Font Size: a A A

The Design And Implementation Of Windows Security Evaluation System

Posted on:2013-09-19Degree:MasterType:Thesis
Country:ChinaCandidate:B ChenFull Text:PDF
GTID:2248330374986712Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the fast development of internet technology and electronic commerce,information technology(IT) has become the tremendous impetus for economic andsociety to progress. And it becomes extremely valuable that the highly socialized andcomputerized information of resources to whoever the people, at whenever the time andwherever the location. Due to the openness of the network system and the intrinsicsecurity vulnerabilities of the network protocol and software system, it comes to theinevitable safty loophole and hazard in certain concerns to whatever network or systemmay encounter as well as the great challenge with regard to the aspect of network safty.Therefore this safty problem caused common concerns of the public which results inresearching and exploring many information security systems and products. However,the cyber attacking event does not decrease as the network information securitytechnology develops but tend to increase annually. The attacking aggresivity andviolence keep enhancing to put the security in a more severe situation.This article is about detection for target’s ready known and existing loopholes bymeans of simulation of the hacking, presenting scan reporting after the scan of target.The dissertation probes for a research about the scan technology of the securityloopholes on which it is based to design security accessment system specific to theWindows system.The major research includes following aspects:1、Probe for researching known loopholes in present Windows system and offeraccordant technical solutions with related technology as foundation of further researchfor loopholes of Window security system.2、Study for loophole scan technology, deliberating designs for scan tactics, scanmethods, loophole database, programming process.3、The database plug-in design research of loophole. To comprehend NASLlanguage and realize general plug-in design.4、To test the system and verify the design and solution is viable for work.By studying and analysing Windows for the existing security vulnerabilities and potential hazard, the article presents scan assessment and consolidation to Windowssystem so as to secure and enhance information safty on a level of the operating system.By analysing current loopholes which commonly existed in Windows, assessing hazardlevels of loopholes, and using scan tools for auto-detecting insecured softwares remoteor in local system to locate deployment of different TCP ports with respective functionsand their versions in remote servers, it enable us to comprehend directly or indirectlythe safty problems that are existed in remote hosts.
Keywords/Search Tags:Windows system, information security, scanner, plug-in
PDF Full Text Request
Related items