2.1 LoA1 威胁 ...................................................................................................................................................... 11 2.2 LoA2 威胁 ...................................................................................................................................................... 13 2.3 LoA3 威胁 ...................................................................................................................................................... 15 3 实施策略 ...................................................................................................................................... 17 4 摘要 ...................................................................................................................................................... 19 附录 A:JFAC FPGA 文档概述 ............................................................................................. 20 附录 B:标准化术语 ...................................................................................................................... 22
2.1 LoA1 威胁 ...................................................................................................................................................... 11 2.2 LoA2 威胁 ...................................................................................................................................................... 13 2.3 LoA3 威胁 ...................................................................................................................................................... 15 3 实施策略 ...................................................................................................................................... 17 4 摘要 ...................................................................................................................................................... 19 附录 A:JFAC FPGA 文档概述 ............................................................................................. 20 附录 B:标准化术语 ...................................................................................................................... 22
1.1.识别和定义特定的保证级别 ...................................................................................................... 2 1.2.建立具体标准 ................................................................................................................................ 3 1.3.识别一组已知的相关威胁 ...................................................................................................... 5 1.4.确定每个威胁与哪个保证级别相关 ............................................................................. 5 1.5.识别针对威胁的常见缓解措施 ............................................................................................. 6 1.6.与供应商和利益相关者合作 ................................................................................................................ 7 2.检测和缓解威胁 ................................................................................................................ 8 3.了解并应对攻击 ............................................................................................................. 9 4.使用保证流程 ...................................................................................................................... 9 5.结论 ...................................................................................................................................... 10 附录 A:标准化术语 ............................................................................................................. 11 附录 B:LoA1 缓解概述 ............................................................................................................. 14
1.1. 确定并定义具体的保障级别 ...................................................................................................................... 2 1.2. 制定具体标准 ...................................................................................................................................... 3 1.3. 确定一组已知的相关威胁 ................................................................................................................ 5 1.4. 确定每种威胁与哪种保障级别相关 ...................................................................................................... 5 1.5. 确定针对威胁的常见缓解措施 ............................................................................................................. 6 1.6. 与供应商和利益相关者合作 ...................................................................................................................... 7 2. 检测并缓解威胁 ............................................................................................................................. 8 3. 了解并应对攻击 ............................................................................................................................. 9 4. 使用保障流程 ............................................................................................................................. 9 5. 结论 ............................................................................................................................................. 10 附录 A:标准化术语 ............................................................................................................................. 11 附录 B:LoA1 缓解概述 ................................................................................................................ 14
