Font Size: a A A

Research And Implementation Of Inspection For Internet And Removable Storage Media Violation On Secret Computer

Posted on:2010-12-05Degree:MasterType:Thesis
Country:ChinaCandidate:B H LuFull Text:PDF
GTID:2178360275973510Subject:Information security
Abstract/Summary:PDF Full Text Request
The continuous development of networking and information technology in modern society has brought tremendous challenge to the security and confidential work of secret computer and classified information system,and also set higher requirements for the information security work of our country.National security and interests is closely related to state secrets,and secret computer is usually used to storage and process confidential documents and messages.The confidential department of our country has proposed strict requirements for the usage of secret computer and set relevant standard and prescribe to enhance the management of secret computer used in every national sector,but because some department has leak in management of secret people or confidential technology,the loss of classified information from secret computer maybe take place some time.In this case we must strengthen the supervision of classified staff,but also attach importance to the improvement of cryptographic technologies.According to the statistics of our state's security work,most cases of losing classified information are related to internet and removable storage media violation,therefore the research of inspection for internet and removable storage media violation and developing relevant tools for the examination of violation events is of great significance.The technology of inspecting internet and removable storage media violation and the method of developing relevant tools is introduced in this thesis.If somebody has visited website using Microsoft internet explorer,a lot of traces including IE history, cookies files and cache files would be found in the secret computer be used.The usage of USB storage device on secret computer would also remain some information in computer system.Since this thesis present the technology for inspecting internet and removable storage device violation and what time that event is happened and the method of developing relevant inspection tools,it provides great support for the inspection of confidential work violation in our country.
Keywords/Search Tags:inspection of confidential work, internet violation, USB storage device violation
PDF Full Text Request
Related items