Font Size: a A A

The Research Of Key Technologies Of The System For Checking Secret Information Involved In The Intranet

Posted on:2012-11-17Degree:MasterType:Thesis
Country:ChinaCandidate:J B LuFull Text:PDF
GTID:2178330335474528Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The rapid development of information technology today, there is a growing emphasis on information security. The system for checking secret information involved in the intranet is a mandatory checking system to prevent secret documents. System work in a high security requirements intranet on the LAN to C/S structure. Check the policy set by the server and control the client's secret information check the module. This paper analyzes the function of secret information checking system and module structure. A detailed system design. And focus on the key technologies of the implementation of the system involved in a detailed research.In information security technology, at home and abroad have made some achievements, there have been some sophisticated security technology and security products. But for computer users to manage their own behavior to achieve the purpose of confidentiality, research in this area is still relatively small. This did work in this area, specific content contained in the article include the following:1, Check secret information involved in the intranet needs analysisComputer security at home and abroad through a variety of reports, learn computer and network security threats facing. Further understand that LAN security threats that may exist. This paper introduces the various information security technologies, including firewalls, intrusion detection, anti-virus software. Raised a number of security incidents are actually caused by the user irregularities. Check the classified information presented LAN system, the behavior of computer users by binding to prevent the disclosure of classified information.2, Design the checking secret information involved in the intranetCheck under the classified needs, design a checking secret information involved in the intranet, the system is divided into client and server side. Server set the check strategy, and control the client. The client receives the instructions from server to start checks。the other hand, also according to the check strategy for the client, from time to time between the start secret check.3, Key technologies of the checking secret information involved in the intranetImplementation of the checking secret information involved in the key technologies in detail. Including local area network topology discovery, document traversal search, office document structure analysis, software, anti-delete mechanism.
Keywords/Search Tags:intranet, checking secret information, office document, software anti-delete mechanism
PDF Full Text Request
Related items