Font Size: a A A

Security Analysis And Design Of The Social Security Information System

Posted on:2006-09-06Degree:MasterType:Thesis
Country:ChinaCandidate:X J GaoFull Text:PDF
GTID:2168360152496537Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With China's reform and opening-up being implementing more and more intensively and economic construction developing continuously, the people's living standard has been improved and upgraded to a great extent. It has been the broad people's press for an established and perfect social security system, which is essential to the people's benefit and interest and thus a project of significant reform with far reaching influence, and has been coming to the close attention of the departments at different levels under the Party and government authorities. It is imperative to establish and perfect our social security system, which is of great significance and essential to the whole situation of reform, development and stability. There is no time to delay.The Social Security Information System of Guangdong Province (hereinafter called the System) is a systems engineering under the above background. The system uses mature IC technology as the medium for the storage and exchange of the individual-centered information, centralizes all information separating in different applied systems, realizes the collection, identification, share and exchange of the information of the laborers and social security, and, safely and easily meets the need of the management of human-oriented principle in the information age.Security system construction vitally secures the realization of the information share and the efficient operation of the System. Starting with the applied conditions and the main technological features, this paper first summarizes the general structure of the System, then dissertates the security of the System in detail when pointing out the designing objective, namely, the secrecy, integrality and high usability of the applied system, then expounds the integrality of the information safety management and the hierarchy of the safety strategy from the point of view of the security structure and its design, and then depicts the structure of the three-dimensional security system. On the basics of above discussion, the paper detailedly analyses the applied system security, data system security and cryptogram system of the systematic unit dimension of the structure.Because of the commonness of the protocol hiberarchy dimension and the limited length of the paper, the protocol hiberarchy dimension have not been discussed in detail.
Keywords/Search Tags:Card, systematic security, security design, data encryption
PDF Full Text Request
Related items