Font Size: a A A

Design And Implementation Of The Network Terminal Information Storage Security Monitoring System

Posted on:2008-04-12Degree:MasterType:Thesis
Country:ChinaCandidate:J QuFull Text:PDF
GTID:2178360242972243Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As the infrastructure of information storing, transporting and processing, the security of computer terminal is an important part of network security. A survey shows that in government and enterprises, more than 80% of the management issues and security issues come from the terminal. Network terminal information security includes system security, transmission security and storage security. At present, people pay great attention to the former two, various safe products such as firewall, IDS, physical isolation have protected the confidential information from outside attack effectively, But the greater threat to the internal network storage security has not been given the attention deserved, Which leads to information leakage and theft is very serious.At first, the thesis gives an introduction to the background and research on internal network storage security, then based on analyzing the relevant key technologies of storage security, the thesis draws an integrated system for network terminal information storage security.The system adopts synthetically various means such as authentication, file monitoring, storage encryption and peripheral storage equipments monitoring to ensure the storage security. Through replacing Windows GINA.dll to extend Windows logon process, it advances the authentication security; by hooking API, it guards the use of peripheral storage equipments in user layer; by loading file system filter driver, it monitors confidential file operation and encrypts and decrypts file contents dynamically in kernel layer, achieving whole monitor and convenient encryption and decryption. Finally, the system was tested. The experimental data indicates that the system is both safe in storage and convenient in access control, preventing the leakage of confidential information effectively.
Keywords/Search Tags:Storage Security, File Monitoring, Storage Encryption, File System Filter Driver
PDF Full Text Request
Related items