Research on Computer Network Security Emergency Response Systematization
نویسندگان
چکیده
منابع مشابه
Prioritizing computer security incident response services for the South African National Research Network (SANReN)
The need for the South African (SA) National Research and Education Network (NREN) to establish a Computer Security Incident Response Team (CSIRT) was identified. CSIRTs offer a subset of all possible security services based on the environment and needs of the customers. Selecting this subset has its challenges as the view of the customer may differ from the provider and knowing which services ...
متن کاملResearch on Application of Neural Network in Computer Network Security Evaluation
Purpose: discuss the role of the neural network (NN) theory in the computer network security evaluation. Method: propose three-level and four-class indicator system suitable for network security evaluation, establish the network security evaluation system model based on NN, optimize the NN model by using the particle swarm, collect 100group data on the computer network security evaluation of di...
متن کامل" Computer Network Security "
The book gives an extensive overview of network security and the necessary cryptography. It covers standards and protocols in great detail, and can serve as a handy reference for people interested in this area. Due to the many exercises, it can also serve as one of the textbooks of an introductory course on network security. 1 What the book is about The book is intended as a textbook for a one-...
متن کاملOn Computer Security Incident Response Teams
I n 1988, Robert Morris, then a rst-year graduate student at Cornell University, cra ed a clever piece of so ware that spread from computer to computer. It exploited vulnerabilities in various services to infect machines and spread to other machines while trying to remain covert. is “worm” infected thousands of computers, consuming memory and eventually causing them to become unresponsive.1 For...
متن کاملResearch on Context Aware Network Security Model
According to high development of internet and mobile internet technologies, more and more services and applications are researched and are becoming more and more important in people’s life. At the same time, there are still many risks that virus attack from internet. Network security is facing more challenges than before, such as attack method becoming more diversify, attack times are increasin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Physics: Conference Series
سال: 2021
ISSN: 1742-6588,1742-6596
DOI: 10.1088/1742-6596/1771/1/012012