Font Size: a A A

Network Security Systems Design Of CETDZ E-government

Posted on:2006-02-22Degree:MasterType:Thesis
Country:ChinaCandidate:H Y MaFull Text:PDF
GTID:2168360182457162Subject:Software engineering
Abstract/Summary:PDF Full Text Request
As information technology (IT) rapid developing in nowadays, e-government have already played more and more important role in the governmental operations. It is not exaggerate to say, without IT or unable to run the e-government due to security problems, most of the governments would be unable to carry on the routine duties, and result in a directly negative effect on the local economical development. The e-government system is based on the Internet platform. In the point of view from the technical aspects, there are many unsafe factors in the global internet networking. Therefore, the network safety issue is urgently to be explored and solved. With the e-government security technology rapid developing, to widen the applications of security technology is an important duty. However the network security is not only the collections of firewall, anti-virus, invasion examinations, certification authentication and encryption; but also the integration of the complete system from the system to the application, and from the equipment to the service. The e-government information security is not only the technical problem, but also the tight integration of technologies, tools and managements. This thesis includes into six chapters: In the first chapter, an overall review is given on present situation, prospect, concept, history and development of the domestic and international e-governments. A further analysis is carried out on the national and Changchun economic and technology development zone (CETDZ) e-government current situation, the development tendency and the goals, which has setup the objectives of this research. In the second chapter, by the specific descriptions of external environment and information requirements encountered in the e-government system, analyzed the e-government security requirements, i.e. authentication, jurisdiction control, information security, data integrity and anti-denying services. The objects and the services of CETDZ e-government are thoroughly studied. And the CETDZ e-government network application structure and emphasis the key protective objects are pointed out. In the third chapter, the network architecture is investigated into the physical layer, the network layer, the systematic layer, the application layer and the control layer. Then, every kind of possible security risk is analyzed in the e-government network. The e-government the main threat and unsafe factors are detected, and the main problems and characteristic which influences e-government network security are identified. In the fourth chapter, the CETDZ e-government network security general goals are clarified. Using computer technology, the network technology, the password technology and the security technology to safeguard the privacy, the integrity, the authenticity, the reliability, the usability and cannot deny nature of information transmission, swap and storage in e-government. Determined CETDZ's network security concrete goals that is to solve the main security problem mentioned in the third chapter. In the fifth chapter, studied and discussed the security design and implementation plan of CETDZ. According to CETDZ's secure protection system, designed its secure solution which is the physical security, the firewall, the invasion examination (guarded against hacker), the security leak scans (access control), the CA certification, the viral guard, the homepage guards against tampers , the data backup and (secure audit) eight defense systems. Each systemVI is detected from different angles with the view point of different layer structures by adopting corresponding methods and strategies, and preventing illegal criminalities from the hacker, the network spy, the information warfare hostile element and the terrorist. In the sixth chapter, elaborated if only rely on network security technologies in e-government is not only a completely security system, but also establish a set of science and strict safety control system, in order to provide CETDZ e-government network security guarantee. Meant that, the e-government network security system should be the organic synthesis of technical, the tool and the control, but is not depends upon technical and the device merely. The slogan, three of tenth with technologies, seven of tenth with management, gives a good suggestion. Recommended uses five aspects contents safety control paradigm of the technical management standard, the personnel and the organizational structure, the emergency incident and the response, securely serves. In the seventh chapter, the thesis is generally summarized with description of the main research work. In brief, the e-government network is important window opened to the public and the social service, to strengthen the security construction and management is necessary. In the important area, must additionally build the firewall, the invasion examines the checkpoint, or enlarges the firewall power. The special safeguarding must be installed to the very important areas. In the same time, strengthens the safety control consciousness, perfect system and regular training. Through thoroughly studies to the e-government secure measures and reports, solute the problem and hole which found promptly make sure our e-government validly to exercise the government function. Furthermore, in the e-government secure construction, the tread-off betweenof the security, the cost and the efficiency is need to consider. In fact, there is no absolute security, the e-government system is not "the secure, the better". For different e-government system, different security plans and measures are needed according to information security requirements. How many locks required is depended on the importance of the contents in the door. More locks would cost more and the door usage would be lower. Therefore, security level would better depend the actual requirements of the e-government system.
Keywords/Search Tags:E-government, resource share, Internet, virus, firewall, server, storage area network
PDF Full Text Request
Related items