Font Size: a A A

The Research And Implementation Of Data Security In Network Grading System

Posted on:2006-07-05Degree:MasterType:Thesis
Country:ChinaCandidate:S J SunFull Text:PDF
GTID:2168360155476518Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of the network, the global information has been the main tendency. But because of the variety of the network connection, the asymmetry of the terminal distributing and the characters of the network's opening and interlinkage etc, making the network being attacked easily by the hacker, hostility software and other bad behaviors, so it is an important problem of the security and secrecy of the data on the netwdrk. For the system's client and server is connected together by the internet, and the data is transformed by it, so the variety of the above dangers can also do harm to the Judging Test Paper through network system. Thus, to guarantee the students' paper and scores data saving on the servers veracity, not alterability and integrality, Network and database security are the first problem needed to be solved. It is also the main problem studying in this paper.This paper mainly study the security protocol SSL and the theory of data encrypting/decrypting algorithm -. digital certificate and digital scratch. Using JSSE(Java Secure Socket Extension) to implement the secure communicate, Using Java Language's secure API function to implement the data's secret and authentication.This paper also study the "backup and recover" of the large-scale database and its access control function;In addition, this paper also study the disk array technology, to implement the data saving security;In order to strength the system's security, firewall technology also needed. This paper mainly compares the type, function, performance of the firewall in the market, and chose the firewall fitting this system.In this paper, chapterl introduces the significance and solution about the system security. Chapter 2 describes the whole structure of this system. Chapter 3 provides the hardware and software precautions through analyzing the theory about information security. Chapter 4 introduces the designer scheme about this system. Chapter 5 introduces the implementation about the security part of this system. Chapter 6 summarizes and discusses the strongpoint and shortage about this system's security, and brings forwards what needs expanding and perfecting in the future.
Keywords/Search Tags:Network grading, Data Security, SSL, Digital Certificate, Digital Scratch, Firewall
PDF Full Text Request
Related items