Font Size: a A A

Security Design And Realization Of Mobile Government

Posted on:2016-09-19Degree:MasterType:Thesis
Country:ChinaCandidate:J LiFull Text:PDF
GTID:2298330470950333Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Government information is the basis of the information society。E-government is thekey areas of national information infrastructure. In china E-government development hasbeen from the direction of infrastructure development stage to the direction of deepen theservices through ten years. It can share information and provide faster convenient servicefunction. With the rapid development of mobile Internet and the popularization ofintelligent terminals and mobile, E-government is a new way to move the government toprovide services to citizens. It can promote the government’s services and an innovativeapplication when the traditional e-government development expanded to a certain stage.Mobile government has been applied successfully in many cities in our country. However,the presence of high-risk mobile technology itself must face the facts. Currently comparedwith the traditional e-government security, the mobile government security is still in itsinfancy from theoretical research and development model to specific construction andoperation the Mobile Tax System of DQ cityThis paper focuses on the safety design of the Mobile Tax System of DQ city. The systemuses the existing mobile network to connect with the existing and processing taxinformation system through wireless mobile terminal and constitute a new generation ofthree-dimensional network of the tax information system. It analyzes the security threatsfrom the mobile terminal, mobile communication and the application layer through thesystem framework. Mobile terminal operating environment and performance are limited.Resources can not be chose freely. Because of the limitations of memory and processingequipment, display space and so on it affected the function of data encryption, data integrityand reliability. A relatively probability of stolen or loss mobile terminal is higher. Thereplacement cycle is shorter. Security issues are growing exponentially because of theimmature of mobile soft environment, open operating system, diversity platform and themobile network imperfections. Mobile network transmitted an electromagnetic wave signalso mobile network attacks easier than cable network by physical security such aseavesdropping, deception or denial of service, information tampering and so on.The security threat of the tax system need of security protection through technology.Authentication and the stopping lock can improve the security level of the mobile teminal. Second, Data encryption and decryption can improve the mobile communication andpermission settings and Session monitoring is effectively to deal with the security threats ofthe application layer.The comprehensive, complete and rigorous management capacity is key factors while thetechnology limited. As characteristics of IT show: in a successful IT case, perfecttechnology decides30%of the result, while excellent management,70%. Finally theperiodicity security assessment can discovered new threats faced by technological advancesand the presence of new vulnerabilities.Security is basically a compromise, It is the costs balance between. the exclusion risks andthe attacks risk. Although in theory, completely secure system can be done, but in reality, itis basically impossible. The assessment and analysis exist appropriate security threat. Andthe maximum degree of balance is obtained among availability, reliability, integrity andcost from the aspect of technology and management, law, industry, etc.
Keywords/Search Tags:Mobile, E-government, Security System, Security Technology, Security Management
PDF Full Text Request
Related items