Font Size: a A A

Business Support Design And Application Of The System Security Model

Posted on:2010-03-04Degree:MasterType:Thesis
Country:ChinaCandidate:X H ZhangFull Text:PDF
GTID:2208360275491756Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
MBOSS(Management Business Operation Supporting System) is the core systems of telecom Business Operation Supporting System,the basis of telecom custom service.With the popularity of computer technology,hackers technology,Computer Viruses,a large number factors happened increasly high frequency.MBOSS hosting operates slowly when these unsafe factors appears in the internal telecommunications network,even lead to system downtime,cause large impaction in telecom business.Because the host and the database is the main embodiment in MBOSS types of data and information system.With the MBOSS System integrate continuously,mainframe, database system becomes increasingly serious.Security incidents of MBOSS system have occurred on many occasions, including non-operation of external databases,external hacking,virus infections,such as security incidents,and violations of internal personnel to operate,resulting in the loss of billing data in recent years.These security incidents,making the loss of telecommunications revenue,loss of credibility.At the same time,as the management needs of a growing number of business systems into the billing system,an increasing number of managers to the accounting system to join the day-to-day management,then the existence of the original management system deficiencies shows up more.In the view of this essay,the design of this system security MBOSS the idea of the protection model,and to build the core of telecommunications billing systems MBOSS security model for the main study,from multiple perspectives MBOSS system for the protection of the main text completed work areas as following:We analysed MBOSS technology and characteristic detailedly,analyesd the safe hidden trouble that exists in MBOSS systemWe have suggested that one kind of MBOSS system Security Protection model we use several module such as single sign-on,identify manager,unified audit to achieve a high level from the safety of the system for the protection of MBOSS system.Security protection model will be used in a telecommunications company MBOSS system,through the use of RSA two-factor authentication,TIM identity management,Arcsight security audit platform industry-leading security technology for the design and deployment of telecommunications companies to achieve a certain safety MBOSS system.Security protection model in practical application has been successful,to achieve good results,the security model to prove the effectiveness and feasibility of that two-factor authentication,unified auditing MBOSS technology can enhance system security and to simplify operation and maintenance the use of login MBOSS system.
Keywords/Search Tags:security protecting model, identification management, single-point sign-on, authentication&authorization, uniform audit
PDF Full Text Request
Related items