Font Size: a A A

Research And Implementation Of Information Security Emergency Management Technical

Posted on:2014-02-05Degree:MasterType:Thesis
Country:ChinaCandidate:X LvFull Text:PDF
GTID:2248330398457605Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The Emergency Information security events not only caused huge losses of life and property, but also seriously affect the social stability, endanger state security, have significant damage to economic and social development. So all countries have been established and improved the emergency management system, in order to improve the ability of emergency disaster prevention to reduce the loss. A good emergency management system can largely shorten the emergency time, improve the emergency response capacity and improve the allocation of resources of emergency response. The information security emergency management system in foreign has been more mature, but in China is still in the initial stage, so there is an urgent need to build a highly efficient emergency management system.The information security emergency management system is based on information technology support, monitoring, early warning and contingency plans for information security incident management, emergency management, emergency events statistics analysis and evaluating later and report to the business management as the main body of organization guarantee and technical support system. It can effectively control and manage significant event, and take all kinds of preventive measures to avoid incident before the event occurs; In incident process, it can control the spread of the incident, upgrade, launch the emergency response plan quickly and efficiently, and recover to the situation before event occurs; At end of the event, it can timely sum up experience, improve the emergency management system, update relevant data, preparing for the emergency work in the future.In this paper, on the domestic and international information security technology development and status of emergency management understanding and thinking, based on the application of technology combined with the current situation, and information security emergency management system. The main research work are as follows:(1) In-depth research and analysis on the information security and emergency management issues, made substantial preparations for the establishing of the system overall construction and emergency management plan.(2) The classification of information security incidents, help to design a clear division of labor, convenient management and good safety performance of emerge ncy management system.(3) Analysis of the main function and business process of the information security incident management system of classification authority user management, emergency management, emergency management, emergency statistical analysis and evaluation and reporting system. Then, solving the emergency management system complexity involved in the data exchange on the basis of J2EE architecture combines workflow engine, Web service, XML data exchange technology to provide parsing and execution component. The emergency management process becomes more flexible.The Information Security Emergency Management system will hold the following characteristics:(1) Innovation architecture. By Spiral model method in software engineering. Web services, J2EE architecture combined with workflow technology and the unification of the data exchange based on XML technology interface specification, to realize the data exchange between different institutions and emergency information security management system and so on, to realize information security emergency plan management, emergency events statistics analysis, the evaluation function, and other business processes, this architecture provides an open, standard technical framework, and can realize a cross-platform, extensible applications.(2) Innovative applications. Development information security emergency manage ment components, and can meet the different industries or organizations basic req uirements of information security emergency response management, improve the le vel of software reuse and efficiency of system development.(3) Realize the routing management of information security events. With the method of workflow, it’s convenient for different levels of users to use, according to different types and levels of information security incidents contingency management subsystem in the plan online editing, approval, release, etc, to real simulate plan management process in reality.
Keywords/Search Tags:Information Security, Contingency Management, J2EE Architecture, Workflow Engine, XML Data Exchange
PDF Full Text Request
Related items