{"title":"为连接到Internet的系统开发和推广一致的安全配置基准","authors":"C. Kreitner","doi":"10.1109/HICSS.2003.1174462","DOIUrl":null,"url":null,"abstract":"This paper describes the formation of The Center for Internet Security and the process it and its members are using to produce globally recognized and adopted consensus security benchmarks for users to configure their workstations, servers, routers, firewalls, switches and other devices. Examples are provided of the benchmark standards developed via this global consensus process. Scoring Tools used to monitor compliance with the benchmark settings are also discussed.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"77 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The development and proliferation of consensus security configuration benchmarks for systems connected to the Internet\",\"authors\":\"C. Kreitner\",\"doi\":\"10.1109/HICSS.2003.1174462\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper describes the formation of The Center for Internet Security and the process it and its members are using to produce globally recognized and adopted consensus security benchmarks for users to configure their workstations, servers, routers, firewalls, switches and other devices. Examples are provided of the benchmark standards developed via this global consensus process. Scoring Tools used to monitor compliance with the benchmark settings are also discussed.\",\"PeriodicalId\":159242,\"journal\":{\"name\":\"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the\",\"volume\":\"77 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2003-02-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/HICSS.2003.1174462\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HICSS.2003.1174462","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The development and proliferation of consensus security configuration benchmarks for systems connected to the Internet
This paper describes the formation of The Center for Internet Security and the process it and its members are using to produce globally recognized and adopted consensus security benchmarks for users to configure their workstations, servers, routers, firewalls, switches and other devices. Examples are provided of the benchmark standards developed via this global consensus process. Scoring Tools used to monitor compliance with the benchmark settings are also discussed.