Font Size: a A A

Research And Analysis On The Classification Management System Of Security System Of Information System In Taizhou City

Posted on:2017-05-10Degree:MasterType:Thesis
Country:ChinaCandidate:X Y GuFull Text:PDF
GTID:2278330488950512Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the arrival of "Internet Plus", It has deeply integrated with various fields of economy and society. The construction of information system has presented a sharply increasing tendency in government and enterprises. When strive to improve work efficiency and develop the public service level, the security of information system can’t be ignored, either. In recent years, the public security organs of Taizhou have steadily carried out the classification and filing work on important information system classified security protection according to superiors’requirements. But the disadvantages of traditional work mode, e.g. paper materials are inefficient, not very safe and their settlement is complicated, make the information system classification management confronted with a bottleneck.Taking Taizhou information system classified security protection work as the research background, this article combines the software engineering with the work practice of net police, and carries out a research and analysis on Taizhou information security protection ranking management system. The article firstly introduces the project context of Taizhou information security protection ranking management system and its current researches and application statuses at home, and identifies the research direction and main tasks and responsibilities; in the business analysis of Chapter Two, the article dissects the existing problems of Taizhou information classified security protection work, introduces the organization of coordination groups, and provides the original business processes and the optimized business processes;in the function analysis of Chapter Three, the article uses the methods of case analysis and case descriptions to identify the system functions,and gives the overall function package diagram and sub-function package diagrams of the system, including training system, self-assessment rating system, specialist censor system, sub package diagrams of record system, safety supervisor file management system, information systems file management system and system management; in the data analysis of Chapter Four, it analyzes the data needed processing in each function module of the system, gives entity class relationship diagram, and establishes the database table structure; finally, the article summarizes the researches and analysis work, and prospects for the further work.
Keywords/Search Tags:Requirement Analysis, Database Modeling, Information System, Information security, Level protection
PDF Full Text Request
Related items