Font Size: a A A

Computer Operation Analyzing And Data Security Managing System

Posted on:2007-02-08Degree:MasterType:Thesis
Country:ChinaCandidate:J F ChenFull Text:PDF
GTID:2178360182960834Subject:Mechanical and electrical engineering
Abstract/Summary:PDF Full Text Request
Based on computer remote scouting technology, computer operation analyzing and data security managing system is a solution to deal with the problem, which is difficulty of distributed computer management, inaccurate performance assessing and enterprise's data security.Firstly, the paper discusses meaning and developing status in quo of the system. After analyzing detailedly requirement of system and technology characteristic and application superiority of C/S structure, it designs system's general structure based on C/S structure. Secondly, not only does it implement module design and secures stabilization and expansibility of system using thinking of component development and object-oriented design, but also it discusses detailedly design thinking and realization process of system. Finally, it designs simple and friendly user interface and solves the problem, which is lower computer operation capability of managers in the enterprise.The paper implements transfering scouting data file in the way of socket and the process of transfer is stable and reliable. Using the hook technology and user-defined rule, the system implements the function of collecting, stating and analyzing data and reappears the detailed work status on the client terminal using it, which can help enterprise find an objective standard of performance assessing and a way to increase management efficiency. The paper analyzes the risk that enterprise's data security has to face. And then, it brings forward two methods to turn data security into reality. One is method of encrypting data; the other is method of scouting email and removable storage device. Not only does a second method ensure normal work of data transfer, but also it can record data operation on the two convenient approaches, which can leak out the secret. The module makes enterprise's solution of data security more perfect.Using the technologies such as hook, network communication, data encrypting and database, computer operation analyzing and data security managing system has been implemented. For the moment, it is running stably in the enterprise.
Keywords/Search Tags:Computer Operation Analyzing, Data Encrypting, Email Scouting, Removable Storage Device Scouting
PDF Full Text Request
Related items