Font Size: a A A

Research On Host Sectrity In Intranet Security Management System

Posted on:2012-12-24Degree:MasterType:Thesis
Country:ChinaCandidate:L L LiFull Text:PDF
GTID:2178330335960190Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Traditional authentication method of user name/password can not meet the requirements of protection of Intranet-Security. The developing of viruses and malicious software brings great challenges to the use of software in the Intranet-Security. In people's office environment, to ensure the confidentiality of data is also a major problem, or else it may cause the significant loss of individuals, businesses and state property. And there are still security threats of other aspects, such as the safety use of mobile storage devices, the monitoring of illegal connection to the external and so on, which can also threat the Intranet-Security.According to the several major issues which highlight the above, this paper gives a part of the security solution. It is based on C/S structure, and uses USBKEY as the safe carrier, and uses ICE as means of communication. Combined with the technology of identity authentication, hybrid encryption/decryption, SSDT HOOK to address the several major threats within Intranet-Security management system.Firstly, this paper focuses on the research of identification, process monitoring, data encryption/decryption and other security aspects, and proposes the new solutions of identity authentication, process monitoring, data encryption and decryption, and combines with other existing solutions to achieve an overall End-host security system. Especially the relatively hot "cloud security" technology, proposes a solution of "cloud security" process monitoring. Finally, the paper shows the study of the system's analysis and testing, and prospects the new technology to improve the existing mechanisms.
Keywords/Search Tags:Intranet-Security, Authentication, Process-Control, Data-Encryption, USBKEY, Cloud-Security
PDF Full Text Request
Related items