Font Size: a A A

A Study Of Network Security For Seismic Information Service System

Posted on:2007-04-07Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiuFull Text:PDF
GTID:2120360185474100Subject:Solid Geophysics
Abstract/Summary:PDF Full Text Request
"Seismic Information Service System"(SISS) is the important component of the"China Digital Earthquake Observation System", which provides the basic network communication platform for some other system (seismic observation,earthquake emergency,etc.) of the China digital earthquake observation network project. The main function of SISS is to process and to manage the earthquake observation data, and provides data and information for the earthquake and other related trade and make information safeguard for the important decision-making of the government. With the wide application of the computer network, network security becomes more and more important and complicated. The tremendous threat for the SISS is produced by the network resource share, information exchange, expanding of the good network application providing by distributing management, diversification of the network structure and the safety need of the digital earthquake observation system, especially the bad information, illegal access, system drawback and virus from the Internet. Therefore, the uniform secure access strategy, security technique and security management need to be provided by the EISS. It is very important for the network security manage system in the"China Digital Earthquake Observation System"project.In this thesis, the construction status of SISS is introduced in the first chapter, and then the security requirement analysis for the EISS is processed based on the characteristics of the EISS, especially the transport properties of earthquake date as IP data flow. After the international information security standards BS7799 is simply introduced, the scientific structure and the design principle of the security system as the basis of the second chapter are put forward by analyzing the arrangement relation of the information network.In the second chapter, Integration of network security is emphasized as...
Keywords/Search Tags:Information, Security, Network, Management, Policy
PDF Full Text Request
Related items