Font Size: a A A

The Reserch Of Scheme For Information System Security Management For Shaangu Group

Posted on:2010-02-02Degree:MasterType:Thesis
Country:ChinaCandidate:M Y RenFull Text:PDF
GTID:2178360272994544Subject:Business Administration
Abstract/Summary:PDF Full Text Request
Shaangu Group implements "two transformations" the strategic target, has realized the leap-forward development, presents the management efficiency and the scale grows the unbalanced phenomenon. In recent years the informationization construction alleviated part of contradictory, but the network security management still was one of "the bottleneck"of the informationization project advancement, its importance and the urgency are day by day prominent.This article from the correlation theories for management informationization , the information security theory method and technology base obtaining, analyzed the Shaangu information security existence question and the reason, finally proposed safeguards strategy of the Shaangu information system safety control from three aspects. Focus on information security management, information technology, management systems and improvement measures are combined to create a relatively safe Shaangu information system security management system.The full text is divided into five parts. The first part has summarized the correlation theories for management informationization , the information security theory method and the technology base. Reviewed the correlation theories for management informationization, the Open Systems Interconnection (OSI) reference model and the network security architecture. Collected and reorganized the information security technology method and the commonly used network security product material. Above content all is the paper research theory basis. The second part emphatically has carried on the analysis to the Shaangu information system present situation and the information security existence question. Mainly has analyzed the reason from three aspects which the Shaangu informationization construction condition, the information system safety control existence question, as well as the information system safety control question produces reason. Provides the basis for the technology project design and the control system design. The third part has researched and designed the Shaangu information system safety technology programs. Used the case methodology to carry on the analysis to the information system security requirements. Designed the information security technology plan from the network domain division, Internet firewall deployment, backup management, network anti-virus software, desktop computer management and application system deployment and so on. Planned the technical program action plan,elaborated the implementation effect. The fourth part has studied the Shaangu information system safety control system. First of all,needs to establish the information system safety control organization,and secondly,to set up information system safety control system,the final,to formulate measure to deal with information insecurity. Drawn up the information system safety control organization and the member responsibility, proposed construction main point of the information system safety control system,in order to achieve the comprehensive jamming information system security loophole the goal. The fifth part has designed the Shaangu information system safety control plan implementation safeguards. Manifests in following four aspects: Strengthens staff information security technology training, the strengthening information security assessment and excitation, and formulating measures to deal with unexpected events,and relying on the government's technical guidance and financial support, in order to carry out the system safety management plan effectively. Through the research, this article has the guiding role to the Shaangu information system safety control,and has reference to the manufacturing enterprise information system security management.
Keywords/Search Tags:manufacture enterprise, information security, control system, plan
PDF Full Text Request
Related items