Font Size: a A A

Design And Implementation Of 4A Security Management System For Business Support System Of Qinghai Mobile

Posted on:2012-01-16Degree:MasterType:Thesis
Country:ChinaCandidate:S Y ZhangFull Text:PDF
GTID:2218330338453138Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Recently, along with rapid development of network and telecommunication technology, as growing case number of information hacking and leakage of mobile client profiles and phone call records, the network security has raised a lot of concern to us. Meanwhile the traditional security solution which consists of firewall and attack monitoring gradually cannot maintain the protection and management tasks of whole service supporting network, for whose devices are being grown and modified all the time. Therefore, China Mobile demands to set up the 4A management system project to fix defects of current service supporting network.This article is aimed to design the 4A security management system according to China Mobile Group HQ's 4A security system architecture. The whole system is based on Qinghai Mobile Supporting Service 4A Security Management System project, starting from researching relevant technologies of 4A security management system, integrated real-time requirements of individual enterprises and the special features of service supporting networks. The basic architecture and feature-level module implementation has been finalized in this article as well as adjustments corresponding to system integration test results with real-time application environment.The overall goals of Qinghai Mobile Service Supporting Network 4A Security Management System are:1. meet the needs of 4A security management of all system and platform level resources in Qinghai Mobile's every service supporting system, including application systems, host operation systems, database systems, network devices and security devices.2. Mainly focused on resolving access control management of sensitive data of service supporting system amongst department of system management and maintenance, department of marketing, vendors of service supporting system development, agent and maintenance provider. All data access operations related to sensitive data require authorization and operation audit to ensure individual responsibility of read and modify operation to sensitive data.According to China Mobile Service Supporting Network 4A Security Technology Specification and China Mobile Qinghai Inc. Support Network Data Security Management Implementation Details, the 4A security management system construction performs mostly at Unified access, centralized management of accounts and passwords, authorization management, log management and auditing requirements implementation.
Keywords/Search Tags:Service Supporting Network, 4A, Security Management, Certification, authorization, audit
PDF Full Text Request
Related items