Font Size: a A A

Establish A Secure Postal Enterprise Network System

Posted on:2009-08-09Degree:MasterType:Thesis
Country:ChinaCandidate:X T PengFull Text:PDF
GTID:2208360245961485Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Along with the rapid development of informationization in the postal system, with strongly supporting of information technology ,postal corporations accomplished the rebuilt of the traditional informational process in post-operation. The open network information system of Sichuan post has already afforded more than 90% operational types. Production, management and office business work depend on network more and more, and acquire better and better security for the network, the guarantee of the information asset's became especially important.Thesis startes with the essence of the information-security, describ its objective, characteristic and significance. Comparing the security-programming frame of information system and the classical model of network security, analyzed the"entire network security"issue.Proceed with the status of postal corporations'information network, completely analyze the faced risks and hidden troubles, expatiate on the security requirement of postal corporation network's physical layer, network layer, system layer, operation layer and applications layer in detail.Based on deep analysis the risk-relations of the information network, adopting the evaluating principles, operating processes and evaluating methods from (GB/T20984-2007), made a deep self-evaluation of risk for postal ATM trading system.Based on the fact of postal information network, we found a way to construct the dynamic and multidimensional security system of postal network, by taking the security policy as the core, the security technic as the means, the security management as the guarantee, the security training as the auxiliary. From the perspective of security technology, we found a way to construct security system of postal corporations'network. Taking the postal kernel trading system as an example, particularly expatiated the realizing process of some security-technical means.
Keywords/Search Tags:Information Security, Security Requirement, Risk Evaluation, Postal Security Network System, Postal Security Techic System
PDF Full Text Request
Related items