Font Size: a A A

Risk Analysis And Evaluation Of Network Security In Stock Information Systems

Posted on:2014-08-20Degree:MasterType:Thesis
Country:ChinaCandidate:J YangFull Text:PDF
GTID:2268330425483758Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of internet and information technique, more andmore risk and pitfalls are presented in stock information system, while the safe andsecurity stock information system is important for the security of financial system.Safe stock information system is closely related to protecting kinds of financial risk.There exists an actual and imminent problem that is how to construct an effectiveinformation security system of stock network. The security of stock informationsystem should be considered from network security techniques, security managementand security policies. This paper studies the security problem of stock informationsystem on the basis of in-depth study of information security theories and the severalyears of working experience of practicing stock network information security. Theresearch results can be carried out, and as a guidance reference to the security of stockinformation system. The main research works are described as following.(1) This paper firstly expounds the basic concepts of the security of stockinformation system. It continues to make an in-depth study on the networkinformation security theories and a systematic analysis on the security of stockinformation system.Based on these investigations, this paper designs and appliesthese techniques and systems, and there are no problems concerning security havearisen since these techniques and systems were deployed.(2) The deployment of firewall is usually configed by system administratoraccording to the requirement of the specific organization. How to confige a firewall isduplicated because the manual configuration usually contains errors. To resolve thisproblem, this paper propose a firewall rule set analysis algorithm. By analysis thesecurity of firewall rule set, we propose the corresponding algorithm to evaluate thesecurity of network information system. To analysis the abnormity of firewall rule set,we propose two analysis algorithms based on policy tree and relation algebrarespectively. We compare the experimental results with the firewall analysis toolPolicyVisor, the results show that our proposed method can effectively detect theabnormity of confliction and redundancy.(3) Finally, the paper places emphasis on the combination of quantitativeanalysis and qualitative study on the objects protecting, the security systemapplication object, potential threats to the vulnerability of the system as well as the system, as well as the effectiveness of existing security measures implemented tocomprehensive analysis of the potential security risk. Based on the above research, aswell as the characteristics of the threat, the stock of the network information safetyprotection, application of encryption and digital signature, install firewall dualmachine heat of anti-virus system, the automatic updates and array, the array IDS.Able to realize the discussion of dynamic VLAN and QOS, set up the router andswitch the double machine hot backup, so as to realize the actual array of stock, theestablishment and implementation of security network system to protect stockinformation system.
Keywords/Search Tags:Stock, Network, Firewall, Information Security, Risk Evaluation
PDF Full Text Request
Related items