Font Size: a A A

Application Of Information Security Technology In E-Government Intranet

Posted on:2014-02-26Degree:MasterType:Thesis
Country:ChinaCandidate:Y XuFull Text:PDF
GTID:2248330398471946Subject:Information security
Abstract/Summary:PDF Full Text Request
Along with the development of computer technology and network, the dependence of people’s life and the work has achieved the unprecedented degree to the computer network. The lawless elements try their best using e-government network security hole, and with that they have caused serious destruction at each aspect to e-government. Through the investigation and research, we found that the e-government intranet of most ministries and agencies in Beijing had no security encryption measures. But according to the requirements of information security protection level, the system above level2must adopt certain encryption algorithm. The situation is not optimistic, and it makes the e-government intranet great potential security hazard. Wireless e-government intranet is in the starting stage, its security is also under construction department’s close attention problems, is the determining factor of whether the system suffices to play a role or not. Therefore, e-government network security is the key to the development of e-government. If the network security cannot be ensured, it will cause enormous losses to the country and the people. The most vulnerable part of the e-government network is the intranet because transmittal data bears an important government affairs information. And because of the vulnerability capability that resists attack was relatively weak, the protection of e-government intranet security must be comprehensive.Through the analysis of e-government intranet structure that existed, this article found out the security insufficiency of the cable network and wireless network to improve.In the cable network, after the investigation of more than ten ministries and institution and agencies in the actual, it analyzed data transmission security threats in the e-government intranet. It used security middleware and J2EE technology to design the encryption program to protect data transmission. And through the simulation, it validated the protective ability of data transmission security between e-government intranet points.In the wireless network, through the security analysis of most widely used wireless lip agreement-WiMAX and McWiLL, it summarized the security problems that existed in the two networks. It made a conclusion of security threats of the e-government wireless intranet, and made it a reference of the malicious code rule base. The design should fully consider related attacks according to the network defects. It also analyzed the business form and security threats of wireless e-government terminal. And it took Android system as an example, designed and implemented the malicious rule base of the malicious code detection system after analyzing a lot of applications that embedded malicious code. It improved the accuracy of the result of malicious code detection to ensure the security of e-government wireless terminal.
Keywords/Search Tags:e-government, security middleware, malicious code rules
PDF Full Text Request
Related items