{"id":235,"date":"2013-12-01T19:44:41","date_gmt":"2013-12-01T11:44:41","guid":{"rendered":"http:\/\/www.glyingzhi.com\/?p=235"},"modified":"2013-12-01T19:44:41","modified_gmt":"2013-12-01T11:44:41","slug":"%e9%a3%8e%e9%99%a9%e8%af%84%e4%bc%b0%e5%b7%a5%e5%85%b7%e7%ae%80%e4%bb%8b","status":"publish","type":"post","link":"http:\/\/shop.glyingzhi.com\/index.php\/2013\/12\/01\/%e9%a3%8e%e9%99%a9%e8%af%84%e4%bc%b0%e5%b7%a5%e5%85%b7%e7%ae%80%e4%bb%8b\/","title":{"rendered":"\u98ce\u9669\u8bc4\u4f30\u5de5\u5177\u7b80\u4ecb"},"content":{"rendered":"<p>\u98ce\u9669\u8bc4\u4f30\u8fc7\u7a0b\u4e2d\uff0c\u53ef\u4ee5\u5229\u7528\u4e00\u4e9b\u8f85\u52a9\u6027\u7684\u5de5\u5177\u548c\u65b9\u6cd5\u6765\u91c7\u96c6\u6570\u636e\uff0c\u5305\u62ec\uff1a\u3000\u3000<\/p>\n<p>* \u8c03\u67e5\u95ee\u5377 \u2014\u2014 \u98ce\u9669\u8bc4\u4f30\u8005\u901a\u8fc7\u95ee\u5377\u5f62\u5f0f\u5bf9\u7ec4\u7ec7\u4fe1\u606f\u5b89\u5168\u7684\u5404\u4e2a\u65b9\u9762\u8fdb\u884c\u8c03\u67e5\uff0c\u95ee\u5377\u89e3\u7b54\u53ef\u4ee5\u8fdb\u884c\u624b\u5de5\u5206\u6790\uff0c\u4e5f\u53ef\u4ee5\u8f93\u5165\u81ea\u52a8\u5316\u8bc4\u4f30\u5de5\u5177\u8fdb\u884c\u5206\u6790\u3002\u4ece\u95ee\u5377\u8c03\u67e5\u4e2d\uff0c\u8bc4\u4f30\u8005\u80fd\u591f\u4e86\u89e3\u5230\u7ec4\u7ec7\u7684\u5173\u952e\u4e1a\u52a1\u3001\u5173\u952e\u8d44\u4ea7\u3001\u4e3b\u8981\u5a01\u80c1\u3001\u7ba1\u7406\u4e0a\u7684\u7f3a\u9677\u3001\u91c7\u7528\u7684\u63a7\u5236\u63aa\u65bd\u548c\u5b89\u5168\u7b56\u7565\u7684\u6267\u884c\u60c5\u51b5\u3002\u3000<\/p>\n<p>\u3000* \u68c0\u67e5\u5217\u8868 \u2014\u2014 \u68c0\u67e5\u5217\u8868\u901a\u5e38\u662f\u57fa\u4e8e\u7279\u5b9a\u6807\u51c6\u6216\u57fa\u7ebf\u5efa\u7acb\u7684\uff0c\u5bf9\u7279\u5b9a\u7cfb\u7edf\u8fdb\u884c\u5ba1\u67e5\u7684\u9879\u76ee\u6761\u6b3e\uff0c\u901a\u8fc7\u68c0\u67e5\u5217\u8868\uff0c\u64cd\u4f5c\u8005\u53ef\u4ee5\u5feb\u901f\u5b9a\u4f4d\u7cfb\u7edf\u76ee\u524d\u7684\u5b89\u5168\u72b6\u51b5\u4e0e\u57fa\u7ebf\u8981\u6c42\u4e4b\u95f4\u7684\u5dee\u8ddd\u3002\u3000<\/p>\n<p>\u3000* \u4eba\u5458\u8bbf\u8c08 \u2014\u2014 \u98ce\u9669\u8bc4\u4f30\u8005\u901a\u8fc7\u4e0e\u7ec4\u7ec7\u5185\u5173\u952e\u4eba\u5458\u7684\u8bbf\u8c08\uff0c\u53ef\u4ee5\u4e86\u89e3\u5230\u7ec4\u7ec7\u7684\u5b89\u5168\u610f\u8bc6\u3001\u4e1a\u52a1\u64cd\u4f5c\u3001\u7ba1\u7406\u7a0b\u5e8f\u7b49\u91cd\u8981\u4fe1\u606f\u3002\u3000* \u6f0f\u6d1e\u626b\u63cf\u5668 \u2014\u2014 \u6f0f\u6d1e\u626b\u63cf\u5668\uff08\u5305\u62ec\u57fa\u4e8e\u7f51\u7edc\u63a2\u6d4b\u548c\u57fa\u4e8e\u4e3b\u673a\u5ba1\u8ba1\uff09\u53ef\u4ee5\u5bf9\u4fe1\u606f\u7cfb\u7edf\u4e2d\u5b58\u5728\u7684\u6280\u672f\u6027\u6f0f\u6d1e\uff08\u5f31\u70b9\uff09\u8fdb\u884c\u8bc4\u4f30\u3002\u8bb8\u591a\u626b\u63cf\u5668\u90fd\u4f1a\u5217\u51fa\u5df2\u53d1\u73b0\u6f0f\u6d1e\u7684\u4e25\u91cd\u6027\u548c\u88ab\u5229\u7528\u7684\u5bb9\u6613\u7a0b\u5ea6\u3002\u5178\u578b\u5de5\u5177\u6709Nessus\u3001ISS\u3001CyberCop Scanner \u7b49\u3002\u3000<\/p>\n<p>\u3000* \u6e17\u900f\u6d4b\u8bd5 \u2014\u2014 \u8fd9\u662f\u4e00\u79cd\u6a21\u62df\u9ed1\u5ba2\u884c\u4e3a\u7684\u6f0f\u6d1e\u63a2\u6d4b\u6d3b\u52a8\uff0c\u5b83\u4e0d\u4f46\u8981\u626b\u63cf\u76ee\u6807\u7cfb\u7edf\u7684\u6f0f\u6d1e\uff0c\u8fd8\u4f1a\u901a\u8fc7\u6f0f\u6d1e\u5229\u7528\u6765\u9a8c\u8bc1\u6b64\u79cd\u5a01\u80c1\u573a\u666f\u3002\u3000\u3000\u9664\u4e86\u8fd9\u4e9b\u65b9\u6cd5\u548c\u5de5\u5177\u5916\uff0c\u98ce\u9669\u8bc4\u4f30\u8fc7\u7a0b\u6700\u5e38\u7528\u7684\u8fd8\u662f\u4e00\u4e9b\u4e13\u7528\u7684\u81ea\u52a8\u5316\u7684\u98ce\u9669\u8bc4\u4f30\u5de5\u5177\uff0c\u65e0\u8bba\u662f\u5546\u7528\u7684\u8fd8\u662f\u514d\u8d39\u7684\uff0c\u6b64\u7c7b\u5de5\u5177\u90fd\u53ef\u4ee5\u6709\u6548\u5730\u901a\u8fc7\u8f93\u5165\u6570\u636e\u6765\u5206\u6790\u98ce\u9669\uff0c\u6700\u7ec8\u7ed9\u51fa\u5bf9\u98ce\u9669\u7684\u8bc4\u4ef7\u5e76\u63a8\u8350\u76f8\u5e94\u7684\u5b89\u5168\u63aa\u65bd\u3002\u76ee\u524d\u5e38\u89c1\u7684\u81ea\u52a8\u5316\u98ce\u9669\u8bc4\u4f30\u5de5\u5177\u5305\u62ec\uff1a\u3000<\/p>\n<p>\u3000* COBRA \u2014\u2014 COBRA\uff08Consultative, Objective and Bi-functional Risk Analysis\uff09\u662f\u82f1\u56fd\u7684C&#038;A\u7cfb\u7edf\u5b89\u5168\u516c\u53f8\u63a8\u51fa\u7684\u4e00\u5957\u98ce\u9669\u5206\u6790\u5de5\u5177\u8f6f\u4ef6\uff0c\u5b83\u901a\u8fc7\u95ee\u5377\u7684\u65b9\u5f0f\u6765\u91c7\u96c6\u548c\u5206\u6790\u6570\u636e\uff0c\u5e76\u5bf9\u7ec4\u7ec7\u7684\u98ce\u9669\u8fdb\u884c\u5b9a\u6027\u5206\u6790\uff0c\u6700\u7ec8\u7684\u8bc4\u4f30\u62a5\u544a\u4e2d\u5305\u542b\u5df2\u8bc6\u522b\u98ce\u9669\u7684\u6c34\u5e73\u548c\u63a8\u8350\u63aa\u65bd\u3002\u6b64\u5916\uff0cCOBRA \u8fd8\u652f\u6301\u57fa\u4e8e\u77e5\u8bc6\u7684\u8bc4\u4f30\u65b9\u6cd5\uff0c\u53ef\u4ee5\u5c06\u7ec4\u7ec7\u7684\u5b89\u5168\u73b0\u72b6\u4e0eISO 17799 \u6807\u51c6\u76f8\u6bd4\u8f83\uff0c\u4ece\u4e2d\u627e\u51fa\u5dee\u8ddd\uff0c\u63d0\u51fa\u5f25\u8865\u63aa\u65bd\u3002C&#038;A \u516c\u53f8\u63d0\u4f9b\u4e86COBRA \u8bd5\u7528\u7248\u4e0b\u8f7d\uff1ahttp:\/\/www.security-risk-analysis.com\/cobdown.htm\u3002\u3000<\/p>\n<p>\u3000* CRAMM \u2014\u2014 CRAMM\uff08CCTA Risk Analysis and Management Method\uff09\u662f\u7531\u82f1\u56fd\u653f\u5e9c\u7684\u4e2d\u592e\u8ba1\u7b97\u673a\u4e0e\u7535\u4fe1\u5c40Central Computer and Telecommunications Agency\uff0cCCTA\uff09\u4e8e1985\u5e74\u5f00\u53d1\u7684\u4e00\u79cd\u5b9a\u91cf\u98ce\u9669\u5206\u6790\u5de5\u5177\uff0c\u540c\u65f6\u652f\u6301\u5b9a\u6027\u5206\u6790\u3002\u7ecf\u8fc7\u591a\u6b21\u7248\u672c\u66f4\u65b0\uff08\u73b0\u5728\u662f\u7b2c\u56db\u7248\uff09\uff0c\u76ee\u524d\u7531Insight \u54a8\u8be2\u516c\u53f8\u8d1f\u8d23\u7ba1\u7406\u548c\u6388\u6743\u3002CRAMM\u662f\u4e00\u79cd\u53ef\u4ee5\u8bc4\u4f30\u4fe1\u606f\u7cfb\u7edf\u98ce\u9669\u5e76\u786e\u5b9a\u6070\u5f53\u5bf9\u7b56\u7684\u7ed3\u6784\u5316\u65b9\u6cd5\uff0c\u9002\u7528\u4e8e\u5404\u79cd\u7c7b\u578b\u7684\u4fe1\u606f\u7cfb\u7edf\u548c\u7f51\u7edc\uff0c\u4e5f\u53ef\u4ee5\u5728\u4fe1\u606f\u7cfb\u7edf\u751f\u547d\u5468\u671f\u7684\u5404\u4e2a\u9636\u6bb5\u4f7f\u7528\u3002CRAMM\u7684\u5b89\u5168\u6a21\u578b\u6570\u636e\u5e93\u57fa\u4e8e\u8457\u540d\u7684\u201c\u8d44\u4ea7\/\u5a01\u80c1\/\u5f31\u70b9\u201d\u6a21\u578b\uff0c\u8bc4\u4f30\u8fc7\u7a0b\u7ecf\u8fc7\u8d44\u4ea7\u8bc6\u522b\u4e0e\u8bc4\u4ef7\u3001\u5a01\u80c1\u548c\u5f31\u70b9\u8bc4\u4f30\u3001\u9009\u62e9\u5408\u9002\u7684\u63a8\u8350\u5bf9\u7b56\u8fd9\u4e09\u4e2a\u9636\u6bb5\u3002CRAMM\u4e0eBS 7799 \u6807\u51c6\u4fdd\u6301\u4e00\u81f4\uff0c\u5b83\u63d0\u4f9b\u7684\u53ef\u4f9b\u9009\u62e9\u7684\u5b89\u5168\u63a7\u5236\u591a\u8fbe3000 \u4e2a\u3002\u9664\u4e86\u98ce\u9669\u8bc4\u4f30\uff0cCRAMM\u8fd8\u53ef\u4ee5\u5bf9\u7b26\u540899vIL\uff0899v Infrastructure Library\uff09\u6307\u5357\u7684\u4e1a\u52a1\u8fde\u7eed\u6027\u7ba1\u7406\u63d0\u4f9b\u652f\u6301\u3002\u3000<\/p>\n<p>\u3000* ASSET \u2014\u2014 