| In this information era, computers and web have been penetrated in every aspect of people's life and production. Each organization relies on information system to improve business process and raise work efficiency. But any technology is a double-edged sword. While information technology contributes to the conveniences, it brings about potential security problems as well. In recent years, the informatization process has been implemented both in depth and in width, but the security problems have not got corresponding attention. The seriousness of intranet security accidents ranges from loss of business confidential to threats of national security, which underlies the importance of security concerns.Intranet security accidents can be roughly categorized as active leaking and passive leaking, or internal leaking and external leaking, according to the leaking source. Intranet security seeks solution for the two types respectively. For active leaking, before-hand control and after-hand track are brought forward. The former implies user operation control, including login control, web control, file control, peripheral control, etc; the latter means audit of user behavior. For passive leaking, ensuring the safety of resources is needed, which is completed by data encryption and access authorization.Aiming at these problems, this paper developed a set of terminal security software, proposing a complete solution. It consists of host security monitor, disk encryption and other security software. Various functional modules in host monitor fulfill terminal control tasks. For audit, log module collects and reports all kinds of terminal behaviors. Disk transparent encryption and electronic key authorization ensure data security and access control. Besides, due to the frequent use of encryption operation in security software, this paper designed a GPU-based AES encryption algorithm since system performance is effected by encryption and decryption speed. |