Font Size: a A A

The Research & Realization Of Hunan Province National Tax Bureau Network & Information Security System

Posted on:2007-03-02Degree:MasterType:Thesis
Country:ChinaCandidate:L HeFull Text:PDF
GTID:2178360215985387Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the constantly development of the telematics, the security of the computer network is more and more important as a platform of the information interchange. The State Administration of Taxation is one of the vital functional departments of a government. It is conceivable that how important its data information is. In the recent years, the heads of the State Administration of Taxation of Hunan province are aware that it is an improtant premise to set up a series of completed defense system of the network security to guarantee computerized taxes work of the whole province.In this study, the basic needs of the IRS network security have been analyzed. On the basis of the current network structure and security system of Hunan Province and the combination of the general characteristics of taxation and the current network information security technology, a security thesis has been put forward. In this thesis, the comprehensive audit log is regarded as the core of network security. A series of measures of security monitoring have been taken to guard against the damage to computer. The establishment of the network security monitoring system provides a highly effective protection of the normal operation of the IRS electronic tax systems of Hunan province.The first half of this study mainly deals with the current network safety situation. Then the network attacking and systematic potential safety hazard and traditional network safety protection technology have been discussed and compared, thus the urgent demand of the network security audit and controlling has been educed systematically. In the latter, through the design and implement of an instance system, general model of security auditing and control technology of network has been pointed out respectively. The realization of some functional models used in this system has also been stated in this part.
Keywords/Search Tags:Network Security, Log Auditing, Monitoring, Security Auditing
PDF Full Text Request
Related items