Font Size: a A A

Design And Implementation Of Business Terminal Security Management System Of Shanxi Mobile

Posted on:2013-06-08Degree:MasterType:Thesis
Country:ChinaCandidate:W C DengFull Text:PDF
GTID:2268330401966042Subject:Software engineering
Abstract/Summary:PDF Full Text Request
According to experience in the telecommunications industry practice andmanagement needs in fact, and the current business terminal computer securitymanagement problems encountered, the thesis analyzes the current all kinds of terminalsecurity and terminal management solutions’ deficiency. Based on this, the authorresearches the deployment and construction on business terminal for safety managementsystem.This thesis studies the theory of the five major aspects, including the role of basedon network behavior control technology, main engine related technology, computerinformation integrity sampling and data analysis technology, the mandatory securitypolicy guarantee system, open, modular product structure. In the related technicalresearch, the basis of the implementation method of the platform were introduced,including based on C/S software architecture design, the client and the server the choiceof the ways of communication, business logic design, function module design,functional design in the thesis mainly describes the terminal network access controlfunction, the computer completeness inspection and allocation function, Internetbehavior management function, remote assistance function, data security and auditing,and supporting the development of the report features realization.The author accomplished the development of software and software functiontesting, performance testing, compatibility testing etc., and completed the theoryresearch, the results have been proved by testing software function. The platform isconsisted of unified security unified maintenance strategy, behavior management,behavior audit etc. multiple facts. These modules construct of a unified standardizedterminal security management platform. To satisfy the business enterprise securitystrategy dynamically, the computing environment of the internal provides betterservices for enterprise’s business requirements.
Keywords/Search Tags:Terminal, Safety management, Network behavior control, Host integrity, Access control
PDF Full Text Request
Related items