ASSET\uff08Automated Security Self-Evaluation Tool\uff09\u662f\u7f8e\u56fd\u56fd\u5bb6\u6807\u51c6\u6280\u672f\u534f\u4f1a\uff08National Institute of Standard and Technology\uff0cNIST\uff09\u53d1\u5e03\u7684\u4e00\u4e2a\u53ef\u7528\u6765\u8fdb\u884c\u5b89\u5168\u98ce\u9669\u81ea\u6211\u8bc4\u4f30\u7684\u81ea\u52a8\u5316\u5de5\u5177\uff0c\u5b83\u91c7\u7528\u5178\u578b\u7684\u57fa\u4e8e\u77e5\u8bc6\u7684\u5206\u6790\u65b9\u6cd5\uff0c\u5229\u7528\u95ee\u5377\u65b9\u5f0f\u6765\u8bc4\u4f30\u7cfb\u7edf\u5b89\u5168\u73b0\u72b6\u4e0eNIST SP 800-26 \u6307\u5357\u4e4b\u95f4\u7684\u5dee\u8ddd\u3002NIST Special Publication 800-26\uff0c\u5373\u4fe1\u606f\u6280\u672f\u7cfb\u7edf\u5b89\u5168\u81ea\u6211\u8bc4\u4f30\u6307\u5357\uff08Security Self-Assessment Guide for Information Technology Systems\uff09\uff0c\u4e3a\u7ec4\u7ec7\u8fdb\u884c99v\u7cfb\u7edf\u98ce\u9669\u8bc4\u4f30\u63d0\u4f9b\u4e86\u4f17\u591a\u63a7\u5236\u76ee\u6807\u548c\u5efa\u8bae\u6280\u672f\u3002ASSET \u662f\u4e00\u4e2a\u514d\u8d39\u5de5\u5177\uff0c\u53ef\u4ee5\u5728NIST \u7684\u7f51\u7ad9\u4e0b\u8f7d\uff1ahttp:\/\/icat.nist.gov\u3002\u3000\u3000<\/p>\n<p>* CORA \u2014\u2014 CORA\uff08Cost-of-Risk Analysis\uff09\u662f\u7531\u56fd\u9645\u5b89\u5168\u6280\u672f\u516c\u53f8\uff08International Security Technology, Inc. www.ist-usa.com\uff09\u5f00\u53d1\u7684\u4e00\u79cd\u98ce\u9669\u7ba1\u7406\u51b3\u7b56\u652f\u6301\u7cfb\u7edf\uff0c\u5b83\u91c7\u7528\u5178\u578b\u7684\u5b9a\u91cf\u5206\u6790\u65b9\u6cd5\uff0c\u53ef\u4ee5\u65b9\u4fbf\u5730\u91c7\u96c6\u3001\u7ec4\u7ec7\u3001\u5206\u6790\u5e76\u5b58\u50a8\u98ce\u9669\u6570\u636e\uff0c\u4e3a\u7ec4\u7ec7\u7684\u98ce\u9669\u7ba1\u7406\u51b3\u7b56\u652f\u6301\u63d0\u4f9b\u51c6\u786e\u7684\u4f9d\u636e\u3002\u98ce\u9669\u8bc4\u4f30\u8fc7\u7a0b\u4e2d\uff0c\u53ef\u4ee5\u5229\u7528\u4e00\u4e9b\u8f85\u52a9\u6027\u7684\u5de5\u5177\u548c\u65b9\u6cd5\u6765\u91c7\u96c6\u6570\u636e\uff0c\u5305\u62ec\uff1a\u3000<\/p>\n<p>\u3000* \u8c03\u67e5\u95ee\u5377 \u2014\u2014 \u98ce\u9669\u8bc4\u4f30\u8005\u901a\u8fc7\u95ee\u5377\u5f62\u5f0f\u5bf9\u7ec4\u7ec7\u4fe1\u606f\u5b89\u5168\u7684\u5404\u4e2a\u65b9\u9762\u8fdb\u884c\u8c03\u67e5\uff0c\u95ee\u5377\u89e3\u7b54\u53ef\u4ee5\u8fdb\u884c\u624b\u5de5\u5206\u6790\uff0c\u4e5f\u53ef\u4ee5\u8f93\u5165\u81ea\u52a8\u5316\u8bc4\u4f30\u5de5\u5177\u8fdb\u884c\u5206\u6790\u3002\u4ece\u95ee\u5377\u8c03\u67e5\u4e2d\uff0c\u8bc4\u4f30\u8005\u80fd\u591f\u4e86\u89e3\u5230\u7ec4\u7ec7\u7684\u5173\u952e\u4e1a\u52a1\u3001\u5173\u952e\u8d44\u4ea7\u3001\u4e3b\u8981\u5a01\u80c1\u3001\u7ba1\u7406\u4e0a\u7684\u7f3a\u9677\u3001\u91c7\u7528\u7684\u63a7\u5236\u63aa\u65bd\u548c\u5b89\u5168\u7b56\u7565\u7684\u6267\u884c\u60c5\u51b5\u3002\u3000<\/p>\n<p>\u3000* \u68c0\u67e5\u5217\u8868 \u2014\u2014 \u68c0\u67e5\u5217\u8868\u901a\u5e38\u662f\u57fa\u4e8e\u7279\u5b9a\u6807\u51c6\u6216\u57fa\u7ebf\u5efa\u7acb\u7684\uff0c\u5bf9\u7279\u5b9a\u7cfb\u7edf\u8fdb\u884c\u5ba1\u67e5\u7684\u9879\u76ee\u6761\u6b3e\uff0c\u901a\u8fc7\u68c0\u67e5\u5217\u8868\uff0c\u64cd\u4f5c\u8005\u53ef\u4ee5\u5feb\u901f\u5b9a\u4f4d\u7cfb\u7edf\u76ee\u524d\u7684\u5b89\u5168\u72b6\u51b5\u4e0e\u57fa\u7ebf\u8981\u6c42\u4e4b\u95f4\u7684\u5dee\u8ddd\u3002\u3000<\/p>\n<p>\u3000* \u4eba\u5458\u8bbf\u8c08 \u2014\u2014 \u98ce\u9669\u8bc4\u4f30\u8005\u901a\u8fc7\u4e0e\u7ec4\u7ec7\u5185\u5173\u952e\u4eba\u5458\u7684\u8bbf\u8c08\uff0c\u53ef\u4ee5\u4e86\u89e3\u5230\u7ec4\u7ec7\u7684\u5b89\u5168\u610f\u8bc6\u3001\u4e1a\u52a1\u64cd\u4f5c\u3001\u7ba1\u7406\u7a0b\u5e8f\u7b49\u91cd\u8981\u4fe1\u606f\u3002\u3000* \u6f0f\u6d1e\u626b\u63cf\u5668 \u2014\u2014 \u6f0f\u6d1e\u626b\u63cf\u5668\uff08\u5305\u62ec\u57fa\u4e8e\u7f51\u7edc\u63a2\u6d4b\u548c\u57fa\u4e8e\u4e3b\u673a\u5ba1\u8ba1\uff09\u53ef\u4ee5\u5bf9\u4fe1\u606f\u7cfb\u7edf\u4e2d\u5b58\u5728\u7684\u6280\u672f\u6027\u6f0f\u6d1e\uff08\u5f31\u70b9\uff09\u8fdb\u884c\u8bc4\u4f30\u3002\u8bb8\u591a\u626b\u63cf\u5668\u90fd\u4f1a\u5217\u51fa\u5df2\u53d1\u73b0\u6f0f\u6d1e\u7684\u4e25\u91cd\u6027\u548c\u88ab\u5229\u7528\u7684\u5bb9\u6613\u7a0b\u5ea6\u3002\u5178\u578b\u5de5\u5177\u6709Nessus\u3001ISS\u3001CyberCop Scanner \u7b49\u3002\u3000<\/p>\n<p>\u3000* \u6e17\u900f\u6d4b\u8bd5 \u2014\u2014 \u8fd9\u662f\u4e00\u79cd\u6a21\u62df\u9ed1\u5ba2\u884c\u4e3a\u7684\u6f0f\u6d1e\u63a2\u6d4b\u6d3b\u52a8\uff0c\u5b83\u4e0d\u4f46\u8981\u626b\u63cf\u76ee\u6807\u7cfb\u7edf\u7684\u6f0f\u6d1e\uff0c\u8fd8\u4f1a\u901a\u8fc7\u6f0f\u6d1e\u5229\u7528\u6765\u9a8c\u8bc1\u6b64\u79cd\u5a01\u80c1\u573a\u666f\u3002\u3000\u3000\u9664\u4e86\u8fd9\u4e9b\u65b9\u6cd5\u548c\u5de5\u5177\u5916\