scholarly journals Research and Evaluation of Security Audit Technology in the Era of Network Security Level Protection 2.0

2020 ◽  
Vol 1646 ◽  
pp. 012002
Author(s):  
Zhijie Li ◽  
Hui Suo
2014 ◽  
Vol 8 (3) ◽  
pp. 193-208 ◽  
Author(s):  
Martin Suhartana ◽  
Bens Pardamean ◽  
Benfano Soewito

Author(s):  
Xia-Meng Si

As the development of mobile internet bring convenient for people, the openness and variety of services make its security issues more complicated than those of traditional network. Firewall and intrusion detection focuses on external aggression, and cannot prevent revealing of internal information. As supplementary, security audit technology can monitor internal users' activity, forbid abnormal behavior of internal users. The author introduces related works about mobile internet security audit, comb through matured products on the market, and analyze current security status and architecture of mobile internet security. Based on the research results of traditional network security audit, the author provides a functional framework and universal model of mobile internet security auditing, as well as introduce an application scenario.


2011 ◽  
Vol 474-476 ◽  
pp. 527-530
Author(s):  
Yu Jiao Wang ◽  
Hai Yun Lin

The basis to build effective network security protection is to reasonably evaluate on network security. Based on analysis on shortcomings of existing network security evaluation methods, the paper built network security evaluation index system according to CC specifications. The advantages of local variable weight comprehensive method were analyzed and the method of network security evaluation based on combination of AHP and local variable weight was presented. The evaluation example on some network elements indicates that the method evaluate on overall information security level, so that the evaluation result be objective and reasonable.


Sign in / Sign up

Export Citation Format

Share Document