Font Size: a A A

Study On Survivable E-Government Extranet System Of Chongqing

Posted on:2005-06-10Degree:MasterType:Thesis
Country:ChinaCandidate:H B HuFull Text:PDF
GTID:2168360152465563Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In order to enhance the e-government development in Chongqing, narrow down the gap between eastern areas of China and Chongqing and fulfill the transition from traditionally-administered government to e-government, the departments of Chongqing government have been making efforts at speeding up the pace of e-government. However, despite the great convenience supplied by e-government to both government and society, as the crucial information infrastructure, it confronts the serious challenge of security. Once the information network of government is under planned attack and damage, e-government system will suffer from the disaster to national security, economy development and social stableness.Currently, researches on security of e-government network mainly focus on the defense work with the security equipments and techniques aiming at security defense, which is not effective enough. To a certain extent, the global network cannot prevent all the attacking and hacking online, regardless of rigid measures taken. Therefore, it is necessary for us to solve such problems beyond the system itself by aiming at the survivability of the system, which means to fulfill missions by the re-configuration of resources, self-upgrading, self-maintenance, and self-adjustment in the case of attack and damage. The research and development of the information security technology and other researches concerned strengthen the survivability of system, but is far from adequate to protect the system from being attacked by any of them. So, researches on the survivability pose a compound security structure for security technology.The national security departments regulate on the security of important information system differently based on the confidentiality. The author first makes the assessment on the security risks of extranet of e-government information system and follows with the analysis of its survivability. In the research, it proposes with the hypotheses that the certain security risks and loopholes exist in the extranet and it is likely to be attacked and hacked. In addition, based on the service float as the core technique, combined with current technology, such as intrusion detection, honey-net, disaster recovery, etc, the author constructs a survivable network systems framework with the important security target: integrity and availability, which approaches a case for response strategy of e-government.
Keywords/Search Tags:E-government, information security, survivability, emergent responses
PDF Full Text Request
Related items