uff0c\u98ce\u9669\u8bc4\u4f30\u8fc7\u7a0b\u6700\u5e38\u7528\u7684\u8fd8\u662f\u4e00\u4e9b\u4e13\u7528\u7684\u81ea\u52a8\u5316\u7684\u98ce\u9669\u8bc4\u4f30\u5de5\u5177\uff0c\u65e0\u8bba\u662f\u5546\u7528\u7684\u8fd8\u662f\u514d\u8d39\u7684\uff0c\u6b64\u7c7b\u5de5\u5177\u90fd\u53ef\u4ee5\u6709\u6548\u5730\u901a\u8fc7\u8f93\u5165\u6570\u636e\u6765\u5206\u6790\u98ce\u9669\uff0c\u6700\u7ec8\u7ed9\u51fa\u5bf9\u98ce\u9669\u7684\u8bc4\u4ef7\u5e76\u63a8\u8350\u76f8\u5e94\u7684\u5b89\u5168\u63aa\u65bd\u3002\u76ee\u524d\u5e38\u89c1\u7684\u81ea\u52a8\u5316\u98ce\u9669\u8bc4\u4f30\u5de5\u5177\u5305\u62ec\uff1a\u3000<\/p>\n<p>\u3000* COBRA \u2014\u2014 COBRA\uff08Consultative, Objective and Bi-functional Risk Analysis\uff09\u662f\u82f1\u56fd\u7684C&#038;A\u7cfb\u7edf\u5b89\u5168\u516c\u53f8\u63a8\u51fa\u7684\u4e00\u5957\u98ce\u9669\u5206\u6790\u5de5\u5177\u8f6f\u4ef6\uff0c\u5b83\u901a\u8fc7\u95ee\u5377\u7684\u65b9\u5f0f\u6765\u91c7\u96c6\u548c\u5206\u6790\u6570\u636e\uff0c\u5e76\u5bf9\u7ec4\u7ec7\u7684\u98ce\u9669\u8fdb\u884c\u5b9a\u6027\u5206\u6790\uff0c\u6700\u7ec8\u7684\u8bc4\u4f30\u62a5\u544a\u4e2d\u5305\u542b\u5df2\u8bc6\u522b\u98ce\u9669\u7684\u6c34\u5e73\u548c\u63a8\u8350\u63aa\u65bd\u3002\u6b64\u5916\uff0cCOBRA \u8fd8\u652f\u6301\u57fa\u4e8e\u77e5\u8bc6\u7684\u8bc4\u4f30\u65b9\u6cd5\uff0c\u53ef\u4ee5\u5c06\u7ec4\u7ec7\u7684\u5b89\u5168\u73b0\u72b6\u4e0eISO 17799 \u6807\u51c6\u76f8\u6bd4\u8f83\uff0c\u4ece\u4e2d\u627e\u51fa\u5dee\u8ddd\uff0c\u63d0\u51fa\u5f25\u8865\u63aa\u65bd\u3002C&#038;A \u516c\u53f8\u63d0\u4f9b\u4e86COBRA \u8bd5\u7528\u7248\u4e0b\u8f7d\uff1ahttp:\/\/www.security-risk-analysis.com\/cobdown.htm\u3002\u3000<\/p>\n<p>\u3000* CRAMM \u2014\u2014 CRAMM\uff08CCTA Risk Analysis and Management Method\uff09\u662f\u7531\u82f1\u56fd\u653f\u5e9c\u7684\u4e2d\u592e\u8ba1\u7b97\u673a\u4e0e\u7535\u4fe1\u5c40Central Computer and Telecommunications Agency\uff0cCCTA\uff09\u4e8e1985\u5e74\u5f00\u53d1\u7684\u4e00\u79cd\u5b9a\u91cf\u98ce\u9669\u5206\u6790\u5de5\u5177\uff0c\u540c\u65f6\u652f\u6301\u5b9a\u6027\u5206\u6790\u3002\u7ecf\u8fc7\u591a\u6b21\u7248\u672c\u66f4\u65b0\uff08\u73b0\u5728\u662f\u7b2c\u56db\u7248\uff09\uff0c\u76ee\u524d\u7531Insight \u54a8\u8be2\u516c\u53f8\u8d1f\u8d23\u7ba1\u7406\u548c\u6388\u6743\u3002CRAMM\u662f\u4e00\u79cd\u53ef\u4ee5\u8bc4\u4f30\u4fe1\u606f\u7cfb\u7edf\u98ce\u9669\u5e76\u786e\u5b9a\u6070\u5f53\u5bf9\u7b56\u7684\u7ed3\u6784\u5316\u65b9\u6cd5\uff0c\u9002\u7528\u4e8e\u5404\u79cd\u7c7b\u578b\u7684\u4fe1\u606f\u7cfb\u7edf\u548c\u7f51\u7edc\uff0c\u4e5f\u53ef\u4ee5\u5728\u4fe1\u606f\u7cfb\u7edf\u751f\u547d\u5468\u671f\u7684\u5404\u4e2a\u9636\u6bb5\u4f7f\u7528\u3002CRAMM\u7684\u5b89\u5168\u6a21\u578b\u6570\u636e\u5e93\u57fa\u4e8e\u8457\u540d\u7684\u201c\u8d44\u4ea7\/\u5a01\u80c1\/\u5f31\u70b9\u201d\u6a21\u578b\uff0c\u8bc4\u4f30\u8fc7\u7a0b\u7ecf\u8fc7\u8d44\u4ea7\u8bc6\u522b\u4e0e\u8bc4\u4ef7\u3001\u5a01\u80c1\u548c\u5f31\u70b9\u8bc4\u4f30\u3001\u9009\u62e9\u5408\u9002\u7684\u63a8\u8350\u5bf9\u7b56\u8fd9\u4e09\u4e2a\u9636\u6bb5\u3002CRAMM\u4e0eBS 7799 \u6807\u51c6\u4fdd\u6301\u4e00\u81f4\uff0c\u5b83\u63d0\u4f9b\u7684\u53ef\u4f9b\u9009\u62e9\u7684\u5b89\u5168\u63a7\u5236\u591a\u8fbe3000 \u4e2a\u3002\u9664\u4e86\u98ce\u9669\u8bc4\u4f30\uff0cCRAMM\u8fd8\u53ef\u4ee5\u5bf9\u7b26\u540899vIL\uff0899v Infrastructure Library\uff09\u6307\u5357\u7684\u4e1a\u52a1\u8fde\u7eed\u6027\u7ba1\u7406\u63d0\u4f9b\u652f\u6301\u3002\u3000<\/p>\n<p>\u3000* ASSET \u2014\u2014 ASSET\uff08Automated Security Self-Evaluation Tool\uff09\u662f\u7f8e\u56fd\u56fd\u5bb6\u6807\u51c6\u6280\u672f\u534f\u4f1a\uff08National Institute of Standard and Technology\uff0cNIST\uff09\u53d1\u5e03\u7684\u4e00\u4e2a\u53ef\u7528\u6765\u8fdb\u884c\u5b89\u5168\u98ce\u9669\u81ea\u6211\u8bc4\u4f30\u7684\u81ea\u52a8\u5316\u5de5\u5177\uff0c\u5b83\u91c7\u7528\u5178\u578b\u7684\u57fa\u4e8e\u77e5\u8bc6\u7684\u5206\u6790\u65b9\u6cd5\uff0c\u5229\u7528\u95ee\u5377\u65b9\u5f0f\u6765\u8bc4\u4f30\u7cfb\u7edf\u5b89\u5168\u73b0\u72b6\u4e0eNIST SP 800-26 \u6307\u5357\u4e4b\u95f4\u7684\u5dee\u8ddd\u3002NIST Special Publication 800-26\uff0c\u5373\u4fe1\u606f\u6280\u672f\u7cfb\u7edf\u5b89\u5168\u81ea\u6211\u8bc4\u4f30\u6307\u5357\uff08Security Self-Assessment Guide for Information Technology Systems\uff09\uff0c\u4e3a\u7ec4\u7ec7\u8fdb\u884c99v\u7cfb\u7edf\u98ce\u9669\u8bc4\u4f30\u63d0\u4f9b\u4e86\u4f17\u591a\u63a7\u5236\u76ee\u6807\u548c\u5efa\u8bae\u6280\u672f\u3002ASSET \u662f\u4e00\u4e2a\u514d\u8d39\u5de5\u5177\uff0c\u53ef\u4ee5\u5728NIST \u7684\u7f51\u7ad9\u4e0b\u8f7d\uff1ahttp:\/\/icat.nist.gov\u3002<\/p>\n<p>\u3000\u3000* CORA \u2014\u2014 CORA\uff08Cost-of-Risk Analysis\uff09\u662f\u7531\u56fd\u9645\u5b89\u5168\u6280\u672f\u516c\u53f8\uff08International Security Technology, Inc. www.ist-usa.com\uff09\u5f00\u53d1\u7684\u4e00\u79cd\u98ce\u9669\u7ba1\u7406\u51b3\u7b56\u652f\u6301\u7cfb\u7edf\uff0c\u5b83\u91c7\u7528\u5178\u578b\u7684\u5b9a\u91cf\u5206\u6790\u65b9\u6cd5\uff0c\u53ef\u4ee5\u65b9\u4fbf\u5730\u91c7\u96c6\u3001\u7ec4\u7ec7\u3001\u5206\u6790\u5e76\u5b58\u50a8\u98ce\u9669\u6570\u636e\uff0c\u4e3a\u7ec4\u7ec7\u7684\u98ce\u9669\u7ba1\u7406\u51b3\u7b56\u652f\u6301\u63d0\u4f9b\u51c6\u786e\u7684\u4f9d\u636e\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u98ce\u9669\u8bc4\u4f30\u8fc7\u7a0b\u4e2d\uff0c\u53ef\u4ee5\u5229\u7528\u4e00\u4e9b\u8f85\u52a9\u6027\u7684\u5de5\u5177\u548c\u65b9\u6cd5\u6765\u91c7\u96c6\u6570\u636e\uff0c\u5305\u62ec\uff1a\u3000\u3000 * \u8c03\u67e5\u95ee\u5377 \u2014\u2014 \u98ce\u9669\u8bc4\u4f30\u8005\u901a\u8fc7\u95ee\u5377\u5f62 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pagelayer_contact_templates":[],"_pagelayer_content":"","footnotes":""},"categories":[],"tags":[],"class_list":["post-235","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"http:\/\/shop.glyingzhi.com\/index.php\/wp-json\/wp\/v2\/posts\/235","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/shop.glyingzhi.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/shop.glyingzhi.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/shop.glyingzhi.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/shop.glyingzhi.com\/index.php\/wp-json\/wp\/v2\/comments?post=235"}],"version-history":[{"count":1,"href":"http:\/\/shop.glyingzhi.com\/index.php\/wp-json\/wp\/v2\/posts\/235\/revisions"}],"predecessor-version":[{"id":236,"href":"http:\/\/shop.glyingzhi.com\/index.php\/wp-json\/wp\/v2\/posts\/235\/revisions\/236"}],"wp:attachment":[{"href":"http:\/\/shop.glyingzhi.com\/index.php\/wp-json\/wp\/v2\/media?parent=235"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/shop.glyingzhi.com\/index.php\/wp-json\/wp\/v2\/categories?post=235"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/shop.glyingzhi.com\/index.php\/wp-json\/wp\/v2\/tags?post=235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}