[1]沈霞娟[],高东怀[],郭佳[],等. 信息安全素养测评系统的设计与实现[J].计算机技术与发展,2016,26(04):90-95.
 SHEN Xia-juan[],GAO Dong-huai[],GUO Jia[],et al. Design and Implementation of Information Security Literacy Evaluation System[J].,2016,26(04):90-95.
点击复制

 信息安全素养测评系统的设计与实现()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
26
期数:
2016年04期
页码:
90-95
栏目:
安全与防范
出版日期:
2016-04-10

文章信息/Info

Title:
 Design and Implementation of Information Security Literacy Evaluation System
文章编号:
1673-629X(2016)04-0090-06
作者:
 沈霞娟[1] 高东怀[1] 郭佳[2] 宁玉文[1]
 1.第四军医大学 网络中心;2.西北大学 现代教育技术中心
Author(s):
 SHEN Xia-juan[1]GAO Dong-huai[1]GUO Jia[2]NING Yu-wen[1]
关键词:
 信息安全素养测评系统评价标准
Keywords:
 information securityliteracyevaluation systemevaluation standard
分类号:
TP319
文献标志码:
A
摘要:
 为了有效增强人们的信息安全意识,实现信息安全素养的科学测量,文中设计并开发了一套在线信息安全素养测评系统。文中首先从测评目标、内容、方法和指标体系四个方面阐明了信息安全素养测评的标准体系,然后提出了信息安全素养测评系统的结构模型,详细论述了题库管理、智能组卷、在线测评、成绩管理、统计分析等核心功能模块,最后结合第四军医大学的实践提出了一套可行的系统实施方案和必要的安全防护措施。结果表明,该系统可以详细测量出个体信息安全意识、知识、技能与伦理四个维度的素养水平,能够满足信息安全专项教育和人才选拔的需求。
Abstract:
 In order to enhance people’s information security awareness and effectively measure people’s Information Security Literacy ( ILS) ,an online ILS evaluation system is designed and developed. Firstly,an ILS evaluation standard system including evaluation target, content,method and index is elaborated. Then,an construction model for ILS evaluation system is proposed. The main functions of the system,such as test database management,intelligent evaluation paper building,online evaluation,score management,statistics&analysis, are described in detail. Lastly,the implementation plan and necessary safety measures are carried out by taking the Fourth Military Medi-cal University as an example. The results show that the system can measure the literacy level of information security awareness,knowl-edge,skills and ethics. The system can meet the needs of information security special education and talents selection.

相似文献/References:

[1]黄松 夏洪亚 谈利群.基于模糊综合的信息安全风险评估[J].计算机技术与发展,2010,(01):185.
 HUANG Song,XIA Hong-ya,TAN Li-qun.Fuzzy Comprehensive Evaluation for Information Security[J].,2010,(04):185.
[2]郑江云 江巨浪.基于信噪比的自适应双彩色图像水印算法[J].计算机技术与发展,2010,(02):160.
 ZHENG Jiang-yun,JIANG Ju-lang.An Algorithm of Adaptive Double Color Digital Image Watermarking Based on SNR[J].,2010,(04):160.
[3]任参 刘少君 黄道平.一种改进的并行签密方案[J].计算机技术与发展,2010,(04):151.
 REN Shen,LIU Shao-jun,HUANG Dao-ping.An Improved Parallel Signcryption Scheme[J].,2010,(04):151.
[4]孟祥宏.信息安全攻防博弈研究[J].计算机技术与发展,2010,(04):159.
 MENG Xiang-hong.Study on Offence and Defense of Information Security Based on Game Theory[J].,2010,(04):159.
[5]赵锋 曹文杰.医院信息系统访问控制策略设计分析[J].计算机技术与发展,2010,(06):144.
 ZHAO Feng,CAO Wen-jie.Design and Analysis of Access Control Strategy for Hospital Information System[J].,2010,(04):144.
[6]杨蕴石 王颖 孙福玉 吕科 赵亚伟.商业银行安全保障体系设计[J].计算机技术与发展,2008,(03):177.
 YANG Yun-shi,WANG Ying,SUN Fu-yu,et al.Design on Information Security System for Commercial Bank[J].,2008,(04):177.
[7]刘华春.基于PKI的网上证券交易系统的构建[J].计算机技术与发展,2009,(07):173.
 LIU Hua-chun.Implementing a System of On - line Securities Trading Based on PKI Technology[J].,2009,(04):173.
[8]罗佳 杨世平.基于熵权系数法的信息安全模糊风险评估[J].计算机技术与发展,2009,(10):177.
 LUO Jia,YANG Shi-ping.Fuzzy Risk Assessment for Information Security Based on Method of Entropy - Weight Coefficient[J].,2009,(04):177.
[9]李超 王红胜 陈军广 孙蕊.加强计算机终端信息安全的两种解决方案[J].计算机技术与发展,2009,(01):165.
 LI Chao,WANG Hong-sheng,CHEN Jun-guang,et al.Two Solutions to Strengthen Computer's Terminal Information Security[J].,2009,(04):165.
[10]邓晓军.PKI技术及其应用的分析[J].计算机技术与发展,2008,(06):144.
 DENG Xiao-jun.Analysis of PKI Technology and Its Application[J].,2008,(04):144.
[11]胡欣杰,路川. 基于访问控制的涉密信息管理安全解决方案[J].计算机技术与发展,2014,24(08):131.
 HU Xin-jie,LU Chuan. A Solution for Management Security of Secret Information Based on Access Controlling[J].,2014,24(04):131.
[12]陈延利[],边巴旺堆[],郭晋丞[],等. 应急通信的安全响应体系研究[J].计算机技术与发展,2015,25(04):108.
 CHEN Yan-li[],BIAN Ba-wangdui[],GUO Jin-cheng[],et al. Research on Security Response System of Communication Emergency[J].,2015,25(04):108.
[13]蒋建军. 数字校园网络立体化安全防护的研究[J].计算机技术与发展,2015,25(09):159.
 JIANG Jian-jun. Research on Digital Campus Three Dimensional Network Security Protection[J].,2015,25(04):159.
[14]张悦[],郑东[],张应辉[]. 一种基于Diffie-Hellman协议的秘密共享算法[J].计算机技术与发展,2015,25(12):123.
 ZHANG Yue[],ZHANG Dong[],ZHANG Ying-hui[][]. A Secret Sharing Algorithm Based on Diffie-Hellman Protocol[J].,2015,25(04):123.
[15]王翔,祁正华,黄海. 不使用双线性对的无证书签密方案[J].计算机技术与发展,2017,27(07):106.
 WANG Xiang,QI Zheng-hua,HUANG Hai. A Certificateless Signcryption Scheme without Bilinear Pairing[J].,2017,27(04):106.
[16]刘鹏. 会计电算化系统信息安全集成解决方案[J].计算机技术与发展,2017,27(08):135.
 LIU Peng. Integrated Solutions on Information Security for Accounting Computerization System[J].,2017,27(04):135.

更新日期/Last Update: 2016-06-16