Font Size: a A A

The Application Of The Multi-Protection About The User Data

Posted on:2011-11-28Degree:MasterType:Thesis
Country:ChinaCandidate:X Y WangFull Text:PDF
GTID:2178330332963249Subject:Computer technology
Abstract/Summary:PDF Full Text Request
There are two types of information systems data, one is user data, and the other is the security of data. For the protection of user data has always been one of the important goals of information security, but also all of the important issues. With the development of the network, especially the Internet, information technology society increasingly dependent on, security is particularly prominent. Because information security in China started late, so the pressure greater, the task more difficult.The author of this area by more than twenty important to check the information systems unit, they found many common problems prevalent:Clear understanding of the system's conservation goals, Not based on security attributes to develop appropriate security policies, System level and the need to protect does not match the technical requirements, Different security levels and security attributes of the data mixed together, Focus attention not only to protect the bottom of the application layer protection. Combined with the analysis of national and international standards, the theory of and practice of checking the rectification unit experience to a conclusion. Information system users are given the basic framework of data protection and ideas:User data should be sub-grade, sub-attributes, sub-regional and sub-levels of protection. This paper describes the specific properties of the sub-proposed the idea of user data protection. From the data confidentiality and integrity of the data be considered. Listed in the specific practice of user data attributes and the appropriate level of security, develop appropriate protection measures. Data for the user to provide more comprehensive protection. Examination paper with an online securities trading system as the main example to illustrate the author's point of view. In order to solve the on-line securities trading system highlighted in the Pirates of the buying/stealing and selling issues.
Keywords/Search Tags:Userd Data, Multi-Protection, Grade, Attribute, regional, Level
PDF Full Text Request
Related items