Font Size: a A A

Design And Implementation Of The Terminal Information Security System

Posted on:2009-07-21Degree:MasterType:Thesis
Country:ChinaCandidate:Z J FeiFull Text:PDF
GTID:2208360272989614Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Today, information has been widely used in all fields of economic and social life. The information' s attribute is transmit, share and increment, at the same time it ask the transmit is in control, the share is warranted, and the increment is affirmed. So it must be ensured that the information is secure and trusty. But most secure technology put the point on the servers and encrypting the network' s transmit too much and ignore the terminal. The End-User have right permission to access the information on network, and maybe save the useful information on local-storage, therefore, if there have not necessary secure manage, it will open one and one back door on the secure domain even if it has very strict measure on net and servers. That is why we urgently need a safe and reliable system to manage the entire network of terminals, the system automatically install patches, real-time monitoring of terminal, and the problem can be resolved in a timely manner thereby enhance the security of the entire network.Through a network of secret research institute to carry out needs analysis, based on the need to address aspects of the nine, with R & D staff to develop and test the terminal to track information security systems. It will try to manage the terminals in a comprehensive and unitive way by using some existing ripe technology. The target is implement standardization on desktop which will help End-User to reinforce there system, improve the computer' s safety and improve the whole network' s safety. System will be distributed deploy, and be centralized manage, all the config will be set on server and then transmit to the terminal at once. It can cut down a lot of administrator' s daily workload, at the same time, the administrator can effective monitor the terminal' s safe policy, find out and remove the trouble in a very shot time. Win the highest safe performance by the least price. At present, the system has been deployed and achieved.
Keywords/Search Tags:information, network, terminal, safety
PDF Full Text Request
Related items