Font Size: a A A

Design And Implementation Of The Provincial Tax System Centralized Model Of Network Security Protection System

Posted on:2009-11-29Degree:MasterType:Thesis
Country:ChinaCandidate:W FengFull Text:PDF
GTID:2208360302977193Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the further development of revenue industrial information level, it is a trend of revenue informationed to deal with the revenue business at the provincial level. after realizing the provincial centralization of revenue data, the revenue business data of each provincial city should be treated in provincial office . However, The provincial offices do not only accept the primary dispersive data but also the primary risks at the same time. this paper gives the answers about how to solve the network risks and protect the network security from the time aspect on the condition of lost the provincial revenue focus. And realize the design and implementation of network security protected system.Firstly, making analysis of network security risk and need from actuality, ranking and assessing the network security domain and protection degree. From the perspective of information security protected degree, Ranking the provincial network of domain and identifying the security domain, ranking the security level of revenue business private network security domain.Secondly, from the border protected, transmission security, remote access security, safety protection of network security system and so on, design the subsystem of firewall, intrusion detection, vulnerability scanning, anti-virus. Make an explaining about the security sub-systems in the protection and setting goals, targets and strategies for prevention, management requirements and performance indicators. A strong design at the database and operating system level was done.Finally, According to the network security equipment deployed topology which from primary design thoughts, design the private key management system of network equipment. To private Key management system, make the two-grade system of structural design of the provincial and city private key system-level logic and structural system, use centralized control and decentralized management style. Make an explanation of private Key logic system, hierarchy structure, system performance and system deployment.
Keywords/Search Tags:taxation, centralized data, network protection
PDF Full Text Request
Related items