共查询到20条相似文献,搜索用时 15 毫秒
1.
蔡浩仁 《自动化与仪器仪表》2021,(2):85-88,92
数据链路层安全风险的大小和发生的概率决定了整个数据链路层的安全.有效的安全风险评估有助于检测系统的安全防护,降低数据链路层的安全风险,并提高检测系统的抵御安全风险的能力.在贝叶斯网络和D-S证据理论的基础上,结合这两种方法,对数据链路层影响因素进行了量化,得到数据链路层的风险值.然后构建了系统的节点模型和进程模型.最后... 相似文献
2.
At present, there are a large number of trends and developments in artificial intelligence systems. This paper deals with the available intelligent data analysis in information security and the possibilities provided by data mining. Examples of tasks that can be solved using artificial intelligence systems are presented, including safe resource management, prediction of critical states and failures, resolution of conflicts in computational processes and information security regulations, and forensics. 相似文献
3.
It is a common saying that a chain is only as strong as its weakest link-a phrase information security officers, IT managers, consultants, researchers, journalists, and opinion makers reiterate ad nauseam when referring to an organization's information security posture. Most in the information security community would agree that a security architecture is only as strong as its weakest link. However, they usually cannot agree on what that is, and no expert risks making a definite statement about it. We can argue that a security strategy's weakest component will vary from one organization to in other but perhaps we should compare past perceptions of what a weakest link is to what it could well be in the near future. 相似文献
4.
5.
6.
周哲韫 《网络安全技术与应用》2014,(10):111-111
云计算技术是计算机技术未来发展趋势,云计算技术基于Internet技术,现在是网络时代,数据在网络上传播,保护数据的安全性是迫在眉睫,在云计算技术开发大数据的平台下,如何保护数据的安全是学者广泛研究的范畴.本论文从基于云计算环境下对开发数据的安全性进行研究,从不同层面阐述数据安全性的重要,希望本论文能为研究元计算技术安全性的学者提供理论参考依据. 相似文献
7.
传统的循环流化床仿真的数学模型都采用反应动力学的方法。本文采用了CSTR的平衡反应算法,对循环流化床建立仿真的数学模型,已用于100MW循环流化床的实际工业装置仿真培训器中,算法比较稳定,模拟了循环流化床的开停车、事故处理和正常操作,动态趋势和实际工业装置相符。与设计值相比,模拟的稳态误差在1%以内,动态误差在5%以内。 相似文献
8.
9.
10.
白运会 《网络安全技术与应用》2014,(11):101-101
继云计算、物联网被发明和应用之后,大数据成为了当前信息产业的又一大技术创新。大数据技术创新在给人们带来机会和挑战的同时也对现有的信息安全手段提出了更高的要求。特别是大数据技术在金融行业的应用,现在的金融信息化已全面进入信息安全管理阶段,对计算机信息系统有着高度的依赖性,金融信息安全问题日益突显。本文主要论述了大数据时代对信息安全存在的威胁,并提出了如何采取对策确保大数据环境下的金融信息安全。 相似文献
11.
Knowledge sharing plays an important role in the domain of information security, due to its positive effect on employees' information security awareness. It is acknowledged that security awareness is the most important factor that mitigates the risk of information security breaches in organizations. In this research, a model has been presented that shows how information security knowledge sharing (ISKS) forms and decreases the risk of information security incidents. The Motivation Theory and Theory of Planned Behavior besides Triandis model were applied as the theoretical backbone of the conceptual framework. The results of the data analysis showed that earning a reputation, and gaining promotion as an extrinsic motivation and curiosity satisfaction as an intrinsic motivation have positive effects on employees' attitude toward ISKS. However, self-worth satisfaction does not influence ISKS attitude. In addition, the findings revealed that attitude, perceived behavioral control, and subjective norms have positive effects on ISKS intention and ISKS intention affects ISKS behavior. The outcomes also showed that organizational support influences ISKS behavior more than trust. The results of this research should be of interest to academics and practitioners in the domain of information security. 相似文献
12.
