...
首页> 外文期刊>Operating systems review >Assessing Computer Security Vulnerability
【24h】

Assessing Computer Security Vulnerability

机译:评估计算机安全漏洞

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

The lack of a standard gauge for quantifying computer system vulnerability is a hindrance to communicating information about vulnerabilities, and is thus a hindrance to reducing those vulnerabilities. The inability to address this issue through uniform semantics often leads to uncoordinated efforts at combating exposure to common avenues of exploitation. The de-facto standard for evaluating computer security is the government's Trusted Computer Evaluation Criteria, also known as the Orange Book. However, it is a generally accepted fact that the majority of non-government multi-user computer systems are classified into one of its two lower classes. The link between the higher classes and government classified data, makes the measure unsuitable for commercial use. This project presents a feasible approach for resolving this problem by introducing a standardized assessment. It introduces a method, termed the System Vulnerability Index (SVI), that analyzes a number of factors that affect security. These factors are evaluated and combined, through the use of special rules, to provide a measure of vulnerability. The strength of this method is in its abstraction of the problem, which makes it applicable to various operating systems and hardware implementations. User and superuser actions, as well as clues to a potentially breached state of security, serve as the basis for the security relevant factors. Facts for assessment are presented in a form suitable for implementation in a rule-based expert system.
机译:缺乏用于量化计算机系统漏洞的标准衡量标准,这是传达有关漏洞信息的障碍,因此,也不利于减少这些漏洞。无法通过统一的语义解决此问题通常会导致在对抗暴露于常见剥削途径方面的不协调努力。评估计算机安全性的实际标准是政府的“受信任的计算机评估标准”,也称为“橙皮书”。但是,一个普遍接受的事实是,大多数非政府多用户计算机系统被分为两个较低的类别之一。上层阶级与政府机密数据之间的联系使该措施不适用于商业用途。通过引入标准化评估,该项目提出了解决此问题的可行方法。它引入了一种称为系统漏洞指数(SVI)的方法,该方法分析了许多影响安全性的因素。通过使用特殊规则对这些因素进行评估和组合,以提供一定程度的漏洞。该方法的优点在于对问题的抽象,这使其可应用于各种操作系统和硬件实现。用户和超级用户的操作以及潜在的违反安全状态的线索,是与安全相关的因素的基础。评估事实以适合在基于规则的专家系统中实施的形式呈现。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号