期刊文献+

美国关键基础设施网络应急管理与应急处置分析 被引量:1

A Study of Emergency Management and Emergency Response of Critical Infrastructure Networks in the United States
在线阅读 下载PDF
导出
摘要 针对关键基础设施所面临的网络安全问题,美国政府已率先采取积极且前瞻性的措施,致力于持续完善网络安全应急管理体系,并不断优化其应急处置模式。通过相继颁布一系列针对关键基础设施网络安全的政策法规,美国政府正全面深化在应急管理机制完善、技术标准体系健全、前沿技术革新探索以及专业优质人才培养等多个方面的实践,推动美国关键基础设施网络安全领域的发展。此举旨在构建一个相对完善的组织架构和高效的应急响应流程,为有效抵御网络威胁、保障网络安全提供坚实有力的支撑。同时,美国政府的这一系列努力也对我国网络安全应急管理机制的发展起到重要借鉴和启示作用。 In response to cybersecurity issues faced by critical infrastructure,the U.S.government has taken proactive and forward-looking measures aimed at continuously improving the construction of cybersecurity emergency management systems and optimizing emergency response models.By enacting a series of policies and regulations specifically targeting the cybersecurity of critical infrastructure,the government is comprehensively deepening practices in multiple areas,including the improvement of emergency management mechanisms,the establishment of robust technical standards,the exploration of cutting-edge technological innovations,and the cultivation of high-quality professional talent.These efforts are designed to build a relatively comprehensive organizational structure and efficient emergency response processes,providing solid support for effectively resisting cyber threats and ensuring cybersecurity.Moreover,these initiatives by the U.S.government serve as significant references and insights for the development of our country’s cybersecurity emergency management mechanisms.
作者 张成 李晴霞 孔增强 Zhang Cheng;Li Qingxia;Kong Zengqiang(Information Center of the State Administration of Science.Technology and Industry for National Defense,Beijing,100039;China Electronics Cyberspace Great Wall Security Technology Research Institute(Beijing)Co.,Ltd,Beijing,100085)
出处 《工业信息安全》 2024年第5期12-18,共7页 Industry Information Security
关键词 美国 关键基础设施 应急管理 应急处置 网络安全 The United States of America Critical National Infrastructure Emergency Management Emergency Response Cybersecurity
作者简介 张成,男,国家国防科技工业局信息中心工程师,主要研究方向为网络安全管理、科研项目研究、国产软件评估等;通讯作者:李晴霞,女,中电长城网际安全技术研究院(北京)有限公司工程师,主要研究方向网络安全,E-mail:511911677@qq.com。
  • 相关文献

参考文献9

二级参考文献6

  • 1[1]Kohl J, C Neuman. The Kerberos Network Authentication Service (V5)[J]. RFC 1510, Digital Equipment Corporation, USC/Information Sciences Institute, September 1993.
  • 2[2]ITU-T, Recommendation X.509. The Directory-authentication Framework[J]. Consultation Committee, International Telephone and Telegraphm, Inernational Telecommunications Union.
  • 3[3]R L Rivest. RFC 1321. The MD5 Message-digest Algorithm[J]. Internet Request for Comments 1321, Apr. 1992.
  • 4[4]C Rigney, A Rubens, W Simpson, S Willens. RFC 2138, Remote Authentication Dial in User Service (RADIUS)[J]. 1997-04-18.
  • 5Uniting And Strengthening America By Providing. Appropriate Tools Required To Intercept And Obstruct Terrorism (Usa Patriot Act) Act Of2001[OL].http://www.factcheck.org/UploadedFiles/Sec_213_USA_PATRIOT_Act.pdf,.
  • 6王孝良,崔保红,李思其.关于工控系统信息安全的思考与建议[J].信息网络安全,2012(8):36-37. 被引量:47

共引文献61

同被引文献10

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部