| Recently, the information security events has been occurred frequently.Unfortunately, the developing trend of that is being more and more serious. As thecases of several major economic data being leaked and a critical releasing eventhappened in the public security department, therefore, the information securitycontrol issues have become an important research project. In the design andimplementation, any project or system, no matter on the expects of hardware orsoftware, there are always some design defects or vulnerability fact which areinevitably left or stationed in the system, and with time passing by, more and morevulnerabilities will be discovered. With these vulnerabilities, the network attackerscould steal information by using the Trojan program or software, by which, a varietyof security incidents could have brought out, therefore, in order to trace and detectthe vulnerabilities and do well in the research of them, we need to keep up with thelatest computer systems technology development and also the latest developingstatus in the area of researching the security issues of applying the computer.In this text, firstly we summarizes the characteristics of the securityvulnerabilities, vulnerability detection and scanning repair technology, and thenunder the actual needs of the public security department information technologyapplications and network building, we designed and implemented a computersoftware vulnerability detection and repair system. A fingerprint technology for thedetection of the Trojan virus is adopted in this system, which the well-knownvulnerabilities of Windows platform can be scanned out as well as automatically therelated patch program will be downloaded and installed onto the system. Finally,according to the characteristics of police network applications in this text, we designoperation and maintenance program that based on the deployment of the tree ofmulti-layer network model in order to solve the practical problems which currentlymajor bottlenecks raised on the second police network, and achieve large-scalepatch distribution tasks.By the tested, we find that the vulnerability detection and repair system has afriendly interface, easy operation, minor network load and high efficiency ofdistribution, which could meet the requirements that police system networkcomputers for detection and repairing all kinds of software vulnerabilities, alsocould ensure that the office is normally and stably run by operating the system. |