Font Size: a A A

Design Of A Safety Management System And The Implement Of Security Strategy

Posted on:2012-02-24Degree:MasterType:Thesis
Country:ChinaCandidate:Z Z YuanFull Text:PDF
GTID:2178330341450757Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
As the development of information technology, more and more requirements of secrecy are put forward. More secrecy information is referred by departments of government and institutes of war industry. It makes the work of secrecy much more difficult. Along with the demands of users, enterprise starts multiple applications to meet the increasing requirements to provide service that are much faster and more convenient than ever before. In the building of enterprise information management system, a lot of application systems are improved. Meanwhile, these systems are still facing security threatening which are becoming more and more involved and diverse and there are still many drawbacks in enterprise information management system. The security measurement and technology are independent from each other at the present time. Therefore it is an important content in building the digital enterprise information security system to establish a not useful but also valid security mechanism to regulate users and resources consolidated. The research has more meanings. The purpose of the research would solve the questions in security of enterprise. As a result, the research applies an adaptability model which will provide a material example in the future.This article introduces a design of information system for secrecy management according with the requirements of secrecy. The system contains management of personnel, management of physical security, management of equipments and mediums, management of operation security and management of information safety. It helps to carry out secrecy work fluently by these five parts which cover all most all the secrecy work items in daily life. In addition, this article also presents security architecture of enterprise information management system by analyzing and designing of the system and discuss about the technologies of security. The architecture is separated into data model layer, data access layer, business logic layer and user interface layer. It is propitious to ensure the stability of system on the one hand and it is also in favor of ensuring the security of data on the other hand.The article still discuss about the implement of security technologies in common use. We design a security enterprise information management system based on technique of encryption and identity authentication to provide a secure environment to enterprise users.
Keywords/Search Tags:Information Management System, Uniform Identity Authentication, Digital Signature, Security
PDF Full Text Request
Related items