This paper describes a computer simulation model capable of predicting the performance of a high data rate end-to-end communication system for biphase and quadriphase CPSK transmission. Simulation results are compared with laboratory measurements in order to verify the simulation procedure. Ultimately, the simulation model is utilized to conduct a parameter sensitivity analysis for the purpose of evaluating the effect of different signal distortion phenomena on link performance. 相似文献
13.
为了有效解决信息安全证据获取和证据规范化等难题,文章从数据挖掘的角度,阐述了如何搜集、处理信息安全在搜索潜在威胁时的证据,给出了如何获取证据以及证据的规范化表示的基本思路,从而增强了信息网络的安全信任属性。 相似文献
14.
蔡艳 《网络安全技术与应用》2013,(10):58-58,109
信息的收集,运用以及控制的竞争日益加剧,因此网络的安全问题也逐渐的成为了社会关注的主要问题,信息安全也已成为保障国家安全和社会稳定的重点方面.如何识别防御和攻击以及增强网络的安全已经成为技术管理人员研究的重要方面.网络安全领域的一个热门话题就是入侵检测.入侵检测的主要分析方法是异常检测和误用检测两种方法. 相似文献
15.
Shyue-Liang Wang Jyun-Da Chen Paul A. Stirpe Tzung-Pei Hong 《Journal of Intelligent Information Systems》2011,36(3):329-345
Based on given data center network topology and risk-neutral management, this work proposes a simple but efficient probability-based
model to calculate the probability of insecurity of each protected resource and the optimal investment on each security protection
device when a data center is under security breach. We present two algorithms that calculate the probability of threat and
the optimal investment for data center security respectively. Based on the insecurity flow model (Moskowitz and Kang 1997) of analyzing security violations, we first model data center topology using two basic components, namely resources and filters,
where resources represent the protected resources and filters represent the security protection devices. Four basic patterns are then identified as the building blocks for the first algorithm,
called Accumulative Probability of Insecurity, to calculate the accumulative probability of realized threat (insecurity) on each resource. To calculate the optimal security
investment, a risk-neutral based algorithm, called Optimal Security Investment, which maximizes the total expected net benefit is then proposed. Numerical simulations show that the proposed approach coincides
with Gordon’s (Gordon and Loeb, ACM Transactions on Information and Systems Security 5(4):438–457, 2002) single-system analytical model. In addition, numerical results on two common data center topologies are analyzed and compared
to demonstrate the effectiveness of the proposed approach. The technique proposed here can be used to facilitate the analysis
and design of more secured data centers. 相似文献
16.
施柏铨 《网络安全技术与应用》2013,(10):56-56,51
信息技术和网络安全在网络安全技术领域颇为人们关心,随着信息技术和网络水平的不断发展,信息和网络安全成为人们最注重的问题.本文就对信息和网络的安全体系模型进行了简单的探讨. 相似文献
17.
针对智能可穿戴式医疗设备在医疗数据信息安全中的应用进行研究,分别分析了其在生物密钥、量子密钥、异构网络密钥中的应用.在生物密钥中应用智能可穿戴医疗设备可以实现通信中的双方认证,抵抗已知攻击;在量子密钥中应用智能可穿戴医疗设备可以对传输的信息进行数次加密处理,能够在理论层面上保障其信息的安全性;在异构网络密钥中应用智能可... 相似文献
18.
One of the methods for information security risk assessment is the substantiated choice and realization of countermeasures against threats. A situational fuzzy OWA model of a multicriteria decision making problem concerning the choice of countermeasures for reducing information security risks is proposed. The proposed model makes it possible to modify the associated weights of criteria based on the information entropy with respect to the aggregation situation. The advantage of the model is the continuous improvement of the weights of the criteria and the aggregation of experts’ opinions depending on the parameter characterizing the aggregation situation. 相似文献
19.
基于企业涉密信息检测的数据安全解决方案 总被引:1,自引:2,他引:1
在综合考虑网络安全与内容安全的基础上提出了一种基于企业涉密信息检测的数据安全解决方案,方案从网络拓扑构成,安全体系结构及安全管理控制平台角度讨论了企业数据在Intemet安全传输涉及的物理安全、系统/桌面安全,网络安全、数据安全、应用安全和管理安全等因素,给出了相应的实现方法,并提出了一种加密传输方法,保障了企业数据传输的机密性、完整性和可用性. 相似文献