Font Size: a A A

Study Of E-government Security Solutions

Posted on:2006-05-24Degree:MasterType:Thesis
Country:ChinaCandidate:S M WangFull Text:PDF
GTID:2208360182997660Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
Firstly, this paper analyses the risk that the E-government system faces. There are six threats in the E-government system at present: The first is hacker and computer crime; the second is that virus spreads and destruction; the third is the running off of confidential information and the diving of information spy; the fourth is online terrorist activity and information war; The fifth is how to prevent colluding from both within and without, stop the inside crime; The sixth is the use of the online security products. There are a lot of types security of products on the market now, if the safe products have back doors or add the password, it has a bad influence on the E-government when using.Secondly, this paper analyses the questions existing in the safe scheme of the E-government. Though there are many solutions of safe E-government now, but some only pay attention to the construction of the technological security system, and pay less attention to the construction of the security system of safe operation. For example, there is no emergency response system in some schemes. So once the question appears, will cause very great losses. Some schemes emphasize " safely " excessively and weaken " open ", it causes a lot of government departments have positive function in practical application of E-government, and even have negative function.Basing on all of those analysis, this paper raises a set of safe solutions for the E-government of Jining, analyses the composition of this scheme and main function of every part in detail, and the safe practice used. Finally, this paper explains the realization of this scheme, and remarks functions and advantages of this scheme.This main characteristic of scheme is as follows:1. System model of this scheme: In order to solve the problems in the past, a security system model is provided in this scheme according to the characteristic of the E-government of Jining,which is made up of five parts: Safe service facility of foundation, Safe technical support platform, Respond and resume the mechanism and Application system layer. Among them include the security system of the safe practice and the security system of safe operation.2. The use of the Isolate network floodgate technology: To solve the problem on physical isolation, this solution brings forward the GAP technology to isolate the internal and external network physically and to make information exchanged...
Keywords/Search Tags:GAP, PKI, IDS, VLAN, Emergency Response
PDF Full Text Request
Related items