Font Size: a A A

Research On Confidential Control Technology Of OA System Information Based On B/S

Posted on:2013-01-07Degree:MasterType:Thesis
Country:ChinaCandidate:Q G ZhuFull Text:PDF
GTID:2298330434975644Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer and communication technology, the computer network has been widely used in all aspects of the society. The enterprise and public institution start to pay more and more attention to the information construction.Among them, the electronic office has become one of the most important areas. As an important component of the electronic office, OA (Office Automation, OA) system has been recognized as the necessary system of the information construction by enterprise and public institution. With the increasing of OA system, increasing data storage, as well as more integrated business management, the information privacy and security work of the information construction is more and more important.So it is necessary to do research on confidential control of OA system information.Through the analysis of the information confidential control technology, We design and implement a terminal anti-leak system of OA system based on B/S. The system can effectively prevent the leak behaviors, including injection attacks from the external malicious process, copying clipboard,printing,copying screen, snooping the terminal cache file, and protect the kernel security of operating system and the system itself by drive firewall, in order to ensure the OA system information privacy and security. The main ideas and achievements of this paper include:1The threats of the OA system information snooping are classified into two kinds:active leakage and passive leakage. The present solutions are summarized and analyzed:the OA system security mechanisms and third-party security products. The advantages and disadvantage are also analyzed, and then a solution of information non-proliferation is put forward. We then design and implement a terminal anti-leak system of OA system based on B/S..2. Based on the idea of cloud killing, the white list mechanism, combined with the MD5hash algorithm is to verify that the DLL injection and driver loading for legitimacy. And the white list is put on the OA system server safety. The verification process is completed by the server-side. It is safe and reliable.3. Processes filter, when processes filter, not only use the process name to filter, instead of using the process name and signature code to filter, which is more effective to prevent an unauthorized process forging an authorized process by modifying the process name.4. Much reverse work is done on Windows kernel which has a not clear document, as well as drives of some safety products.Experiments prove that the system proposed by this paper can perform well.
Keywords/Search Tags:OA, Internet Explorer, Anti-leaking, Hook, Driver filtering
PDF Full Text Request
Related items