首页> 外文会议>Information Resources Management Association International Conference >Designing a Controlled Environment for the Simulation of an Enterprise Security Infrastructure
【24h】

Designing a Controlled Environment for the Simulation of an Enterprise Security Infrastructure

机译:设计用于仿真企业安全基础架构的受控环境

获取原文

摘要

Despite a growing emphasis upon computer and network security, little attention has been paid to how business enterprises or universities should approach the design of security laboratories. Such laboratories allow business professionals or students to test the effectiveness of different configurations in warding off attacks, as well as to experiment with and learn about various security devices, tools, and attack methods in a controlled manner that insures benign consequences. This paper pinpoints the critical issues that make design and implementation of a simulation environment difficult, and recommends ways of addressing these concerns through a three-step design process. Design and development principles and technical and engineering requirements proposed here can be of use to businesses or universities seeking to build a computer and network security laboratory. They can also provide a useful checklist for managers or administrators charged with the IT function to use when discussing their security laboratory with their lab's technical designers and support staff.
机译:尽管对计算机和网络安全的重视越来越强调,但企业或大学如何应对安全实验室的设计。此类实验室允许企业专业人员或学生在防御攻击中测试不同配置的有效性,以及以受控方式实验和了解各种安全设备,工具和攻击方法,以确保良性后果。本文确定了使仿真环境的设计和实现困难的关键问题,并通过三步设计过程推荐解决这些问题的方法。这里提出的设计和开发原则和技术和工程要求可以用于寻求建立计算机和网络安全实验室的企业或大学。他们还可以为管理人员或管理员提供有用的清单,以便在与实验室的技术设计师和支持人员讨论其安全实验室时使用它功能的管理人员。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号