首页> 外文OA文献 >Risk analysis of cyber-campus modules (security guidelines of electronic academic assets)
【2h】

Risk analysis of cyber-campus modules (security guidelines of electronic academic assets)

机译:网络校园模块的风险分析(电子学术资产的安全准则)

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

As the country moves into the Information Age, the use of Information and Communication Technology (ICT) has become a ubiquitous activity in the university departments for academic and administrative purposes. University academic information resources are valuable assets and the security of these assets should be managed properly. Without proper security measures and controls may result in the compromise, improper modification, or destruction of the information resources. This project focuses in outlining the security guideline that can be followed by academic staffs and others who are responsible for the security of electronic information in a university environment. The guideline addresses issues such as choosing good passwords, preventing virus attacks, email security, pc intrusion and administrative responsibilities for the users and administrators who manage computers and networks. Risk analysis technique is used as a guidance in order to come out with the security guideline that is suitable for FSKSM. The guideline is simple and short enough so that it is easy to understand and followed by all levels of staffs. The security guideline formulated can be used as a starting point in drafting a security policy at UTM. With the application of security policy in the academic environment, the security of academic assets can be enhanced and the network as a whole can be trusted.
机译:随着国家进入信息时代,信息和通信技术(ICT)的使用已成为大学部门出于学术和行政目的的普遍活动。大学学术信息资源是宝贵的资产,应妥善管理这些资产的安全性。没有适当的安全措施和控制措施,可能会导致信息资源的损害,不正确的修改或破坏。该项目的重点是概述安全指南,学术人员和负责大学环境中电子信息安全的其他人员可以遵循该指南。该指南解决了一些问题,例如选择好的密码,防止病毒攻击,电子邮件安全,个人计算机入侵以及对管理计算机和网络的用户和管理员的管理责任。风险分析技术用作指导,以提出适用于FSKSM的安全性指南。指南很简单,也很简短,因此易于理解,所有级别的员工都可以遵循。制定的安全指南可以用作起草UTM安全策略的起点。通过在学术环境中应用安全策略,可以增强学术资产的安全性并可以信任整个网络。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号