²é¿´: 1983  |  »Ø¸´: 3
±¾Ìû²úÉú 1 ¸ö ·­ÒëEPI £¬µã»÷ÕâÀï½øÐв鿴

cxkhjjh

ľ³æ (СÓÐÃûÆø)


[½»Á÷] ÇóһƪÂÛÎÄÕªÒªµÄÓ¢Óï·­Ò룺»ùÓڵȼ¶±£»¤µÄÐÅÏ¢°²È«×Ô¶¯»¯²âÆÀÑо¿

л¾ø»úÆ÷·­Òë
»ùÓڵȼ¶±£»¤µÄÐÅÏ¢°²È«×Ô¶¯»¯²âÆÀÑо¿
Õª  Òª
ÏÖ½ñÉç»á£¬ÐÅÏ¢°²È«µÄÖØÒªÐÔÒѾ­²»ÑÔ¶øÓ÷£¬Ëæ×ŹúÄÚÍâµÄÕþÖξ­¼Ã¾ºÕù¼Ó¾ç£¬Éæ¼°µ½¹ú¼Ò°²È«Óë¹ú¼ÆÃñÉúµÄ¹ú¼ÒÕþ¸®µ¥Î»ÄÚ²¿ÐÅÏ¢£¬Æä°²È«ÐԵĹÜÀí¸üÊÇÈÕÒæÔöÇ¿¡£Èç½ñ£¬ÈÕÒæÅÓ´óµÄÐÅÏ¢¶àÒÔµç×ÓµÄÐÎʽ´æ´¢ÔÚ¸÷ÀàÐÅϢϵͳÖУ¬Òò´Ë¶ÔÐÅϢϵͳµÄ¹ÜÀíÓÈÎªÖØÒª¡£ÔÚÕâÖÖÇé¿öÏ£¬¹úÎñÔºÔÚ1994Äê·¢³öµÄ147ºÅÁîÖ¸³ö£º¡°¼ÆËã»úÐÅϢϵͳʵÐа²È«µÈ¼¶±£»¤¡±¡£²¢ÔÚ2001Äê·¢²¼ÊµÊ©¹ú¼ÒÇ¿ÖÆ±ê×¼¡¶¼ÆËã»úÐÅϢϵͳ°²È«µÈ¼¶±£»¤»®·Ö×¼Ôò¡·£¨GB17859-1999£©¡£È»¶ø£¬ÓÉÓÚÐÅϢϵͳʹÓÃÁ¿±È½Ï´ó£¬·Ö²¼Ïà¶Ô·ÖÉ¢£¬¹ÜÀíÈËÔ±µÄµÄˮƽ²Î²î²»Æë£¬¼«Ò×Ôì³ÉÐÅϢϵͳµÄ¹ÜÀí³öÏÖ¡°¶Ì°å¡±£¬Ê¹´óÁ¿µÄͶÈëµÃ²»µ½Ó¦ÓеIJú³ö¡£
ÐÅÏ¢°²È«×Ô¶¯»¯Êǽâ¾öÕâÒ»ÎÊÌâµÄÒ»ÖÖ·½·¨£¬ÐÅÏ¢°²È«×Ô¶¯»¯µÄÄ¿±êÊÇͨ¹ý¼¼ÊõÉϵķûºÏÐÔ¼ì²éÀ´ÊµÏÖÐÅϢϵͳµÄ´àÈõÐÔºÍÅäÖõĹÜÀí£¬´Ó¶ø¼õÉÙÈËÔ±µÄ¹¤×÷Á¿£¬Ê¹ÐÅϢϵͳµÄ°²È«Ë®Æ½±£³ÖÒ»Ö¡£²¢ÔÚ´Ë»ù´¡ÉÏÖð½¥½«Éæ¼°µ½¹ÜÀí·ûºÏÐԵļì²é£¬Éæ¼°µ½ÐÅÏ¢°²È«µÄ¸÷¸ö²ãÃæ£¬´Ó¶ø¼õÉÙÈËΪÒòËØµÄÓ°Ïì¡£
ĿǰÎÒ¹úµÄµÈ¼¶±£»¤¹¤×÷ÕýÔÚ´óÁ¦ÍÆÐУ¬È»¶øÓÉÓÚÐÅϢϵͳ·Ö²¼¹ã·º£¬ÐèҪͶÈë´óÁ¿µÄÈËÁ¦£¬Òò´Ë£¬ÍÆÐÐÏà¶Ô»ºÂý¡£±¾ÂÛÎĽ«ÐÅÏ¢°²È«×Ô¶¯»¯ÓëµÈ¼¶±£»¤¹¤×÷½øÐнáºÏ£¬¸ù¾ÝĿǰµÈ¼¶±£»¤²âÆÀµÄ¾­Ñ飬ÔÚĿǰµÈ¼¶±£»¤²âÆÀʵʩ·½·¨µÄ»ù´¡ÉÏÌá³öÒ»ÖÖÐÅÏ¢²âÆÀ¹¤¾ßÉè¼ÆÀíÄ»ùÓÚ¿ª·Å±ê×¼µÄÐÅÏ¢°²È«²âÆÀ£¬²¢ÊµÏÖÆä»ù±¾¹¦ÄÜ£¬¼´¹¤¾ßVcheck¡£ÎÄÖжÔVcheckµÈ¼¶±£»¤²âÆÀ¹¤¾ßµÄÉè¼ÆË¼Â·ºÍʵÏÖ¹ý³Ì½øÐÐÁËÃèÊö£¬²¢¸ø³öÁËÆä½ñºóµÄ·¢Õ¹·½Ïò¡£

