Affiliation:
1. MPS Classified Security Protection Evaluation Center
Abstract
This paper brought forward the layered protection of defense-in-depth on the basis of analyzing information classified protection core strategy and large corporations’ net structure 、management and security actuality. Different information systems in different domains are protected according to their security classes. At the same time, the relationship between the domains and their boundaries should be defined, and the protection of domains inside and boundary are implemented. The protection layers are gradually deployed breadth wise, the protection strength are increased lengthways. Finally the objective of defense-in-depth is reached, the protection capability of enterprise’s information system is enhanced.
Publisher
Trans Tech Publications, Ltd.
Reference9 articles.
1. Qiquan Guo. The New process of information classified protection. [Z]. The twelfth Information security session of China. 2011-4. (in Chinese).
2. Qianyuan Jing. The Implement of information classified protection policy [J/OL]. IT security world 2006-9 . (in Chinese).
3. Yuansheng Liu. Computer network security [M]. the second edition. Beijing: Qinghua University publishing House. 2009. (in Chinese).
4. ISO/IEC 13335-1 2004 Information technology-Guidelines for the management of Information and Communications Technology Security-Part 1:Concepts and models Information and CommunicationsTechnology Security Management [S].
5. The United States Security Beau. Information Assurance Technology Framework[M]. Beijing:Beijing Zhong Ruan publishing House,2002-4,20—24. (in Chinese).
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献