行业标准网
UNCLASSIFIED Appendix C IATF Release 3.1 September 2002 09/00 UNCLASSIFIED Page 1 of 785 C-1 第一章 前 言...................................................................................................... 27 1.1目的 ............................................................................................................................... ..27 1.2预期读者 .........................................................................................................................27 1.3背景情况 .........................................................................................................................28 1.3.1确定的信息基础设施 .........................................................................................28 1.3.2信息和信息基础设施分类 ................................................................................29 1.3.3边界和信息基础设施 .........................................................................................31 1.3.4信息保障框架范围 .............................................................................................32 1.3.5计算机威胁的实质 .............................................................................................38 1.4纵深防御 .........................................................................................................................41 1.4.1纵深防御与 IATF...........................................................................................42 1.5《信息保障技术框架》的结构 ......................................................................................43 第二章 纵深防御 ................................................................................................... 45 2.1介绍和关系图表 ................................................................................................................45 1.1用户环境的实例 ....................................................................................................45 2.1.1.1联邦计算环境 .......................................................................................45 2.1.1.2国防部( DoD)计算环境 ......................................................................47 2.2 对手、动机和攻击的分类 ...............................................................................................48 2.3人、技术、运行 .............................................................................................................51 2.3.1人.....................................................................................................................52 2.3.2技术 ................................................................................................................53 2.3.3运行 ................................................................................................................54 2.4纵深防御目标概揽 .........................................................................................................55 2.5附加资源 .........................................................................................................................60 第三章 信息系统安全工程 ................................................................................... 61 3.1简介 ............................................................................................................................... .....61 3.2原理 ............................................................................................................................... .....64 3.3过程 ............................................................................................................................... .....65 3.3.1发掘信息保护需求 ......................................................................................65 3.3.2确定系统安全要求 ......................................................................................68 UNCLASSIFIED Appendix C IATF Release 3.1 September 2002 09/00 UNCLASSIFIED Page 2 of 785 C-2 3.3.3设计系统安全体系结构 ..............................................................................70 3.3.4开发详细安全设计 ..................................................................................

pdf文档 IATF_中文版

文档预览
中文文档 784 页 50 下载 1000 浏览 0 评论 0 收藏 3.0分
温馨提示:本文档共784页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
IATF_中文版 第 1 页 IATF_中文版 第 2 页 IATF_中文版 第 3 页
下载文档到电脑,方便使用
本文档由 SC 于 2023-05-03 01:08:07上传分享
站内资源均来自网友分享或网络收集整理,若无意中侵犯到您的权利,敬请联系我们微信(点击查看客服),我们将及时删除相关资源。