Font Size: a A A

Design, Operation And Maintenance Of Itil-based Enterprise Security Management System

Posted on:2011-05-02Degree:MasterType:Thesis
Country:ChinaCandidate:J CaiFull Text:PDF
GTID:2208360305997061Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development and widespread application of information technology (IT), the technical demands to operation and maintenance of the IT system given rise to by the users become more and more high. The traditional and manual methods are hard to meet the user's demands to operation and maintenance of the IT system increasingly. Modern computer network and IT system have been set up at an institute, and now the routine administration of this institute is largely depended on the IT system. For strict requirements to the IT system security, diverse security software has been loaded on the IT system at this institute. The IT system, however, are still operated and maintained in manual at this institute. For example, the work orders are still in paper forms, which therefore results in that data are scattered and can not be itemized in real time. Subsequently, it is hard to assure the accuracy of data at this institute. In addition, the administrative technician of the IT system at this institute, as the fire fighters, are forced to be always and passively busy in past remedies, duo to manual operation and maintenance of the IT system. Thus it is necessary to develop a secure operation and maintenance system for promoting efficiency of IT service, sharing data from different systems, and guarding the security of the network or IT system.The status quo of the network and the function demands of the ITIL at this institute are systematically analyzed in this thesis firstly, and a new secure framework is then designed and developed for the operation and maintenance of the IT system. This secure framework is composed of ITIL core configuration management database (CMBD), subsystem-related event management, problem management, configuration management and change management. In particular, the client access, client security policy modification, client security alarm processes and their relationship with the configuration management database are discussed in detail in this thesis, as well the system security and extensibility.
Keywords/Search Tags:ITIL, operation and maintenance system, management process, CMDB, security
PDF Full Text Request
Related items