Font Size: a A A

Design And Implementation Of "Snapshot" Module In Intranet Supervision System Of Harbin Fire Brigade

Posted on:2012-08-10Degree:MasterType:Thesis
Country:ChinaCandidate:P DingFull Text:PDF
GTID:2178330332499287Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the extensive application of the computer, it brings the convenience to people, but also profoundly affects the way people work and live. The rapid development of the computer technology and the Internet results in a large number of security problems, which attracts the wide attention and research from the researchers.For the security protection system of the organization, particularly the Intranet of the organization, the biggest threat is always not from the outer of the organization but the inner. Compared with outer people of the organization, the inner are more familiar with the information and resources of the organization, and have the stronger access authorities. Malicious abuse of the control and operating authority, or the wrong operation because of the negligence, often leads to the serious security risks, and even leads to the collapse of the internal security system. So, it is very necessary to adopt the Intranet supervision system.Due to the sensitivity and specificity of the Harbin Fire Brigade, it is very necessary to guarantee the absolute safety of the Intranet. In addition to addition to the necessary protection mechanisms of hosts and networks, such as firewall and antivirus software, the way the internal staff uses the resources of the Intranet must accord with the higher requirements. In order to monitor and regulate the rational use of the Intranet and enhance the security level of the Intranet, we design and implement the "snapshot" module in the Intranet supervision system of Harbin Fire Brigade. The "snapshot" module can monitor and record the various operations on the hosts of the Intranet at real time, and send the data to the remote monitoring center through the Intranet in time, and find the security risks and malicious operations of the Intranet, and provide the technical assistance to the future security tracing and evidence collection.We design and implement the "snapshot" module according to the software engineering. The whole system includes five modules: the keyboard information interception module, the screen information interception module, the timing module, the compression module and the mail module. We follow the bottom-up approach to implement the whole system. Firstly, we implement every module of the system, and then combine all the modules into the "snapshot" system. The system implemented in the paper achieves all the intended target, and it is very meaningful to enhance the security level of the Intranet. At the same time, it has good application prospects, and it is valuable for other similar works.The main structure of this paper is as follows:Chapter 1 mainly introduces the background, and describes the reason of developing the system, the design goals of the "snapshot" module in the Intranet supervision system of Harbin Fire Brigade, the feature of the system and the main work of the paper.Chapter 2 mainly introduces the technology and knowledge used in developing the system, which include the SMTP protocol, the winsocket the zip program, the windows HOOK functions and the related graphics Knowledge of the screenshots.Chapter 3 mainly introduces the feasibility study and the requirement analysis of the system, which includes: the operating environment of the system, the flow chart, the system functional requirements, the performance requirements, the operational requirements and so on.Chapter 4 mainly introduces the division of the modules, the function of each module, the design of the database, the relationship and structure of the tables in the database and the deployment of the software and hardware of the system,.Chapter 4 mainly introduces the detailed design and implements of the system, and it describes in detail the function description, the flow logic and the core code sample of the keyboard information interception module, the screen information interception module, the compression module and the mail module.Chapter 6 mainly describes the running and testing condition of the system, which includes the screenshots and the functional descriptions of the keyboard information interception module and the screen information interception module. According to the experiment results, the system proposed in this paper, which runs stably and is valuable for later studies.Chapter 7 summarizes the study of the paper, and gives the future works.
Keywords/Search Tags:computer security, snapshot, keyboard, screen, SMTP
PDF Full Text Request
Related items