» ²ÂÄãϲ»¶

» ÇÀ½ð±ÒÀ²£¡»ØÌû¾Í¿ÉÒԵõ½:

²é¿´È«²¿É¢½ðÌù

ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

wust67

½ð³æ (ÖøÃûдÊÖ)


cxkhjjh(½ð±Ò+1, ·­ÒëEPI+1):лл¡£ 2010-11-15 10:40:47
cxkhjjh(½ð±Ò+30): 2010-11-20 09:16:17
»ùÓڵȼ¶±£»¤µÄÐÅÏ¢°²È«×Ô¶¯»¯²âÆÀÑо¿
Study on auto-evaluation of information security based on graded protection
2Â¥2010-11-14 21:41:18
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû
cxkhjjh(½ð±Ò+1):лл¡£ 2010-11-15 10:41:09
cxkhjjh(½ð±Ò+30): 2010-11-20 09:16:29
In the morden soceity£¬the significance of information safety is well known to us. With national and international competion from political and economic fields, the safe management of the information, involved in national safe and internal communication of stat-owned branches, has been increaseingly strenthened, because it is close related to national economy and livelihood of the people. At present, because numerous information are considerablely saved in varied information systems in electronic forms, it is of significance to manage those systems carefully. Accordingly, the No.147 decree was promulgated in 1994. Namely, the gaded safe protection on computer system should be brought into effect. A further forced national standard was issued, the guideline of graded protection for computer information systems. However, because of numerous processed information, relatively wide distrbution and difference in the capablity of the managing staff, short board from the infromation managenment system often occurs, resulting in limited gain with numerous payout.
Automation of information safety is an approach to solve the above problem. The objective of automation is to test the weakness of such system by technological coincidence and fine distrbution management, thus reducing the work amount and keeping the information system with the same safe level. Such check is involed in varied apects of information safety and could reduce the man-made interference.At present, much efforts was devoted to the extension of the graded protection in our country. Because of wide distribution and numerous required manpower, so the speed of such spread is rather low. In the paper, the information safety automation was combinated with the graded protection and a novel concept was put froward, which is based on the experiences of current graded protection test and detailed test method. Namely, the realization of the basic function is founded on the base of imformation safety check with the open stanard, called Vcheck tool. In addition, the designing approach and realization of the Vcheck tool for the graded protection check were discussed and the development direction in the future was pointed out.
3Â¥2010-11-14 22:20:57
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû
cxkhjjh(½ð±Ò+15):лл¡£ 2010-11-15 10:41:35
cxkhjjh(½ð±Ò+20):ÔÙл¡£ 2010-11-16 17:50:46
cxkhjjh(½ð±Ò+3): 2010-11-20 09:16:56
corrected :
    The Study of information security auto-evaluation based on graded protection

