A Checking Method of Hierarchical Protection Security Boundary
A technology of security boundary and inspection method, applied in the field of level protection, can solve problems such as low efficiency, difficult identification, poor effect, etc., and achieve the effect of ensuring effectiveness
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0016] Below in conjunction with accompanying drawing and specific implementation mode, a kind of inspection method of graded protection security boundary of the present invention will be further described:
[0017] Such as figure 1 As shown, the information security protection system is usually divided into various security domains such as marketing domain, desktop domain or ERP domain, and the security protection boundaries between security domains are usually called inter-domain security boundaries (ie, figure 1 shown by the thick solid line in ), and the security protection boundary in the same security domain is usually called the intra-domain security boundary (ie figure 1 shown by the dotted lines within each security domain in ). In order to ensure the effectiveness of these safety protection boundaries, the steps of the inspection method adopted by the present invention are as follows:
[0018] ① Install the probe software for all machines connected to the network i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

