Font Size: a A A

Guard Against Internal Information Leaks Application Technology Research

Posted on:2010-08-14Degree:MasterType:Thesis
Country:ChinaCandidate:T LiFull Text:PDF
GTID:2208360308466439Subject:Software engineering
Abstract/Summary:PDF Full Text Request
At present, the internal aspects of the information leakage problem is much information to plague much of the construction of the more developed modern high-tech enterprises. How to prevent from internal staff and external personnel, whether intentional or not caused by the operation of the enterprise involving sensitive information and even data are state secrets leak out, has become a modern enterprise information security management in the focus. Efficiency in order to prevent leakage of confidential information of the problem happened, we need the system to study these questions, then take a reliable information management measures.In order to protect the confidentiality of information will not be intentional or accidental release, a kind of known as "information leakage defense" also known as "data leakage defense" thus came into being a technology. Leakage of information defense, through a certain degree of technical or management tools to prevent enterprises from the designated data or information assets to breach security strategy provides the form of an outflow from the enterprise application technology.In this paper, our company is facing a number of practical problems, there is targeted to study the leakage of information related the status of applied technology;Summarizes the information disclosure of the internal law of the phenomenon,focuses on the main way to leak information and prevention strategies; Explored in depth as firewalls, data encryption and authentication and so on to prevent internal information leaked these key technologies, and attempts to give a variety of suitable enterprise solutions for their needs.
Keywords/Search Tags:Yankuang Cathay Coal Chemicals CO.,LTD, Internal information leakage, Prevention strategy, Firewalls, Data encryption, Authentication, Application technology, Solutions
PDF Full Text Request
Related items