浏览全部资源
扫码关注微信
1. 中国科学院信息工程研究所 北京100093
2. 国家网络信息安全技术研究所 北京100029
3. 国家计算机网络应急技术处理协调中心 北京100029
[ "马明杰,女,现就职于中国科学院信息工程研究所,主要研究方向为工业控制系统信息安全。" ]
[ "孙奉刚,男,现就职于中国科学院信息工程研究所,主要研究方向为移动互联网。" ]
[ "翟立东,男,博士,中国科学院信息工程研究所副研究员,主要研究方向为移动互联网。" ]
[ "杜跃进,男,博士,国家网络信息安全技术研究所教授、网络安全应急技术国家工程实验室主任、国家网络信息安全技术研究所所长、国家计算机网络应急技术处理协调中心(CNCERT/CC)副总工程师,主要研究方向为基础网络、移动智能终端。" ]
网络出版日期:2014-07,
纸质出版日期:2014-07-20
移动端阅览
马明杰, 孙奉刚, 翟立东, 等. 网络安全新威胁下我国面临的安全挑战和对策建议[J]. 电信科学, 2014,30(7):8-12.
Mingjie Ma, Fenggang Sun, Lidong Zhai, et al. Security Cballenges Facing Our Country and Countermeasure Recommendations Under New Network Security Tbreats[J]. Telecommunications science, 2014, 30(7): 8-12.
马明杰, 孙奉刚, 翟立东, 等. 网络安全新威胁下我国面临的安全挑战和对策建议[J]. 电信科学, 2014,30(7):8-12. DOI: 10.3969/j.issn.1000-0801.2014.07.002.
Mingjie Ma, Fenggang Sun, Lidong Zhai, et al. Security Cballenges Facing Our Country and Countermeasure Recommendations Under New Network Security Tbreats[J]. Telecommunications science, 2014, 30(7): 8-12. DOI: 10.3969/j.issn.1000-0801.2014.07.002.
随着互联网以及周边网络产品的发展,信息安全越来越受到重视,“棱镜门”事件爆发后,国家级信息安全不仅引起了全球领导人的重视,更引起了全世界人民的广泛关注。分析了在网络安全新威胁下我国面临的安全挑战,并针对我国在信息安全领域中存在的问题提出未来网络发展的对策建议。
With the development of the internet and peripheral network products
information security draw more and more attention
after the outbreak of the prism
the national information security is not only caused the attention of world leaders
has attracted wide attention from people around the world. The security challenges in the new network security threats which our country was facing were analyzed and recommendations for future network development in China in the field of information security were put forward.
王柏松 . 中国新安全观及其安全战略选择研究 . 东北师范大学博士学位论文 , 2013 .
Baize E . Developing secure products in the age of advanced persistent threats . IEEE Security &; Privacy , 2012 , 10 ( 3 ): 88 ~ 92 .
Virvilis N , Gritzalis D , Apostolopoulos T . Trusted computing vs advanced persistent threats: can a defender win this game . Proceedings of 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing, Autonomic and Trusted Computing(UIC/ATC) , Vietri Sul Mare , 2013 : 396 ~ 403 .
Li F , Lai A , Ddl D . Evidence of advanced persistent threat: a case study of malware for political espionage . Proceedings of the 6th International Conference on Malicious and Unwanted Software(MALWARE), Fajardo , 2011 : 102 ~ 109 .
Mustafa T . Malicious data leak prevention and purposeful evasion attacks: an approach to advanced persistent threat(APT) management. Proceedings of 2013 Saudi International Electronics, Communications and Photonics Conference (SIECPC), Riyadh . Proceedings of 2013 Saudi International Electronics, Communications and Photonics Conference (SIECPC) , Riyadh , 2013 : 1 ~ 5 .
Symantec Security Response . The Elderwood Project(Infographic) . http://www.symantec.com/connect/blogs/elderwood-project-infographic http://www.symantec.com/connect/blogs/elderwood-project-infographic
杜跃进 . 国际对抗环境下的网络安全防护能力建设 . 信息网络安全 , 2013 ( 3 ): 86 ~ 88 .
杜跃进 . 陌生的危机:我国的网络安全形势 . 中国金融电脑 , 2014 ( 1 ): 32 ~ 35
Symantec Security Response The Elderwood Project(Infographic) . http://www.symantec.com/connect/blogs/elderwood-project-infographic,2014 http://www.symantec.com/connect/blogs/elderwood-project-infographic,2014
吴正龙 . “震网”的警示 . 解放日报 , 2011
启明星辰 . 八大典型 APT 攻击过程详解 , http://netsecurity.51cto.com/art/201308/408470_7.htm,2013 http://netsecurity.51cto.com/art/201308/408470_7.htm,2013
安天实验室,安全研究与应急处理中心 . 对Stuxnet蠕虫攻击工业控制系统事件的综合报告 , 2010
让我们一起来案例分析 第五期(极光行动) . http://bbs.51cto.com/thread-1062449-1.html,2014 http://bbs.51cto.com/thread-1062449-1.html,2014
0
浏览量
1625
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构