Font Size: a A A

Research Of Trustworthy Audit Of The Operation And Maintenance Based On High-controllable Character Proxy Technology

Posted on:2015-04-05Degree:MasterType:Thesis
Country:ChinaCandidate:C S ZhaoFull Text:PDF
GTID:2298330431981096Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of information technology, the overall situation and foundation of information network are growing, enterprise information gradually deepen and has been developed to a high-level application stage. The size of the inner network is growing wider, the application and data security, business continuity have become increasingly demanding. However, the operation and maintenance behavior from internal or external of the system is often given too much trust. There are huge loopholes in management and potential risks in it and also exposed serious problems in practice. It impairs the interests of the enterprise态the public and even the nation. Creating a trusted operation and maintenance environment by efficient and controllable technology to take effective measures to control and audit the equipment maintenance behavior and compensate for this blind spot of the information security management is imperative for contemporary construction of enterprise information security.Firstly, this thesis in depth researched and analysised the operation and management situation of operation and maintenance (O&M) of the enterprise information system, and summarized the security problems which may cause hazards. On this basis, this thesis establishes an O&M audit system architecture based on character controllable proxy technology with good verifiablility, fault-tolerance, highly cohesive, low coupling, and portability and performance improvement. Finally, through the analysis of the SSH protocol stack, the thesis designed and implemented the SSH protocol proxy module with high controllability based on proxy technology. By integrating the module into the system architecture, the system achieved proxy forwarding of the SSH session process, data recording, and process playback, it also made the system self-control, safe and reliable, and efficient available and solved the current O&M operations management problems.
Keywords/Search Tags:operation and maintenance audits, controllable technology, SSH protocol, information security
PDF Full Text Request
Related items