Font Size: a A A

Research And Implementation On Security Technology For The Cadre Management System

Posted on:2007-02-16Degree:MasterType:Thesis
Country:ChinaCandidate:Z Q WangFull Text:PDF
GTID:2178360215470473Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of the computer network and communication technology, information technology has brought widely and profoundly revolution. We have entering the era of "information war". And the Command & Control, Communications, Computers and Intelligence Surveillance and Reconnaissance (C~4ISR) system have acted as a more prominent role in the army's modernization. The military office automation system is an important part of C~4ISR system.With the design of the army's cadre management system as the background, this paper designs a security platform focusing on security challenges to user-side client system. This platform is very practical, and it provides high level security. So it can help us to ensure the security of the operation processes, such as identity authentication and local data encryption storage.Access control of the resources is a core issue of system security. Identity authentication is the base of access control. We analyze the authentication mechanism of Windows 2000 and the structure of USB key. We propose a multi-level coherence authentication mechanism based on USB key, and implement it for the cadre management system.Data security is a very important part of system security. We research and implement a hierarchical data protection framework. We discuss and analyze this framework from the perspective of both hardware and software. We also talk about how to design this framework. This framework integrates the platform's integrity mechanism to encrypt the data, which can prevent data from theft and ensure the confidentiality of sensitive data.Security audit is of great significance to the protection of information systems security. We first introduce the requirements of relevant standards to security audit, and then we present its main function and architecture. We also analyze the design and implementation of the information collection module, abnormity analysis module, events storage and browser module. At last, we discuss the safety of security audit sub-system itself.
Keywords/Search Tags:information security, end system, security platform, identity authentication, data protection, security audit
PDF Full Text Request
Related items