Font Size: a A A

Design And Implementation Of Safe And Efficient OA System

Posted on:2012-03-18Degree:MasterType:Thesis
Country:ChinaCandidate:N LiFull Text:PDF
GTID:2218330338963381Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology in the 1990s, especially the popularization of internet technology, the development of the modern electronic office information has become one of the most important areas. As an important component of e-government, OA (Office Automation, OA) system requires a high level of security. With the increasing application of OA systems, increasing data storage, as well as more integrated business management, its security attracts more attention. Therefore, office automation system security has become a very important and urgent task.This paper discussed OA system security design and implementation process of some key techniques according to security problems of Shandong Mobile OA system, combined with its own characteristics. We first applied PKI/CA digital certificate-based security technology to the OA system, then high reliability security isolation technology for data exchange of secure transmission to the OA system, and finally the advanced firewall and intrusion detection technology for perimeter protection of the OA system, multi-directionally ensuring the security of the system. The main work is as follows:1. Comprehensive prevention and control system securityAccording to security problems of Shandong Mobile OA system, this paper proposes three-layer prevention and control security system for the normal operation of OA, namely, the network authentication module, border protection and secure isolation modules.2. Highly reliable authentication technologyThe PKI/CA technology is applied in the OA system of Shandong Mobile Company, which helps to uniformly complete the authentication process and user identity identification.3. Efficient border protection technology This paper used the design of the firewall filtering policy to ensure the legitimacy of data flow inside and outside the network and used the design of intrusion detection system model to ensure that the initiative for intrusion prevention.4. To ensure the safety of isolation and transmission of data of the OA systemIn the current OA system of Shandong Mobile Company, there are a lot of confidential information; there exists the requirement for preventing the disclosure of confidential information. This paper adopts high-security isolation exchange of information security technology to achieve the secure data transmission and switching inside and outside of the network of the provincial mobile company.Finally, a summary and prospect of the OA system are also made in the paper.
Keywords/Search Tags:OA, PKI/CA, Security Isolation, Firewall, Intrusion Detection
PDF Full Text Request
Related items