Font Size: a A A

Study On The Network Information Security Management Of Jiangxi Mobile

Posted on:2012-05-20Degree:MasterType:Thesis
Country:ChinaCandidate:C FuFull Text:PDF
GTID:2218330368495131Subject:Business Administration
Abstract/Summary:PDF Full Text Request
Along with the development of networking industry by leaps and bounds, Jiangxi mobile in nets subscribers exceeded 20 million, Network scale expanding gradually and Rapid growth information. Jiangxi mobile networking security research management problem, make corresponding process specifications, management method, management and maintenance method which Is the current management work in jiangxi province the important content of the move. n-depth study jiangxi mobile information security management mode, to ensure the stable operation of the jiangxi communication network, enterprise stable and orderly development has the important practical significance.This article will research Jiangxi mobile information security system into a layered structure design, including a complete system from macroscopical to microcosmic, principle of concrete measures from aspects of the direction to the content. This system based on the international standard, reference industry of jiangxi ripe experience, and combining the actual situation, design move the jiangxi mobile network and information security management system, the basic principles and detail requirement.The system contains Organization and personnel, network and information asset management, physics and environmental safety, communications and operation management security, access control, development and maintenance, security incident response and business continuity, safety audit, means application monitoring information security management. Based on Jiangxi mobile networking are analyzed, and the analysis of the present situation and existing problems, Finally proposed Jiangxi mobile networking information security management system.
Keywords/Search Tags:Networking Information Security, telecommunications business, Security Management
PDF Full Text Request
Related items