Font Size: a A A

Multidimensional Build Secure And Reliable Web Platform

Posted on:2011-05-28Degree:MasterType:Thesis
Country:ChinaCandidate:Y Q XiaFull Text:PDF
GTID:2178360305954773Subject:Software engineering
Abstract/Summary:PDF Full Text Request
For the rise of the information age, along with the rapid development of computer technology, communication technology has become one of the most important modern high-tech development industry. In this information-driven society, all sectors of society cannot be lack of Internet applications, and industries are closely linked by Internet. Especially in the military, political, economic, cultural and other high-tech industries, networks have become an indispensable means in communication.Such as bank funds transfer, stock trading, business and trade, all of those industries have a same trend of being towards the direction of electronic and information technology. With this development in the computer networks, people's lives become more diverse, and they can enjoy a more colorful life. Online dating, online games, online shopping and other entertainment are entering people's lives in information age; Distance education, teleconferences, e-commerce, the rise of a variety of business and public activities, because of the internet, are bringing up a new potential industry, so also the increasing reliance on computer networks.Sharing of the network resource and information technology promoted the development of human society. It is precisely thanks to this development, the transmission and procession of lots of sensitive information and data are working in an open, unsafe environment. So far, network hacking, system failures, viruses, Trojans and other unsafe procedures are becoming new serious threats to the people's lives in information age, even to the country's political, economic, security status.Network security is facing unprecedented challenges. Therefore, various social fields, institutions and even countries are facing the threats brought up by network security. More and more people have recognized the importance of network security. More and more countries and institutions enhance the network security requirements. The impact of network security has become one of the most serious social problems.Network security involves many subjects, it is an IT technology, based on communication science, cryptography, mathematics and computer science theory, depend on the Internet hardware and software environment. China's Internet technology has ten-years history, from the original immature to today's commercial technology network, the development is already sizable. The rapid development of computer network security has reached the international advanced level. Network security is more extensive. Roughly divided into two directions: software direction and hardware direction.Hardware direction is the physical security, such as network environment, the quality of information transmission media, equipment radiation. Software direction, mainly refers to pure information technology. This project focuses on software direction, through the realization of today's most popular e-commerce business, and the use of a variety of network security technology to build a secure and reliable information platform model.Selecting the e-commerce model for the realization of network security is mainly based on the characteristics of e-business. First of all, e-commerce information platform is a representative in the information age. In the information age, people's activity and lives are moving towards the electronic and information technology direction.Through the network, People cross-national and regional have meetings, so that to improve efficiency; Making friends in a foreign country; Finding recipes or life knowledge and etc.Most typical, in the next life, shopping should be done via the Internet, even all the life business can be caught out through Web services. Online Shopping, in the information age people's lives, has become a fashion needs. Its success is the success of the representative of the information.Second, the information in e-commerce platform is extremely important and sensitive, and needs a safe business environment. In the transaction process online, we need to submit our basic information, including name, age, identity, home address, etc. After the completion of purchase, need to submit bank account numbers, passwords and other important information. The final transfer is to put large sums of money, by a few keys, to another account.For users, all above information submitted is important. Once that information leaked, maybe endanger the security of the individual. This requires a safe and confidential e-commerce platform mechanism, protecting user's private information from stealing and attacking by unauthorized users. Finally, the e-commerce platform has most of the value. that is because it is inextricably linked with the manufacturing, commerce, logistics and other various industries. It involves a lot of problems which are worth studying. E-business is a product of the information age and it can implement some things. E-business also are inextricably linked with many industries,. many inexpensive goods are come from the manufacturing sector, online transactions for goods delivery needs effective logistics support, online payment required providing safely and reliable electronic banking online payment service. How to manage and coordinate the relationship between the interests of all parties is the focus of e-business information platform to consider, so here I choose to use an instance of e-commerce platform to achieve the proposed security model.In order to interpret how to build a comprehensive security model for secure and reliable network, the example relates to the field of information technology extensively. Pop through the establishment of B / S's Web applications built with architecture for the client browser, server, back-end database, and application state, these four points to start, the weak links for each module, and the usual invasion of illegal users means to implement effective protection measures. In the client browser, for the information submitted by a client, we use authentication technology to identify scripts integrity, validity, correctness verification, In server-side applications, transactions need to undergo a rigorous business process logic verification, for to do business process no loophole, which stands the test of a variety of malicious actions. And we always remember that any information from the client are not reliable principles we verified the client information two times. Control site users and administrators permissions, for specific users, we open specific permissions, as a result .the site runs fine. For the operation of back-end database, we access through the middle layer of ADO.NET. In the operation, we use a unified memory process, while the data in the database is encrypted. Configured server operating environment, install a firewall, configure the SSL / IPSec security protocol.Web security protection system model is order to resolve various Web application security issues, especially for e-commerce, government and other industries. From large information center to small Internet cafe management, information security can be protection system model, in combination with the actual circumstances of their own to establish a secure and reliable Web applications, so it is an open model.Also, we should care the security of the site on major maintenance, but also attention to the nature of business websites, e-commerce site's main purpose is to make money. Such as product browsing, information retrieval, shopping cart, and management modules to design, easy to operate. Affinity for the establishment of a commercial site, all things must be from a user perspective to the vital interests of the users think of the site the most reasonable, most human design. Appearance of the site to maintain a high level as possible perfect layout, to fashion the theme of the information age, Web site reflect the simple and practical, without losing the aesthetic features, allowing users to shop online there is a time to enjoy the beautiful scenery feeling.Test results that the Web security model which we set up is still not perfect, although can prevent some of the typical Web attack, but some technical aspects still need to improve. Hope it designed as a model for the times, with the advancement of information technology, technology development, constantly improve their conduct and improve, grow and adapt to the needs of information age, people's lives, to be a real reliable security.
Keywords/Search Tags:Network security, information, data encryption, server configuration, e-commerce
PDF Full Text Request
Related items