Font Size: a A A

Computer Information System Security System Modeling And Implementation

Posted on:2004-11-10Degree:MasterType:Thesis
Country:ChinaCandidate:P JiangFull Text:PDF
GTID:2208360092998903Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the scale of computer information system (CIS) expanding and the security technology developing, a systematic and normalized computer information system security architecture (CISSA) is needed to strengthen the design, development, implementation, evaluation and management of CISSA. In order to normalize the build of CISSA, and construct the security defense architecture in our country, a uniform CISSA model and the implementary standard must be built.Aim at the disadvantages of the popular CISSA models and implementary standards, we focus our work and research on the key technology of the layered, graded and dynamic defense and the cooperative communication platform. The following contents are discussed in this thesis.1) Based on the study of popular security architecture models, a Defense-in-Dynamic & Depth CISSA model is presented to guide the build of CISSA.2) Based on the study and analysis of many security architecture standards, the Security Region and the Defense Layer are introduced, the Information Category, the Threatening Level and the Security Protection Level (SPL) are put forward, the methods and requires of the Security Analysis are discussed in this paper.3) Based on the security architecture model and the security analysis, the graded requires of the security management and the security technology is presented, so the security design of the CISSA and the choice of security produces can be done conveniently.4) A cooperative communication platform is designed and implemented to ensure the dynamic and cooperative ability of above CISSA model.The Defense-in-Dynamic & Depth CISSA model and the cooperative communication platform which are put forward in this paper have been applied into "the Network Intrusion Detection, the Warning and the Security Management Technology" (863 Program) , which lays the foundations for the successful examination of 863 experts. At the same time, the methods and requires of the security analysis, the security design and the security evaluation have been adopted in the Design Specification for Computer Information System Security (DB43/T171-2003) by Hunan Quality and Technology Supervise Bureau.
Keywords/Search Tags:Computer Information System (CIS), Security Architecture, Defense-in-Dynamic & Depth, Security Analysis, Security Design, Cooperative Communications
PDF Full Text Request
Related items