Font Size: a A A

Research And Case Analyze On The Method Of Partition Of Business Security Domain

Posted on:2009-07-06Degree:MasterType:Thesis
Country:ChinaCandidate:J P WuFull Text:PDF
GTID:2178360272474531Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the gradual development of our national informationalization, information systems have the more and more important effect on people's working and life. so the security of the information systems and the information directly affect the people's working and life, even the society's sustainable and stable development. So, how to make information system on the safe side is the most important point in the task of information security. Hierarchical protection is the fundamental task of information security. It is one of the important means to improve the construction of guarantee system of information security. The aim of hierarchical protection of information security is to improve our national informationalization, to favor the construction of guarantee system, and to enhance the defending ability of information system. However, the research of hierarchical protection in our country is a new field. So, there is little research on the structure of the security domain and method of partition of security domain. In this circumstance, this paper want to apply to the research on the structure of the security domain and method of partition of security domain. Hope that this paper can favor the development of the task of hierarchical protection of information security in our country.This paper firstly contrast security domain with trusted domain, describe the microcosmic conception. In the progress of microcosmic investigation of security domain, describe the microstructure and the interactional behavior and from the behavior of the security point of view, describe the relationship behavior between elements and security rule. and then begin with ploting security domain, bring forward the macro conception of security domain. In the security domain of the macro-study. describe the macrostructure and interactional behavior of security domain. and then combined with the microcosmic conception and the macrocosmic conception of the security domain, illustrate the theory and the method of ploting security domain based functional similarity. and then from the operation of the information systems of view, illustrate the theory and the method of ploting security domain based business continuity.Thereafter, this paper showed a case about the partition of the security domain of an e-government system.Using this case, this paper validated the correctness of the method of ploting security domain by which functional similarity and business continuity. At the same time, using this case, this paper validated the validity of the method of the partition of security domain by the functional similarity and business continuity. In the end, aiming at the three important holes in the above case, this paper had some network security experiments to simulate the scene that these holes had been used by hackers. Through these experiments, the paper validated the reality of the existence of these holes in the above case, and then, using these experiments, the paper illuminated the need of the partition of security domain and the related security measures. At the same time, according to the result of these experiments, the paper also validated the rationality of the security requirements of related subsystems.
Keywords/Search Tags:Hierarchical Protection, Security Domain, functional similarity, business continuity, fuzzy hierarchy process analysis
PDF Full Text Request
Related items