義 ·································································.10
3.2.1 建立網絡安全監測預警和信息通報制度 ·········································.10
3.2.2 建立網絡安全風險評估和應急工作機制 ·········································.11
3.2.3 制定網絡安全事件應急預案并定期演練 ·········································.12
3.3 《信息安全技術 信息安全應急響應計劃規范》(GB/T24363—2009) ··················.13
3.3.1 應急響應需求分析和應急響應策略的確定 ······································.14
3.3.2 編制應急響應計劃文檔 ······························································.14
3.3.3 應急響應計劃的測試、培訓、演練 ···············································.14
3.3.4 應急響應計劃的管理和維護 ························································.14
3.4 信息安全事件分類分級 ·······································································.15
3.4.1 分類分級規范的重要意義 ···························································.15
3.4.2 信息安全事件分類原則 ······························································.16
3.4.3 信息安全事件分級原則 ······························································.16
第4章 網絡安全應急響應的常用模型 ················································.18
4.1 網絡殺傷鏈與反殺傷鏈模型 ·································································.18
4.2 鉆石模型 ··························································································.19
4.3 自適應安全框架 ················································································.21
4.4 網絡安全滑動標尺模型 ·······································································.22
第5章 應急響應處置流程 ·······························································.24
5.1 準備階段 ··························································································.24
5.1.1 準備的目的 ··············································································.24
5.1.2 準備的實施 ··············································································.25
5.2 檢測階段 ··························································································.27
5.2.1 檢測的目的 ··············································································.27
5.2.2 檢測的實施 ··············································································.27
5.3 遏制階段 ··························································································.28
5.3.1 遏制的目的 ··············································································.28
5.3.2 遏制的實施 ··············································································.29
5.4 根除階段 ··························································································.30
5.4.1 根除的目的 ··············································································.30
5.4.2 根除的實施 ··············································································.30
5.5 恢復階段 ··························································································.31
5.5.1 恢復的目的 ··············································································.31
5.5.2 恢復的實施 ········
網絡安全應急響應基礎理論及關鍵技術 作者簡介
劉永剛,男,本科畢業,高級工程師。1984年10月份入伍,1986年9月至1989年7月于中國人名解放軍重慶通信學院學習,畢業后被分配61938部隊從事網絡運行管理。1992年9月至1996年7月在合肥電子工程學院學習。畢業后至今,回原單位先后任工程師、訓練室主任、分站副站部長、站長、高級工師等職。2007年被評為總參優秀專業技術人才,并享受部隊特殊津貼,現為站專家委員會委員。
- >
伯納黛特,你要去哪(2021新版)
- >
詩經-先民的歌唱
- >
羅曼·羅蘭讀書隨筆-精裝
- >
朝聞道
- >
史學評論
- >
大紅狗在馬戲團-大紅狗克里弗-助人
- >
月亮與六便士
- >
中國人在烏蘇里邊疆區:歷史與人類學概述