Font Size: a A A

The Design Of Information Security System In Group Corporation

Posted on:2008-01-01Degree:MasterType:Thesis
Country:ChinaCandidate:H L ChenFull Text:PDF
GTID:2178360242460579Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The rapid development of information technology has driven information technology being widely used in tobacco trades. It plays an important role in promoting corporation development. But at the same time, as the complexity of network environment, the levity and frangibility of information system, the issue of information security is emerging gradually. With the rapid advance of corporation recombination in tobacco trades, how to construct the information security system in group corporation is becoming a pressing necessity.This thesis discusses how to build an all-around and dynamic information security system after group corporation recombination taking an example of a provincial tobacco corporation. The thesis includes contents as follows:(1) Expatiating the attack means and defend technology of corporation network security, analyzing the advantages and disadvantages of some different information security structure model.(2) Analyzing the security risks and security needs of information system in the provincial tobacco corporation. These securities include physical security, network security, system layer security, application layer security and management security.(3) Based on Information Assurance Technical Framework(IATF),this thesis designs the information security structure model of the provincial tobacco corporation. At last, this thesis gives out a blue print of information security system. Based on information security strategy, this thesis builds three subsystem including information security managing system, information security technical system and information security operational system .The three subsystem constructs an all-around and dynamic information security system.
Keywords/Search Tags:Information security, Security system, Security management, Security operations
PDF Full Text Request
Related items