Font Size: a A A

The Application And Research Of E-government Information Security Technology

Posted on:2014-01-11Degree:MasterType:Thesis
Country:ChinaCandidate:R Y ChenFull Text:PDF
GTID:2248330398957668Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The rapid development of e-gvernment. made a great contribution to the country’s management, social development, improvement of management and the service. However, due to the e-government occupies a very important position in the country’s construction about apolitical, economic, military, cultural, ecological civilization, on the other hand the e-government system has its defects, plus a variety of intentionally or unintentionally e-government criminal behavior, the various interest groups want to hold interests on the e-government, all these factors lead that the e-government security is extremely evident. How to protect the e-government security and do a good job in the construction of E-government security is not a small challenge for governments. E-government system is a huge systematic project, the construction of e-government system’s security system is also a very important complex systems engineering, information security technology is not only an important part of the security system of e-government system, but also is extremely important means to protect the e-government system security,The paper focuses on the application of information security technology and its related theories, to design and construct the e-government system security system from multiple perspectives and faces.This paper analyzes the current problems and insufficient of e-government security system, and e-government faced security risks, vulnerabilities. According to these conditions. I have a in-depth discussion on the application of information security technology and research, and analysis the security of e-government system requirements, design and construct the security system of e-government system. The security system of the e-government system includings the E-government security supporting part and the electronic government security laws and regulations, and the E-government security supporting part is composed of basic safety equipment and facilities, information security technology, safety management, safety and emergency response system. In the design of information security technology focuses specifically designed two algorithms of information security technology and their applications, one is the intrusion detection algorithm, the design of the algorithm into the game theory and mathematical statistics and probability theory, the main application in Honey-IDS; the second is the security risk evaluation algorithm, the algorithm is mainly applied in the system safety risk assessment technology.Finally,I used a security system of e-government system as an example, detailedly introduce how to apply information technology in safety from five aspects of the level e-government security system:these five parts of the city level e-government security system, expounds the important functions of the information security technology in process to protect the security of e-government in. These work solved the security problem of electronic government affairs, had a solid guarantee to provide e-government safety protection. Finally, there is the summary and Prospect of this thesis, there are some deficiencies need to be improved.
Keywords/Search Tags:E-government, Information Security, Emergency Response, Intrusion Detection, Safety performance assessment
PDF Full Text Request
Related items