Font Size: a A A

Combined With Driver Layer Security Control Technology Of The Personal Information Management System

Posted on:2013-05-10Degree:MasterType:Thesis
Country:ChinaCandidate:J HanFull Text:PDF
GTID:2248330374985462Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In the passed ten years, the development mode of C/S in the network informationsystem have changed to B/S and quickly become the indispensable part in our daily life.But the problems of the data security have become a major bottleneck in thedevelopment of network information system. To ensure the data security, the enterprisealways take the security gateways, hardware firewall, anti-virus software and othermeasures to defense against the threats. However, these measures all focus on the datasecurity from the internet, which can’t deal with the situation caused by the networkterminals.The information system based on B/S mode can’t effectively solve the problem ofdata leakage as seen. The first reason is the browser doesn’t have an effective securitymechanism and technical support. Second, the information system itself can only defendagainst security threats on the server side, but it doesn’t have the capabilities of activetracking and monitoring the security threats. So it’s significative to combine theinformation system which based on the B/S model and the security managementtechnologies which based on the bottom control system to establish more effectivesecurity mechanism for the data security.The research topic is based on the consideration of these issues, and is committed toexplore and develop a kind of mechanism which has the ability to monitor and audit thedata security is discussed in this article. This mechanism is different from the mostlynetwork information system which based on C/S structure. First, it is entirely based onthe B/S structure. The client and server complete the information exchange through thebrowser, so it will not affect the running speed of the subscriber main station. Thiscommunication mode is entirely possible and is currently a hot research topic in thefield of information, such as the HTML5which have the local database and other Webapplications. Second, we combine the security control technology of the driver layer tomanage the client’s data. For this reason, we design the security strategy for each user inthe system and realize the monitoring of network user terminal in the networkinformation system according to the security strategy. It can effectively prevent the leakage of data through the monitoring of the reserved documents. And the securitystrategy is very flexible because it can expand and adjust according to the practicalsituation.Finally, we design and complete a system named “Personal ComprehensiveInformation Management System” which based on the safety control technology of thedrive layer. The system have the function of "prevent in advance, tracking audit,investigate afterwards". It can monitor the operation of the users about the storagedevices and file systems based on the security strategy and protect the core technologyand information to prevent the data leakage better in theory.
Keywords/Search Tags:B/S mode, the network user, the data leakage, the driver layer, themonitoring strategy
PDF Full Text Request
Related items