首页 | 本学科首页   官方微博 | 高级检索  
     

信息系统安全漏洞研究
引用本文:张涛,吴冲. 信息系统安全漏洞研究[J]. 哈尔滨工业大学学报(社会科学版), 2008, 10(4)
作者姓名:张涛  吴冲
作者单位:哈尔滨工业大学,经济与管理学院,哈尔滨,150001
基金项目:高等学校博士学科点专项科研项目,黑龙江省社会科学基金,国家哲学社会科学创新基地基金
摘    要:信息系统安全漏洞是信息时代存在的一种客观对象,针对信息系统安全漏洞的研究对保护网络安全和信息安全有着重要意义。首先在国内外已有的研究基础上,提出系统地、全面地开展信息系统安全漏洞的研究。然后从信息系统管理角度和技术角度对漏洞做了区分,并且从信息系统安全漏洞存在的宿主和起因对其类型进行了分析,对信息系统安全漏洞的定义做了明确。最后从信息系统安全漏洞研究的主体、客体、行为和属性四个方面进行了论述,提出信息系统安全漏洞生命周期的概念,使信息系统安全漏洞的研究能够从标准规范、知识体系、关键技术与基础理论等多个方面有系统、有针对性的开展。

关 键 词:信息系统  信息安全  安全漏洞

Reasearch on Information System Security Vulnerability
ZHANG Tao,WU Chong. Reasearch on Information System Security Vulnerability[J]. Journal of Harbin Institute of Technology(Social Sciences Edition), 2008, 10(4)
Authors:ZHANG Tao  WU Chong
Affiliation:ZHANG Tao; WU Chong(School of Management; Harbin Institute of Technology; Harbin 150001; China);
Abstract:The information system security vulnerability exists objectively in the information age.It is of great importance to research on the information system security vulnerabilities for the protection of network security and information security.Based on the prior research,this paper proposes a method of studying the security vulnerabilities systematically and thoroughly.Vulnerabilities are classified from the perspective of management and technology.The types of vulnerabilities are analyzed according to their existent and cause.A definition of the information system security vulnerability is also identified.After discussing the subject,the object,the action and the property of the security vulnerabilities research,a definition of the life cycle of information system security vulnerability is present,so the research on information system security vulnerabilities can be implemented systematically in the areas including the criterion,the knowledge framework,the key technology and the basic theory.
Keywords:information system  information security  security vulnerability
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号