首页> 外文会议>Information Resources Management Association International Conference vol.1; 20040523-26; New Orleans,LA(US) >Designing a Controlled Environment for the Simulation of an Enterprise Security Infrastructure
【24h】

Designing a Controlled Environment for the Simulation of an Enterprise Security Infrastructure

机译:设计用于模拟企业安全基础结构的受控环境

获取原文
获取原文并翻译 | 示例

摘要

Despite a growing emphasis upon computer and network security, little attention has been paid to how business enterprises or universities should approach the design of security laboratories. Such laboratories allow business professionals or students to test the effectiveness of different configurations in warding off attacks, as well as to experiment with and learn about various security devices, tools, and attack methods in a controlled manner that insures benign consequences. This paper pinpoints the critical issues that make design and implementation of a simulation environment difficult, and recommends ways of addressing these concerns through a three-step design process. Design and development principles and technical and engineering requirements proposed here can be of use to businesses or universities seeking to build a computer and network security laboratory. They can also provide a useful checklist for managers or administrators charged with the IT function to use when discussing their security laboratory with their lab's technical designers and support staff.
机译:尽管越来越强调计算机和网络安全性,但是对于企业或大学应如何进行安全性实验室设计的关注却很少。这样的实验室允许业务专业人员或学生测试各种配置在抵御攻击方面的有效性,并以可控制的方式试验并了解各种安全设备,工具和攻击方法,以确保产生良性后果。本文指出了使仿真环境的设计和实现变得困难的关键问题,并提出了通过三步设计过程解决这些问题的方法。此处提出的设计和开发原理以及技术和工程要求可用于寻求建立计算机和网络安全实验室的企业或大学。它们还可以为负责IT功能的管理人员或管理员提供有用的清单,以便与实验室的技术设计师和支持人员讨论其安全实验室时使用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号