Font Size: a A A

Research On Information Security Of PDM System

Posted on:2006-04-22Degree:MasterType:Thesis
Country:ChinaCandidate:Z ZhuFull Text:PDF
GTID:2178360182469584Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Based on analyzing and researching on the KMPDM software of Wuhan KM Information Technology Co. Ltd. and using the methods and views of software engineering, this thesis elaborates the information security of the PDM system in terms of data encryption and intrusion detection, and against the system hardware, firewall, operating system software, database manage software, application software, data storage and transmission, personnel and communicating process, etc.The thesis presents the security operation target of PDM system, and decomposes the security target into some measureable sub-targets. The security architecture is designed to keep the PDM system from security hidden trouble pertinently and includes network and communicating models. On the former it is narrated that how to safeguard the PDM software security, connection security and secret data security in database, and about the latter the communicating process is described via user logon and the principles and functions of intrusion detection system. The security strategy about operating and maintaining on PDM system is formulated in accordance with the description of international information security standard truss and the strategy of information security system.In this thesis the key technology is also introduced of designing the security architecture, including VPN and encryption algorithm for PDM software security. The diversified encryption algorithms are contrasted. It is specially discussed how to encrypt the valuable data and to prevent the intrusion in order to insure the PDM system operating safely and efficiently. Thereby the PDM system security and ability to counter-attack, advance the usability and reliability of PDM system are improved.Finally to make out the feasibility and security of system security architecture, some functions of the architecture are implemented. Eaxmples are given to show the implementation of PDM system total security. The flow chart of AES is presented and thr implementing effect of AES and function points of intrusion detection system are demonstrated.
Keywords/Search Tags:PDM, Encryption, Decryption, VPN, Intrusion Detection, Security Architecture
PDF Full Text Request
Related items