首页 | 本学科首页   官方微博 | 高级检索  
     

计算机网络入侵应急响应的研究
引用本文:陈祖义,华勇. 计算机网络入侵应急响应的研究[J]. 计算机安全, 2009, 0(7): 66-69
作者姓名:陈祖义  华勇
作者单位:空军第一航空学院,河南,信阳,464000
摘    要:
计算机网络入侵事件经常带来灾难性的后果,为了尽快恢复系统或网络的正常运转,应急响应是一个非常重要的阶段。阐述了应急响应是安全保障工作中一个非常重要的环节,是信息安全周期的必要组成部分。安全事件应急响应在刚刚起步时仅仅是出于个别管理的需要,之后它的重要性逐渐增加并开始成为网络安全管理方面一个活跃的发展方向,重点从方法学方面叙述了网络入侵应急响应的一般流程和遇到的各种问题的相应对策,从而使在实际的响应过程中真正做到井然有序地进行。

关 键 词:安全生命周期  应急响应  入侵检测  入侵分析  系统恢复

Research of Computer Network Intrusion Emergency Response
CHEN Zu-yi,HUA Yong. Research of Computer Network Intrusion Emergency Response[J]. Network & Computer Security, 2009, 0(7): 66-69
Authors:CHEN Zu-yi  HUA Yong
Affiliation:(The First Aeronautic Institute Of Air Force Xinyang Henan 464000 China)
Abstract:
Computer network intrusion events often cause catastrophic results.In order to bring the system or network back to running quickly, emergency response is a very important stage. This paper described that emergency response is a extra important tache of the security guarantee and it is the composing of the cycle of information security. At the beginning, the emergency response is needed only by administration in one or more specific aspects, and since then it s importance gradually increased. Now it is a active developing direction of network security and management. This paper focus on the general flow of emergency response to network intrusion and the countermeasure to all kinds of problems from methodology point of view. Consequently, the response process will run in apple--pie order.
Keywords:the cycle of information security  emergency response  intrusion detection  intrusion analysis  system recovery
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号