In the modern society£¬the significance of information safety is well known to us. With national and international competitions from the political and economic fields, the safe management of the information, involved in national security and internal communication of stat-owned branches, has been increasingly strengthened, because it is close related to national economy and livelihood of the people. At present, because a plentiful of information was considerably saved in varied information systems in electronic forms, it is of significance to manage those systems carefully. Accordingly, the No.147 decree was promulgated in 1994. Namely, the graded safety protection on computer system should be brought into effect. A further forced national standard was issued, the guideline of graded protection for computer information systems. However, because of numerous processed information, relatively wide distribution and difference in the capability of the managing staff, short board from the information management system often occurs, resulting in limited gain with high payout.
       Automation of information safety is an approach to solve the above problem. The objective of automation is to test the weakness of such system by technological coincidence and fine distribution management, thus reducing the work amount and keeping the information system with the same safe level. Such check is involved in varied aspects of information safety and could reduce the man-made interference. At present, many efforts were devoted to the extension of the graded protection in our country. Because of wide distribution and numerous required man-powers, so the speed of such spread is rather low. In the paper, the information safety automation was combined with the graded protection and a novel concept was put forward, which is based on the experiences of current graded protection test and detailed test method. Namely, the realization of the basic function is founded on the base of information safety check with the open standard, called V-check tool. In addition, the designing approach and realization of the Vcheck tool for the graded protection check were discussed and the development direction in the future was pointed out.
4Â¥2010-11-15 09:48:28
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû
Ïà¹Ø°æ¿éÌø×ª ÎÒÒª¶©ÔÄÂ¥Ö÷ cxkhjjh µÄÖ÷Ìâ¸üÐÂ
×î¾ßÈËÆøÈÈÌûÍÆ¼ö [²é¿´È«²¿] ×÷Õß »Ø/¿´ ×îºó·¢±í
[ÂÛÎÄͶ¸å] ÉêÇë»Ø¸åÑÓÆÚÒ»¸öÔ£¬±à¼­Í¬ÒâÁË¡£µ«ÏµÍ³ÉϵÄʱ¼äû±ä£¬¸ø±à¼­ÓÖдÓʼþÁË£¬Ã»»Ø¸´ 10+3 wangf9518 2026-03-17 4/200 2026-03-19 23:55 by babero
[¿¼ÑÐ] 085600²ÄÁÏÓ뻯¹¤ Çóµ÷¼Á +14 enenenhui 2026-03-13 15/750 2026-03-19 21:53 by allen-yin
[¿¼ÑÐ] ¡¾¿¼Ñе÷¼Á¡¿»¯Ñ§×¨Òµ 281·Ö£¬Ò»Ö¾Ô¸ËÄ´¨´óѧ£¬³ÏÐÄÇóµ÷¼Á +5 ³Ô³Ô³Ô²ÅÓÐÒâÒå 2026-03-19 5/250 2026-03-19 16:18 by 30660438
[¿¼ÑÐ] 304Çóµ÷¼Á +3 ÂüÊâ2266 2026-03-18 3/150 2026-03-19 14:42 by peike
[¿¼ÑÐ] 346Çóµ÷¼Á[0856] +3 WayneLim327 2026-03-16 6/300 2026-03-19 11:21 by WayneLim327
[¿¼ÑÐ] 332Çóµ÷¼Á +3 ydfyh 2026-03-17 3/150 2026-03-19 10:14 by ¹¦·ò·è¿ñ
[¿¼ÑÐ] ¡¾Í¬¼ÃÈí¼þ¡¿Èí¼þ£¨085405£©¿¼ÑÐÇóµ÷¼Á +3 2026eternal 2026-03-18 3/150 2026-03-18 19:09 by ²«»÷518
[¿¼ÑÐ] »¯Ñ§¹¤³Ì321·ÖÇóµ÷¼Á +15 ´óÃ×·¹£¡ 2026-03-15 18/900 2026-03-18 14:52 by haxia
[¿¼ÑÐ] 070300»¯Ñ§319Çóµ÷¼Á +6 ½õÀð0909 2026-03-17 6/300 2026-03-18 13:22 by Iveryant
[¿¼ÑÐ] 280Çóµ÷¼Á +6 ¹¾ààÏþÏþ 2026-03-18 7/350 2026-03-18 11:25 by Î޼ʵIJÝÔ­
[¿¼ÑÐ] 278Çóµ÷¼Á +5 ÑÌ»ðÏÈÓÚ´º 2026-03-17 5/250 2026-03-18 08:43 by ÐÇ¿ÕÐÇÔÂ
[¿¼ÑÐ] 334Çóµ÷¼Á +3 Ö¾´æ¸ßÔ¶ÒâÔÚ»úÐ 2026-03-16 3/150 2026-03-18 08:34 by lm4875102
[¿¼ÑÐ] ²ÄÁÏר˶326Çóµ÷¼Á +6 Ä«ìÏæ¦Ý· 2026-03-15 7/350 2026-03-17 17:10 by ruiyingmiao
[¿¼ÑÐ] 302Çóµ÷¼Á +4 С¼Öͬѧ123 2026-03-15 8/400 2026-03-17 10:33 by С¼Öͬѧ123
[¿¼ÑÐ] 278Çóµ÷¼Á +3 Yy7400 2026-03-13 3/150 2026-03-17 08:24 by laoshidan
[¿¼ÑÐ] 11408 Ò»Ö¾Ô¸Î÷µç£¬277·ÖÇóµ÷¼Á +3 zhouzhen654 2026-03-16 3/150 2026-03-17 07:03 by laoshidan
[¿¼ÑÐ] [µ¼Ê¦ÍƼö]Î÷ÄϿƼ¼´óѧ¹ú·À/²ÄÁϵ¼Ê¦ÍƼö +3 ¼â½ÇСºÉ 2026-03-16 6/300 2026-03-16 23:21 by ¼â½ÇСºÉ
[¿¼ÑÐ] ¶«ÄÏ´óѧ364Çóµ÷¼Á +5 JasonYuiui 2026-03-15 5/250 2026-03-16 21:28 by ľ¹Ï¸à
[¿¼ÑÐ] 304Çóµ÷¼Á +5 ËØÄê¼ÀÓï 2026-03-15 5/250 2026-03-16 17:00 by ÎҵĴ¬Îҵĺ£
[¿¼ÑÐ] 326Çóµ÷¼Á +3 mlpqaz03 2026-03-15 3/150 2026-03-16 07:33 by Iveryant
ÐÅÏ¢Ìáʾ
ÇëÌî´¦ÀíÒâ¼û