Abstract
This chapter mainly analyzes the current status of information security, discusses the domestic and international trends of its technology development, and proposes the third-party integrated information security management system. And by analyzing the services used currently, it also generally introduces the application design of information security management system, such as planning and design, whole framework design, and so on. Finally the planning and the design of the system is presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Levin D (2003) Lessons learned in using live red teams in IA experiments. DARPA information survivability conference and exposition (DISCEX’03), vol 1. IEEE Computer Society, Washington DC, pp 110–119
Noel S, Jajodia S (2004) Managing attack graph complexity through visual hierarchical aggregation. In: Proceedings of ACM CCS workshop on visualization and data mining for computer security, Fairfax, pp 109–118
Fox KL, Henning RR, Farrell JT et al (2003) A prototype next generation information assurance tool: a data fusion model for information system defense. In: Proceedings of 7th world multiconference on systemics, cybernetics and informatics (SCI 2003), vol 1. Orlando, pp 284–289
Ramakrishnan CR, Sekar R (2002) Model-based analysis of configuration vulnerabilities. J Comput Secur 10(12):189–209
Zou CC, Towsley D, Gong W (2007) Modeling and simulation study of the propagation and defense of internet e-mail worm [J]. IEEE Trans Dependable Secur Comput 4(2):105–118
Cavusoglu H (2004) A model for evaluating IT security investments. Commun ACM 47(7):87–92
Chan MT, Kwok LF (2001) Integrating security design into the software development process for e-commerce system [J]. Inf Manag Comput Secur 9(3):112–122
Acknowledgments
Author Introduction Yuefeng Fang (1965–), male, born in Chaohu Anhui, graduated from Zhe Jiang Industrial University with the major of Information Science. Being a senior engineer, and mainly engaged in information engineering study.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media B.V.
About this paper
Cite this paper
Fang, Y., Wang, X., Gao, F. (2012). Design and Applications of Third Party Integrated Information Security Management System. In: He, X., Hua, E., Lin, Y., Liu, X. (eds) Computer, Informatics, Cybernetics and Applications. Lecture Notes in Electrical Engineering, vol 107. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-1839-5_39
Download citation
DOI: https://doi.org/10.1007/978-94-007-1839-5_39
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-1838-8
Online ISBN: 978-94-007-1839-5
eBook Packages: EngineeringEngineering (R0)