Font Size: a A A

Based On The Yellow River Conservancy Commission E-government Network Boundary Protection System Design And Application

Posted on:2011-01-22Degree:MasterType:Thesis
Country:ChinaCandidate:L HuangFull Text:PDF
GTID:2208360308975745Subject:Software engineering
Abstract/Summary:PDF Full Text Request
E-government is the use of information technology and network technology to achieve the Government's electronic public administration and social service functions of the new computer application technology, it is the government's administrative reform and implementation of the transformation of government functions important technical foundation. However, the e-government to the government and society in the high-efficiency, it also brings the threat and risk, how to eliminate the e-government construction and development of a crisis of confidence in the safety and to protect the government's management and service functions of the effective realization and become electronic Chief universal letter to be resolved.Government agencies more and more information activities are carried out in the network through the Internet and local area networks to handle all the business, from the stand-alone network, the computer has almost ceased to exist. E-government is highly dependent on the network, so that the network is becoming an information security risks. On computer networks and communication networks for information attacks and physical attacks, has become a real possibility. Computer local area networks, the Internet and various communication network the faster the speed of development, the higher the degree of social information, communication, computer and information network security the more important, and network information security problem is becoming increasingly apparent and urgent.This paper describes the current state of development of e-government and its handling of information security related issues in conjunction with Ministry of Water Resources of the Yellow River Conservancy Commission e-government to make the actual situation within the network, requirement analysis, proposed design and feature implementation.
Keywords/Search Tags:e-government, network security, information security, border protection
PDF Full Text Request
Related items