Font Size: a A A

Business Office Data Security Protection System Design Studies

Posted on:2012-12-03Degree:MasterType:Thesis
Country:ChinaCandidate:F ZhaoFull Text:PDF
GTID:2218330338969947Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the accelerated pace of information technology, data security is increasingly prominent, particularly in business office. With the increasing demands of data security, in order to meet different needs, data security protection technology has become increasingly diverse. Data is an important part of corporate assets, more and more enterprises begin to focus on data security and invest in data security. In the corporate data security protection office, there is no better solution. Currently, many enterprises are mainly limit their employees carry out storage device to protect corporate information assets secure. However, this protection of information assets tend to reduce the cost of efficiency, resulting in low efficiency of the normal exchange of information, while it is not easy to make full use of advances in information technology to improve employee productivity for enterprises.In addition, the emergence of new technologies and products are also increasingly available on the impact of enterprise data protection. Such as handheld terminals (mobile phones) are becoming more intelligent, its processing power and storage capacity is increase. The existing conservation programs are difficult to prevent mobile phones becoming a vehicle to carry enterprise information assets. The hand-held ends have personal items property and impact the existing data protection methods. So, with the increase of information assets value and the increase in office demand the increasing variety of information carrier become smaller. It has shown that the data security market continues to expand, demand is increasingly clear, and put forward higher requirements for security technology. Corporate office data need to protection from user to enterprise and across the full range of Office geographical restrictions. However, existing technologies and systems mainly to provide a single function in their respective fields, and can not meet the demand for comprehensive data security. On the technical side, the lack of access from the disk, key management and updates to the document management integration, integrated technology category. According to the needs of integration to improve and innovate part of technology, it create total technology solutions. In the aspect of product systems, lack of support for the convenience of the office staff. The study of this project will contribute to the formation of integrated technology solutions, and to promote the development of comprehensive data security system.The main tasks of this paper: design a corporate data security office system, which includes the classification of document management, file access control, key management and so on. We mainly through file encryption and rights of employees assigned to implement the file access control, using transparent paper encryption and decryption to avoid the impact on employees. Finally, it provides innovative key management model to meet the practical needs of enterprise file protection.
Keywords/Search Tags:Data security, Office, Access control, Key management, Document classification management
PDF Full Text Request
Related items