:::

詳目顯示

回上一頁
題名:進階持續性威脅之防護與認知初論:根基於黑暗首爾資訊安全事故及其防禦方法
書刊名:前瞻科技與管理
作者:季祥樊國楨韓宜蓁
作者(外文):Chi, HsiangFarn, Kwo-jeanHan, I-chen
出版日期:2015
卷期:5:2
頁次:頁95-122
主題關鍵詞:主引導紀錄可信賴計算基底之內部威脅的保護進階持續性威脅認知屬性基存取控制Master boot recordTrusted computing based insider threat protectionAdvanced persistent threatAwarenessAttribute based access control
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:1
  • 點閱點閱:39
期刊論文
1.張裕敏(20111000)。典範轉移對資安產業發展的影響。資訊安全通訊,17(4),97-100。  延伸查詢new window
2.樊國楨、黃健誠(2013)。下一世代網路(Next Generation Network,簡稱NGN)安全標準初探之三:可信賴網路接取(Trusted Network Connect,簡稱TNC)。網路通訊國家型科技計畫簡訊,54,38-47。  延伸查詢new window
3.樊國楨、黃健誠、朱潮昌(20130100)。資訊安全管理與脆弱性評分系統初探:根基於安全內容自動化協定。電腦稽核,27,79-101。new window  延伸查詢new window
4.Coyne, E.、Weil, T. R.(201305)。ABAC and RBAC: Scalable, Flexible, and Auditable Access Management。IT Professional,15(3),14-16。  new window
5.Information Assurance Technology Analysis Center(2011)。A Commercial Engagement Strategy for Authorization and Access Management in Defense and Intelligence Communities。IAnewsletter,14(3),14-19。  new window
6.Kuhn, D. R.、Coyne E. J.、Weil, T. R.(2010)。Adding Attributes to Role Based Access Control。IEEE Computer,43(6),79-81。  new window
7.Skakarian, P.(2011)。Stuxnet: Cyberwar Revolution in Military Affairs。Small Wars Journal。  new window
8.Unal, D.、Caglayan, M. U.(2013)。A Formal Role-based Access Control Model for Security Policies in Multi-domain Mobile Networks。Computer Networks,57(1),300-350。  new window
會議論文
1.吳啟文(2013)。政府資通安全威脅趨勢及防護策略。第23屆全國資訊安全會議。臺南:南臺科技大學。  延伸查詢new window
2.Andresen, Leslie(2011)。Trusted Computing Based Insider Threat Protection。2nd Annual NSA Trusted Computing Conference & Exposition,(會議日期: 2011-09-20)。  new window
3.Virvilis, N.、Gritzails, D.(2013)。The Big Four-What We Did Wrong in Advanced Persistent Threat Detection?。2013 International Conference on Availability, Reliability and Security。Fribourg:University of Regensbury Germany。248-254。  new window
研究報告
1.US Office of Management and Budget(20140501)。Annual Report to Congress: Federal Information Security Management Act。  new window
學位論文
1.季祥(2014)。APT攻擊對企業資安政策之影響(碩士論文)。中國文化大學。  延伸查詢new window
圖書
1.Cooper, D.、Polk, W.、Regenscheid, A.、Souppaya, M.(2011)。BIOS Protection Guidelines: Recommendations of the National Institute of Standards and Technology。Gaithersburg, MD:National Institute of Standards and Technology。  new window
2.Booth, H.、Halbardier, A.(2011)。Trust Model for Security Automation Data 1.0。Gaithersburg, MD:U. S. Department of Commerce, National Institute of Standards and Technology。  new window
3.Hu, V. C.、Ferraiolo, D.、Kuhn, R.、Schnitzer, A.、Sandlin, K.、Miller, R.、Scarfone, K.(2014)。Guide to Attribute Based Access Control。Gaithersburg, MD:National Institute of Standards and Technology。  new window
4.Regenscheid, A.、Scarfone, K.(2011)。BIOS Integrity Measurement Guidelines (Draft)。Gaithersburg, MD:National Institute of Standards and Technology。  new window
單篇論文
1.樊國楨,韓宜蓁(2014)。資訊安全管理系統要求事項初論:根基於管理系統標準之強制性規範。  延伸查詢new window
其他
1.Enders, R.,Schwarz, H.(2013)。Network Endpoints and Attribute Based Access Controls, May 2013 Whitepaper and Presentation Submissions, ICS-CERT (Industrial Control Systems Cyber Emergency Response Team),https://www.cisa.gov/uscert/ics/。  new window
2.Sherstobitoff, R.,Liba, I.,Walter, J.(2013)。Dissecting Operation Troy Cyberspionage in South Korea,http://www.mcafee.com/sg/resources/white-papers/wp-disserting-operation-troy.pdf, 2013/03/31。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE