Font Size: a A A

Construction Of Secure E-Government With Strategy Analysis Based On Game Theory

Posted on:2009-06-09Degree:MasterType:Thesis
Country:ChinaCandidate:X WangFull Text:PDF
GTID:2178360242477097Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Each technological revolution would inevitably lead to political and governance changes historically. Nowadays, with the global growth of information and economic, an efficient and innovative management model of government is necessarily requested as the inevitable result of social development. E-government has become the attention and the goal by global governments.E-government in China also gains great attentions and becomes the center of national information construction. Information and networking security is the basic qualification leading to a success of e-government, as its special requirement of security.E-government system is a great information project, which contains technical, managerial, organizational and social elements, and an overall planning is required based on system engineering and safety engineering.This paper analyses from the global e-government development to national e-government security features in China with different level analysis on system security theories and models of e-government, in order to provide a certain contribution to our country's secure e-government construction.Firstly, we focus on a conceptual framework of a secure e-government, as well as related system-level's analysis. Formal description is given on the basic status and importance of the security technology and security strategy of e-government system. We involve a variety of synthetic security technologies, such as physical security, network security, application system security, data security and security management. Detail applications involve firewall, intrusion detection, virtual private network, network anti-virus, virtual exchange network, and password technology, etc.Secondly, by choosing a number of species, we establish an intrusion detection model based on honeypot and describe it by the Game Theory and the principle of decision-making with related experimental results.Thirdly, we face the perspectives of e-government applications and release corresponding theory and emergency contingency plans with analysis and discussion.Finally, we focus on two samples of different types of the secure e-government and show the future of its construction.How to protect the security of e-government is an important topic facing the future information workers and leaders. Of course the construction of secure e-government system will involve various aspects and the overall protection of it is not a simple addition of devices but an effective usage and integrated management. The increased security of e-government will laterly help raise the level of its operations, and ultimately the government services with high security.
Keywords/Search Tags:e-Government, Information Security, Intrusion Detection, Game Theory, Emergency Contingency Plan
PDF Full Text Request
Related items