书籍详情
网络空间内置式主动防御(英文版)
作者:孟丹 等 著
出版社:科学出版社
出版时间:2021-10-01
ISBN:9787030680891
定价:¥69.00
购买这本书可以去
内容简介
Without cybersecurity, there would be no national security. Facing the reality that software and hardware vulnerabilities are inevitable and attacks with unknown patterns are unavoidable, traditional defense is insufficient. This book introduces the core ideas, defense model and framework of the built-in active defense. It starts by analyzing the inherent attack mechanisms and attack paths and finding security weaknesses exploited by attackers. It then, with the security requirements being a primary design consideration, redesigns and transforms existing technologies such that they are able to effectively suppress, detect, contain, and eliminate security threats caused by their internal vulnerabilities. The built-in active defense makes systematic breakthroughs in the overall defense strategy, moving from external to built-in, and from reactive to proactive. It essentially changes information technology with security enhancements to secure information technology. It has great practical significance, broad scientific and technological importance, and profound strategic influence.
作者简介
暂缺《网络空间内置式主动防御(英文版)》作者简介
目录
Contents
Preface
Chapter 1 Security Threats in Cyberspace 1
Chapter 2 Dilemma of Classic Defense Systems and Technology 4
2.1 Defense Systems 4
2.2 Security Technology 6
2.3 Main Issues 7
Chapter 3 The Built-in Active Defense Theory and Model 11
3.1 Core Ideas 11
3.2 Defense Model 14
3.3 Main Features 18
Chapter 4 Built-in Active Defense Framework 22
4.1 Overview 22
4.2 Security-First Architecture 24
4.3 Key Techniques 29
Chapter 5 Summary 33
Acknowledgments 34
References 35
Preface
Chapter 1 Security Threats in Cyberspace 1
Chapter 2 Dilemma of Classic Defense Systems and Technology 4
2.1 Defense Systems 4
2.2 Security Technology 6
2.3 Main Issues 7
Chapter 3 The Built-in Active Defense Theory and Model 11
3.1 Core Ideas 11
3.2 Defense Model 14
3.3 Main Features 18
Chapter 4 Built-in Active Defense Framework 22
4.1 Overview 22
4.2 Security-First Architecture 24
4.3 Key Techniques 29
Chapter 5 Summary 33
Acknowledgments 34
References 35
猜您喜欢