信息网络安全 ›› 2014, Vol. 14 ›› Issue (9): 171-175.doi: 10.3969/j.issn.1671-1122.2014.09.039

• 入选论文 • 上一篇    下一篇

应对多种威胁的安全计算机终端

张学军, 李予温   

  1. 中晟国计科技有限公司,北京 100011
  • 收稿日期:2014-08-06 出版日期:2014-09-01
  • 作者简介:张学军(1975-),男,湖南,工程师,硕士,主要研究方向:通信、计算机和安全保密;李予温(1968-),男,山西,本科,主要研究方向:信息安全。

A Secure Computer Terminal Coping with Various Threats

ZHANG Xue-jun, LI Yu-wen   

  1. China Security Operations Computer Ltd., Beijing 100011,China
  • Received:2014-08-06 Online:2014-09-01

摘要: 计算机是信息系统的重要组成部分,它面临来自外部和内部的信息安全威胁。目前计算机终端上的防护方式主要针对来自网络和外部的病毒、木马和攻击等安全威胁,对于内部人员的疏忽和蓄意造成的泄密基本无能为力。此外,由于防护功能建立在待保护的计算机上,其本身可靠性受现有计算机硬件与操作系统的各种缺陷和漏洞的制约。文章提出了一种具备独立防护系统的安全计算机架构,理论分析和实践表明,该架构能够有效应对外部和内部的安全威胁,保护计算机本身及内部数据信息的安全。

关键词: 计算机, 防护系统, 双主机, 可信计算

Abstract: As an important part of the information system, computer faces security threats from external and internal. The current way of protection, mainly against viruses, Trojans and other security threats and attacks from the network and external, has little effect on negligence and deliberate leaks from behavior of internal staff. Furthermore, the protection function is based on the computer to be protected, its own reliability is limited. This article proposes secure computer architecture with independent protection system, theoretical analysis and practice show that this architecture can effectively respond to external and internal security threats, protect the security of the computer itself and internal data information.

Key words: computer, protection system, dual host, trusted computing