Font Size: a A A

Design For The Central Plateau Of Internet Information Security Management And Audit System

Posted on:2006-05-25Degree:MasterType:Thesis
Country:ChinaCandidate:W WangFull Text:PDF
GTID:2168360182456894Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the coming of Internet economic times, Internet will be a wildly used instrument. The economical, cultural, military and social activities will strongly rely on the Internet. The security and reliability of Internet have attracted the eyes of different countries. However, the characteristics of Internet, such as non-administration, trans-nation, non-defense and less legal restrict, bring the developing chances as well as great venture to nations. Nowadays, we have become the second state in the scale of using Internet and the amount of people surfing Internet. However, the security of information accompanying with the use of Internet becomes more serious and has brought inestimable negative effects. The hostile influence, the organizations of national liberation tide, the race abruption influence and the terroristic bodies use Internet to undermine and overturn our nation; maliciously frying to make the hot spots and the allergic events, demagogy and alluring the dissatisfied emotion of the people have seriously effected the social stability; the information about gamble and deception which comes to prosperity has undermined the security order at Internet, Infringed upon the legal rights of the people, endangered the development of Internet and destroyed the national security. The communist party and the government paid more attention on maintaining the information security on Internet. The information security audit of Internet is not only a newly arising research area, but also a realistic research question. Nowadays, some states take the leadership in the area of the information security audit, such as the United States, France, Israel, the United Kingdom, Demark, Swiss, etc. On the one hand, these states have long histories in the technology, especially in the technology of rush pith, on the other hand, these states take advantage of the applying the technology of information security, such as, the electronic government affairs, the information security applied by the business, etc. They have the advantage in traditional security products, such as the firewall, invading monitor, loophole scanning, notified identification, and etc. Although the researches on the technology of information security and the industry scale have greatly been improved in the past few years, we fell behind the western countries. As our country attached more importance to the information security, improved the input and appropriately organized, we have had amount of achievements. More and more scientific research institutes and business began to take part in the information security technology and products development. We have had a tentative information security products market. The article is composed of 5 sections. In the first section, we argue the background and the significance of system design, and the development of the information security products market throughout the world. At the same time, we illustrate the main ideas of the article: starting from the perspective of apply, we are to design a reasonable controlling plateau to suspect the units who surf the Internet and to manage the information security affairs which occurred among the above mentioned units in order to discover, report to the police and utterly to prevent the various crimes occurring on the Internet. 1.The requirements analysis of the central plateau of Internet information security management and audit system. We take advantage of the basic methods for the requirements analysis to describe the functional requirementsof this system, in order to design the system model. 2 . The communication design for the central plateau of Internet information security management and audit system. This section is not only the core of the whole Internet information security management and audit system, but also the main idea of this article. 3.The web design for the central plateau of Internet information security management and audit system. This article adopted the B/S structure to design, which is benefit for the flexible operation for the users. After that, we are going to illustrate the arrangement of the chapters. In the second section, we take advantage of the basic theories and methods of the requirements analysis of software engineering to describe the function of the central plateau of Internet information security management and audit system, in order to make out the functional table which introduces how to carry out the central plateau. Introduce the conception referred to in this article. In the light of the work which has done during the requirements analysis to make up the PAS audit system structure, the user can decide how to use the management level according to their own need because of lack of restrict on the way of applying. PAS is a communicative system, which not only provide the direct information input for the basic units, but also provide the bilateral communication for each management center, so it can make up the multilateral management system among each management centers to meet the need of unified arrangement for control, investigation and audit. At last, we draws up the model structural graph and explain the function of each model. In the third section, the communication design for the central plateau of Internet information security management and audit system is the main idea ofthe article. This design emphasized on the management plateau which faces the communication of the users and the computers and the development of the communicative software between the provision and municipality servers. Firstly, to determine the function which carry out the communication between the center plateau, and draw up the structural graph. To make up the main communicative program of the central plateau, and finish the start and initiative of the system. Secondly, to describe the applying process of the important functional models, such as the shake-hands model, the order-received model, the register model, the protocol-analysized model, PHP-communicated model and the data model, etc, to draw up the process graph and to make up the program code. Lastly, to design the system error code table, to make up a paragraph of program and in order to add the system error information to the words of communicative table. In the fourth section, we want to illustrate the web design for the central plateau of Internet information security management and audit system. As this part adopts the B/S design, when users use the system by the web of central plateau, they can use the system according to the need of their work. To do this will be more beneficial to the users. In order to design the system jurisdiction, we should pay more attention to two aspects as follows: one is the operation jurisdiction, including adding, amendment, omission, request, transaction and recovery; the other is scope of the operative data, which is ranked into four levels: non-data, personal data, the level's own data and total data. We should draw a content structure under the plateau and design the process of register and of jurisdiction judgment. Lastly, on the light of the need of work, we should design the process under the arrangement of control. After the approvalof the appeal for arrangement of control, the order data is distributed by the same way as CAS, firstly, send a UDP package to one of the UDP lines of UC to notify the main idea of an order and the number of the order, after receiving the data, UDP line notifies the business line to read the order data according to the number of the order, and to distribute by the way of determined communicative protocol. As to the unsuccessfully sent data, system will save it in the data base, and UC will read and distribute it when UDP line notifies the next time in order to ensure all the orders be distribute reliably. In the fifth section, we draw a conclusion to sum up all the above work in order to illustrate the purpose and meaning for the development and research of this system and argue the issues which lie in the area of information security management and audit. The business indoors who take part in the information security audit and the development of information security audit products basically work according to the audit of the contents, although there is some a few business who are researching on the voice and image audit technology, there is not a market for the input of the products. Lastly, we foretell the trend of our marketing development in the area of information security technology and products.
Keywords/Search Tags:Information
PDF Full Text Request
Related items