Font Size: a A A

Sichuan Electric Power Corporation Dual Network Isolated Environment Outside The Network Design And Implementation Of Interactive Platforms

Posted on:2014-06-27Degree:MasterType:Thesis
Country:ChinaCandidate:W P SongFull Text:PDF
GTID:2268330425968874Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, the situaitoin ofinformation security should not be ignored. As the respresentative of the newtechnology,Intelligent terminals, Web2.0networking and cloud computing,on one handbring convience to our life and work.On the other hand,wide spread application ofthese technologies brings more security risks. In2010, the Ministry of Industry andInformation Technology stressed the need to attach great importance to smart gridinformation security and watch out for the fact that U.S. tries to use its informationnetwork technology to control national economies.The most important example is the"wisdom of the Earth" which is a big threat for our information and national security.As an important backbone enterprises for national energy security and economy,the State Grid Corporation pays great attention to information security, developed a"dual network dual machine,partition Fenwick,grade protection,multi-layered defense"security policy,strengthens the security of network border.The management informationnetwork is divided into two parts: internal information network and externalinformation network.Strong strategy logic is used to isolate the internal and externalof management information.Also physcical isolation is used between the internal andexternal information system.We separate physical servers and desktopcomputers.Though the " dual network quarantine" greatly improved the company’sinformation security on the network level, the information isolation devices only allowusing JDBC outside the network to access information within the network protocolunidirectional particular database.The two-way data exchange between the internal andexternal network, unstructured data transmission, the demand of service interface callsand cross-development language can not be achieved. A number of businessapplications with special needs,such as mobile office,remote delivery andreceiving,invoices,etc. could not verify the authenticity of the information across thenetwork and information outside the network boundary data and service calls.Theapplication was extremely restricted.This study uses the Sichuan Electric Power Corporation’s dual network isolatedenvironment as the background and information security network isolation device asresearch-bases.The study dives deeply into the question about how to break the isolation device limit of information security and network on, about how toexpand itscapabilities and to achieve security applications. Based on the research and analysis ofthe demand of various business departments and business systems of Sichuan ElectricPower Company, object-oriented technology with classic open-source J2EE frameworkis used to design and implementation of a web-based information security and externalnetwork isolation device interaction platform system. The application results show thatthe proposed technique through this project and implementation of system solutions,even in dual-network isolated environment, information security and network isolationdevice located on both sides of an information system is still able to interact withinternal and external network platform through a simple and convenient service call, aswell as unstructured data transmission. This makes data exchange needs and externalnetwork and information systems development business units are able to use the resultsof this research, which greatly improves the efficiency of business processes andbusiness processing capabilities.
Keywords/Search Tags:Dual-network isolation, Data Interaction, soa, webservice
PDF Full Text Request
Related items