关键基础设施安全防护

被引:48
作者
卿斯汉 [1 ,2 ,3 ]
机构
[1] 中国科学院软件研究所
[2] 信息安全国家重点实验室
[3] 北京大学软件与微电子学院
关键词
关键基础设施; 云安全; 操作系统安全; 可信计算; 身份鉴别;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
随着互联网应用的飞速发展,网络安全威胁持续增长。关键基础设施的建设与安全防护关乎国家安全,必须高度重视。文章阐述了美国和欧洲的措施,分析了中国应当如何应对,并从技术层面论述了基础软件与硬件、云计算基础设施、可信计算技术、身份鉴别机制等面临的技术挑战,分析了技术走势与最新进展。
引用
收藏
页码:1 / 6
页数:6
相关论文
共 18 条
  • [1] TPM 2.0. http://www.trustedcomputinggroup.org/resources/tpm_library_specification . 2015
  • [2] Federal Risk and Authorization Management Program. http://cloud.cio.gov/fedramp . 2015
  • [3] Framework for Improving Critical Infrastructure Cybersecurity. http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214-final.pdf . 2014
  • [4] The NIST Definition of Cloud Computing[OL]. National Institute of Standards and Technology. http://csrc.nist.gov/publications/ nistpubs/800-145/SP800-145.pdf . 2011
  • [5] NATIONAL CYBER SECURITY FRAMEWORK MANUAL. https://ccdcoe.org/publications/books/National Cyber Security Framework Manual.pdf . 2015
  • [6] Windows. http://windows.microsoft.com/en-us/windows-10/about . 2015
  • [7] What is Data Execution Prevention?. http://windows.microsoft.com/en-us/windows-vista/what-is-data-executionprevention . 2015
  • [8] IMPROVING CRITICAL INFRASTRUCTURE CYBERSE CURITY. http://www.whitehouse.gov/the-pressoffice/2013/02/12/executive-order-improving-critical-infrastructurecybersecurity . 2013
  • [9] Top Threats to Cloud Computing V1.0. CSA. https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf . 2010
  • [10] FIDO Alliance. http://fidoalliance.org/ . 2015