Font Size: a A A

Research On Security Of Science And Research MIS Based On Hybrid Structure

Posted on:2007-05-16Degree:MasterType:Thesis
Country:ChinaCandidate:Y YiFull Text:PDF
GTID:2178360242961710Subject:Systems Engineering
Abstract/Summary:PDF Full Text Request
With the development of computer information technology, especially the gradual maturity in the field of network technology, the application of the information system is becoming more and more important. It has been widely used in fields of industry, agriculture, business and so on. It has played an important role in modern society. At the same time, a common concerned problem about information security arose. The information system is easily broken by kinds of attacks from the network, especially the WWW Servers in the Browser/Server structure which faced users directly. This kind of information system is much easier broken by illegal user. How to ensure the security of the information system has become a very important problem. Researches on security of computer Management Information System lead to great, direct and realistic significance.The development of computer information system security in home and abroad is introduced in this thesis. The methods and sources of threat to computer information system security are analysed, system structure and related technology of MIS security is introduced. Based on hybrid structure of science and research MIS, the system mode, main system module fuction, network system, database system, programming technology are introduced .Based on such technologies, the security of operating system, database system and network communication has been analysed. Then the authorization management in Client/Server mode, authentication and authorization, exception handling, input checking, the prevention of SQL injection attacks, data encryption in Brower/Server mode have been reserched, and the corresponding, solutions of programming have been provided. The conclusions are given at the end of the thesis.
Keywords/Search Tags:Information System Security, Database Security, Authentication, Encryption, Security Socket Layer
PDF Full Text Request
Related items